Zeitschriftenartikel zum Thema „Online identity theft $x Prevention“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Online identity theft $x Prevention.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-20 Zeitschriftenartikel für die Forschung zum Thema "Online identity theft $x Prevention" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Chohan, Dr Rozina, Engr Murk Chohan, Irfan Mir Chohan und Farhana Mir Chohan. „Overcoming Trusting Barriers in Inter-organizational Identity Theft Prevention in Knowledge Sharing: A Case of UK Retailing Industry“. Revista Gestão Inovação e Tecnologias 11, Nr. 4 (24.08.2021): 4946–74. http://dx.doi.org/10.47059/revistageintec.v11i4.2515.

Der volle Inhalt der Quelle
Annotation:
Inter-organizational knowledge sharing basically connects two or more firms with one another in exchange relationship for skills, expertise and knowledgeable personnel. Knowledge plays a key role in organizational performance but it is given a very little attention in terms of information security and requires addressing security concerns due to following reasons: First, because retailing is the most victimized channel due to online trade. Second, if organizational criminal wings can compromise the information system of one firm, they can attack other firms too. Hence, identity theft is a collective problem. A security breach is among the top three business stories and identity theft is the key reason why it occurs in online retailing. Identity theft is a serious issue of society at a large and its prevention requires knowledge sharing by several actors. Through different case studies, interviews and theoretical and empirical analysis, this study highlights some unknown side of prevention collaboration in the retail industry in the United Kingdom (UK) which is of theoretical and practical importance. This paper theoretically furthers our understanding of how communication of organizations with comparable goals is handled differently in information security management. Practically, it evaluates relationships of retailing firms, online fraud forums and law enforcement departments in the fraud prevention process. Our research outlines how retailers' partnerships with different stakeholders will help them solve and reduce identity theft by presenting a structure for inter-organizational fraud prevention in retailing organizations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Shah, Mahmood, Abdullah Maitlo, Paul Jones und Yahaya Yusuf. „An investigation into agile learning processes and knowledge sharing practices to prevent identity theft in the online retail organisations“. Journal of Knowledge Management 23, Nr. 9 (11.11.2019): 1857–84. http://dx.doi.org/10.1108/jkm-06-2018-0370.

Der volle Inhalt der Quelle
Annotation:
Purpose Lack of individual awareness of knowledge sharing practices to prevent identity theft is a significant issue for online retail organisations (OROs). Agile learning processes and sharing of knowledge is essential, but the lack of relevant training inhibits these processes within the online industry. This study aims to identify the inhibiting factors in agile learning and knowledge sharing process with recommendations for best practice for organisations and staff to effectively share knowledge on identity theft prevention. Design/methodology/approach Three qualitative case studies were undertaken in OROs in the UK. Data were collected using semi-structured interviews, internal documents and related external material. The data were analysed using a thematic analysis method. Findings The findings identified that individual staff members within OROs from the information security and fraud prevention departments often share their knowledge as a community. However, there is no formal knowledge sharing process or any related training facilitating this exchange. There is a need for agile learning environment in OROs of the UK. Originality/value The study offers both theoretical and practical contributions to the extant literature of agile learning of knowledge sharing to prevent identity theft in OROs. Existing learning opportunities are not being used to enhance the knowledge of individuals, and OROs need to increase the skills and trust of their staff to share knowledge efficiently. This study identifies the systemic weaknesses inherent in the process of knowledge sharing and existing training provision within OROs. It provides ORO managers with practical guidelines in facilitating trust between individuals and developing appropriate training systems to educate staff on sharing organisational knowledge. This study contributes by extending the knowledge sharing framework proposed by Chong et al. (2011) for enhanced individual knowledge sharing processes to prevent identity theft within OROs. It also identifies OROs’ weaknesses in knowledge sharing learning processes for theft prevention and offers prevention guidelines and recommendations for developing effective agile learning environments.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Malik, Aftab Ahmad. „Online shopping, Cyber frauds and Fraud prevention Strategies“. International Journal for Electronic Crime Investigation 8, Nr. 1 (13.03.2024): 49–56. http://dx.doi.org/10.54692/ijeci.2024.0801186.

Der volle Inhalt der Quelle
Annotation:
Online shopping is increasingly being targeted by hackers and cyber criminals, who exploit the anonymity of the internet to deceive unsuspecting shoppers. These scams involve fake websites or ads, posing as legitimate sellers, damaging innocent citizens' bank accounts and databases, and causing damage to customers. Online shopping fraud involves using stolen credit or debit cards for purchases, while identity theft involves stealing personal information for fraudulent purposes like credit or illegal purchases. We discuss, the safety tips to avoid online shopping scams, using these safety tips before making a purchase. In United states a government agency FTC has been entrusted the task of implementation the civil law related to anti-trust; it also indorses and promotes the protection of consumers rights while working with Justice Department. Online shopping scams were the second most common fraud category in 2021, according to the FTC. To avoid them, use safety tips to identify and avoid scams. Cybercriminals steal and can use personal information to make unauthorized purchases or engage in fraudulent activities. Identity theft is a crime involving capturing and the misuse of another's personal identifying information like Id-card, credit card and bank account information. Fraudsters often use stolen credit cards to purchase items, return them for refunds, and then sell the refunded money or goods. Machine learning is a rapidly evolving technology that can significantly enhance online shopping security and user awareness which is coupled with artificial intelligence
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

DeLiema, Marguerite, Lynn Langton und David Burnes. „Identity Theft Among Older Adults: Risk and Protective Factors“. Innovation in Aging 4, Supplement_1 (01.12.2020): 31. http://dx.doi.org/10.1093/geroni/igaa057.100.

Der volle Inhalt der Quelle
Annotation:
Abstract Although financial exploitation and fraud targeting older adults have been the focus of increasing academic attention, research on identity theft among older adults is virtually nonexistent. Identity theft refers to an intentional, unauthorized transfer or use of a person’s identifying information for unlawful purposes (Federal Trade Commission 1998). Society’s growing reliance on technology to transfer and store private information has created increased opportunities for financial predators to access and misuse personal data. Results from the most recent Bureau of Justice Statistics’ Identity Theft Supplement show that nearly 1 in 10 adults aged 65 or older experienced identity theft in the past year, with financial losses totaling $2.5 billion. Given the high frequency and cost of identity theft among older Americans, more research is needed to guide prevention efforts and interventions that support recovery. This paper examines the risk factors, protective factors, costs, and consequences of identity theft victimization among older adults, focusing on differences between those aged 65-74 and those 75 or older. Findings suggest that the prevalence of identity theft is lower among those 75 or older (6.6% versus 10.3%), but those 75 or older experienced higher average losses per identity theft incident ($155 vs $96). Compared to those aged 65-74, a lower percentage of adults aged 75 or older engaged in online shopping, thereby reducing their risk of identity exposure (48% versus 24%). However, they were also less likely to engage in protective behaviors such as checking credit reports, changing passwords, checking account statements, and using security software.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hole, Prof K. R. „Fraud Detection and Prevention in E-commerce using Decision Tree Algorithm“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 4 (30.04.2024): 2187–96. http://dx.doi.org/10.22214/ijraset.2024.60307.

Der volle Inhalt der Quelle
Annotation:
Abstract: Fraud detection is an important part of e-commerce because it helps prevent fraud such as illegal transactions, identity theft, and money laundering. Recently, there has been a lot of literature on the application of machine learning algorithms to identify e-commerce fraud. These algorithms work by learning patterns in data that indicate fraud. Pattern checking deals with discovering differences in data, such as unusual products, locations, or behavior outside the norm for certain users, through machine learning. In this project, we propose a decision tree algorithm to detect fraud in e-commerce using newly generated data from various online products on e-commerce sites. In addition to fraud detection, we also provide advice on fraud prevention. We propose a new security model that will prove the user's identity. In this security model, users are required to register their profile with some questions. Our security systems will display relevant images in response to the registration question. The user has to click on the correct answer image within the time limit. We will ask the user 3 questions in graphic format. If the user selects the correct answer, the user will be considered a real user.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Komosny, Dan. „Retrospective IP Address Geolocation for Geography-Aware Internet Services“. Sensors 21, Nr. 15 (22.07.2021): 4975. http://dx.doi.org/10.3390/s21154975.

Der volle Inhalt der Quelle
Annotation:
The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Yeon, Soo-Kwon, und Jin-Ho Yoo. „A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games)“. Journal of Korea Game Society 16, Nr. 2 (30.04.2016): 51–60. http://dx.doi.org/10.7583/jkgs.2016.16.2.51.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Shtonda, Roman, Yuliya Chernish, Tetiana Tereshchenko, Katerina Tereshchenko, Yurii Tsykalo und Serhiy Polishchuk. „CLASSIFICATION AND METHODS OF DETECTION OF PHISHING ATTACKS“. Cybersecurity: Education, Science, Technique 4, Nr. 24 (2024): 69–80. http://dx.doi.org/10.28925/2663-4023.2024.24.6980.

Der volle Inhalt der Quelle
Annotation:
The reliable operation of data transmission networks, computer systems and mobile devices is a mandatory condition for the effective functioning of the state and society, and the life of an individual. The reliability of key information systems for public use depends on many factors: cyber attacks, hardware and software failures, and various types of errors. Rapid expansion of threats to national security in the 21st century. entrusts state authorities with the tasks of their prevention, detection and neutralization. Cyber security is increasingly viewed as a fundamental problem of the state, which comprehensively affects its security, defense, economy, and almost all spheres of public life. The Internet gave a powerful impetus to the development of mass communication, trade and information exchange. However, today it is the area where many crimes are committed. The impersonal nature of digital infrastructure has made identity theft a natural and highly attractive project. Cybercriminals actively use various means of stealing information, including phishing. At the current stage and in the future, the development of both individual societies and states, as well as the world in general, will be carried out in accordance with the concept of the information society, which is connected with the use of information and telecommunication technologies in the acquisition, storage and processing of information in everyday life Phishing is a serious online security problem that involves spoofing genuine websites to trick online users and steal their confidential information. Analyzing these definitions, we can conclude that “phishing” can be considered in different ways, but the main purpose of its conduct remains unchanged—stealing data. The practical value of the results lies in the possibility of using the obtained classifier for further creation of software solutions for recognizing phishing sites. It, as well as a set of characteristics, can be implemented in anti-phishing browser extensions or other anti-phishing tools.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Rodríguez Correa, Marisol, und Juan Carlos Rivadulla López. „Percepción y experiencias sobre el ciberbullying en estudiantes universitarios“. @tic revista d'innovació educativa, Nr. 21 (21.12.2018): 10. http://dx.doi.org/10.7203/attic.21.12926.

Der volle Inhalt der Quelle
Annotation:
At present we find a high percentage of ICT use by adolescents, mainly in terms of online communication. Threats, ridicule, identity theft and sending material with sexual content are some of the many ways in which cyberbullying manifests itself, with the Internet and mobile phone being the main means used by young people to do so. The objective of this study was to know the perception and experience of a group of university students about cyberbullying, with the participation of 864 students from six Universities in northwestern Spain. A non-experimental quantitative methodology of a survey type was followed, specifically a non-probabilistic, accidental or incidental sampling was used, conditioned by the availability of subjects to participate in the study. The majority of the students consulted indicated that harassment through mobile phones and the Internet has more effect on the victim than "traditional bullying", indicating that they have never suffered harassment or have exercised as stalkers through the Internet and mobile phones; and only a lower percentage of students expressed that they have suffered harassment through mobile phones, but infrequently. The majority of the men consulted who indicated that they suffer harassment through the Internet worry about what others may think about what is happening to them, in the case of the women consulted, most indicated that when they are harassed they feel alone and they It also worries what others may think about what is happening to them. We must educate and sensitize society in general about the issue of harassment and cyberbullying, implementing educational measures for their prevention in schools from the first levels.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

(Sunny) Kim, Jungsun, und Bo Bernhard. „Factors influencing hotel customers’ intention to use a fingerprint system“. Journal of Hospitality and Tourism Technology 5, Nr. 2 (12.08.2014): 98–125. http://dx.doi.org/10.1108/jhtt-11-2013-0031.

Der volle Inhalt der Quelle
Annotation:
Purpose – This paper aims to extend the technology acceptance model (TAM) to explore the factors influencing a hotel customer’s intention to use a fingerprint system instead of a traditional keycard system and the moderating factors (i.e. gender and age) on the relationships between the proposed factors and the customer’s intention to use fingerprint technology. When hotels add new technologies, the potential vulnerability of their systems also increases. Underestimating such risks can possibly result in massive losses from identity theft and related fraud for hoteliers. Customers who are aware of these risks may become more open to innovative methods of identification or verification, such as biometrics. Design/methodology/approach – The online survey instrument was developed based on TAMs. The authors collected complete 526 responses from hotel customers and tested the hypotheses using structural equation modeling. Findings – This study found seven factors (i.e. perceived usefulness, perceived ease of use, subjective norm, perceived convenience, perceived data security, perceived property security and personal concerns) which significantly influence a hotel customer’s intention to use fingerprint technology. Gender and age played important moderating roles in the relationships between some of these factors and the intention to use. Practical implications – Recommendations are made as to how hotels can benefit from the implementation of biometrics, particularly fingerprint systems. For example, a hotel’s marketing campaign can be more effective by emphasizing the advantages of fingerprint technology related to “data security and convenience” for younger consumers (i.e. Gen X and Gen Y). Originality/value – Both educators and practitioners will benefit from the findings of this empirical study, as there are very few published studies on a customer’s fingerprint technology acceptance in the hotel context.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Robiatul Adawiah, Laila, und Yeni Rachmawati. „Parenting Program to Protect Children's Privacy: The Phenomenon of Sharenting Children on social media“. JPUD - Jurnal Pendidikan Usia Dini 15, Nr. 1 (30.04.2021): 162–80. http://dx.doi.org/10.21009/jpud.151.09.

Der volle Inhalt der Quelle
Annotation:
Sharenting is a habit of using social media to share content that disseminates pictures, videos, information, and parenting styles for their children. The purpose of this article is to describe the sharenting phenomenon that occurs among young parents, and the importance of parenting programs, rather than protecting children's privacy. Writing articles use a qualitative approach as a literature review method that utilizes various scientific articles describing the sharenting phenomenon in various countries. The findings show that sharenting behaviour can create the spread of children's identity openly on social media and tends not to protect children's privacy and even seems to exploit children. Apart from that, sharenting can also create pressure on the children themselves and can even have an impact on online crime. This article is expected to provide benefits to parents regarding the importance of maintaining attitudes and behaviour when sharing and maintaining children's privacy and rights on social media. Keywords: Sharenting on social media, Children's Privacy, Parenting Program References: Åberg, E., & Huvila, J. (2019). Hip children, good mothers – children’s clothing as capital investment? Young Consumers, 20(3), 153–166. https://doi.org/10.1108/YC-06-2018-00816 Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and child maltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27–38. https://doi.org/10.1016/j.psi.2015.10.003 Archer, C., & Kao, K.-T. (2018). Mother, baby, and Facebook makes three: Does social media provide social support for new mothers? Media International Australia, 168(1), 122–139. https://doi.org/10.1177/1329878X18783016 Bartholomew, M. K., Schoppe-Sullivan, S. J., Glassman, M., Kamp Dush, C. M., & Sullivan, J. M. (2012). New Parents’ Facebook Use at the Transition to Parenthood. Family Relations, 61(3), 455–469. https://doi.org/10.1111/j.1741-3729.2012.00708.x Belk, R. W. (1988). Possessions and the Extended Self. Journal of Consumer Research, 15(2), 139. https://doi.org/10.1086/209154 Belk, R. W. (2013). Extended Self in a Digital World: Table 1. Journal of Consumer Research, 40(3), 477–500. https://doi.org/10.1086/671052 Benedetto, L., & Ingrassia, M. (2021). Digital Parenting: Raising and Protecting Children in Media World. In L. Benedetto & M. Ingrassia (Eds.), Parenting. IntechOpen. https://doi.org/10.5772/intechopen.92579 Berns, R. (2016). Child, family, school, community. Socialization and support. Stanford. United States of America, 5(64), 93–98. Bessant, C. (2017). Parental sharenting and the privacy of children. Northumbria University Faculty of Business and Law, Faculty and Doctoral Conference, 28th - 29th June 2017, Newcastle, UK. Bessant, C. (2018). Sharenting: Balancing the Conflicting Rights of Parents and Children. Communications Law, 23(1), 7–24. Bessant, C., & Nottingham, E. (2020). Sharenting in a socially distanced world. Parenting for a Digital Future., 1–2. Biglan, A., Flay, B. R., Embry, D. D., & Sandier, I. N. (2012). The Critical Role of Nurturing Environments for Promoting Human Weil-Being. American Psychologist, 16. Blum-Ross, A., & Livingstone, S. (2017). “Sharenting,” parent blogging, and the boundaries of the digital self. Popular Communication, 15(2), 110–125. https://doi.org/10.1080/15405702.2016.1223300 Brooks, J. (2008). The Process of Parenting. In The Process of Parenting (pp. 116–117). Pustaka Belajar. Brosch, A. (2016). When the child is born into the internet: Sharenting as a growing trend among parents on Facebook. New Educational Review, 43(1), 224–235. https://doi.org/10.15804/tner.2016.43.1.19 Brosch, A. (2018). Sharenting – Why do parents violate their children’s privacy? New Educational Review, 54(4), 75–85. https://doi.org/10.15804/tner.2018.54.4.06 Byrne, S., Rodrigo, M. J., & Máiquez, M. L. (2014). Patterns of individual change in a parenting program for child maltreatment and their relation to family and professional environments. Child Abuse & Neglect, 38(3), 457–467. https://doi.org/10.1016/j.chiabu.2013.12.008 Centers for Disease Control and Prevention. (2014). Understanding Child Maltreatment 2014 (p. 2). http://www.cdc.gov/violenceprevention/pdf/cm-factsheet-a.pdf Children’s Online Privacy Protection Act (COPPA). (2002). Protecting Children’s Privacy Under COPPA: A Survey on Compliance. Federal Trade Commission. http://www.ftc.gov/ogc/coppa1.htm Choi, G. Y., & Lewallen, J. (2018). “Say Instagram, Kids!”: Examining Sharenting and Children’s Digital Representations on Instagram. Howard Journal of Communications, 29(2), 144–164. https://doi.org/10.1080/10646175.2017.1327380 Collins English Dictionary. (2014). Opinion—Definition of opinion by The Free Dictionary. 12th Edition. http://dictionary.reference.com/browse/database Comer, J. S., & Barlow, D. H. (2014). The occasional case against broad dissemination and implementation: Retaining a role for specialty care in the delivery of psychological treatments. American Psychologist, 69(1), 1–18. https://doi.org/10.1037/a0033582 Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103–127. https://doi.org/10.1080/016396299266524 Fitri, S. (2017). Dampak Foditif dan Negatif Sosial Media terhadap Sosial Anak. NATURALISTIC: Jurnal Kajian Penelitian Pendidikan Dan Pembelajaran, 1(2), 118–123. https://doi.org/10.35568/naturalistic.v1i2.5 Fox, A. K., & Hoy, M. G. (2019). Smart Devices, Smart Decisions? Implications of Parents’ Sharenting for Children’s Online Privacy: An Investigation of Mothers. Journal of Public Policy & Marketing, 38(4), 414–432. https://doi.org/10.1177/0743915619858290 Fridha, M., & Irawan, R. E. (2020). Eksploitasi Anak Melalui Akun Instagram (Analisis Wacana Kritis Praktek Sharenting oleh Selebgram Ashanty & Rachel Venya). Komuniti: Jurnal Komunikasi dan Teknologi Informasi, 12(1), 68–80. https://doi.org/10.23917/komuniti.v12i1.10703 Friedman, S. J. (2000). Children and the World Wide Web. University Press of America. Hammond, S. I., Müller, U., Carpendale, J. I. M., Bibok, M. B., & Liebermann-Finestone, D. P. (2012). The effects of parental scaffolding on preschoolers’ executive function. Developmental Psychology, 48(1), 271–281. https://doi.org/10.1037/a0025519 Holzer, P. J., Higgins, J., Bromfield, L., Richardson, N., & Higgins, D. (2006). The effectiveness of parent education and home visiting child maltreatment prevention programs. Australian Institute of Family Studies. Koetse, M. (2019). ‘Sharenting’ on Chinese Social Media: When Parents Are Posting Too Many Baby Pics on WeChat. What’s on Weibo Reporting Social Trends in China. Krisnawati, E. (2016). Mempertanyakan Privasi di Era Selebgram: Masih Adakah? Jurnal IIlmu Komunikasi, 13(2), 179. https://doi.org/10.24002/jik.v13i2.682 Latipah, E., Adi Kistoro, H. C., Hasanah, F. F., & Putranta, H. (2020). Elaborating motive and psychological impact of sharenting in millennial parents. Universal Journal of Educational Research, 8(10), 4807–4817. https://doi.org/10.13189/ujer.2020.081052 Leaver, T. (2020). Balancing privacy: Sharenting, intimate surveillance, and the right to be forgotten. In The Routledge Companion to Digital Media and Children. https://doi.org/10.33767/osf.io/fwmr2 Lee, S. J., Ward, K. P., Chang, O. D., & Downing, K. M. (2021). Parenting activities and the transition to home-based education during the COVID-19 pandemic. Children and Youth Services Review, 122, 105585. https://doi.org/10.1016/j.childyouth.2020.105585 Lundahl, B., Risser, H., & Lovejoy, M. (2006). A meta-analysis of parent training: Moderators and follow-up effects. Clinical Psychology Review, 26(1), 86–104. https://doi.org/10.1016/j.cpr.2005.07.004 Lwin, M., Stanaland, A., & Miyazaki, A. (2008). Protecting children’s privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing, 84(2), 205–217. https://doi.org/10.1016/j.jretai.2008.04.004 Manganello, J. A., Falisi, A. L., Roberts, K. J., Smith, K. C., & McKenzie, L. B. (2016). Pediatric injury information seeking for mothers with young children: The role of health literacy and ehealth literacy. Journal of Communication in Healthcare, 9(3), 223–231. https://doi.org/10.1080/17538068.2016.1192757 Manotipya, P., & Ghazinour, K. (2020). Children’s Online Privacy from Parents’ Perspective. Procedia Computer Science, 177, 178–185. https://doi.org/10.1016/j.procs.2020.10.026 Marasli, M., Sühendan, E., Yilmazturk, N. H., & Cok, F. (2016). Parents’ shares on social networking sites about their children: Sharenting. Anthropologist, 24(2), 399–406. https://doi.org/10.1080/09720073.2016.11892031 Mikton, C., & Butchart, A. (2009). Child maltreatment prevention: A systematic review of reviews. Bulletin of the World Health Organization, 87(5), 353–361. https://doi.org/10.2471/BLT.08.057075 Miyazaki, A. D. (2008). Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. Journal of Public Policy & Marketing, 27(1), 19–33. https://doi.org/10.1509/jppm.27.1.19 Morris, A. S., Robinson, L. R., Hays-Grudo, J., Claussen, A. H., Hartwig, S. A., & Treat, A. E. (2017). Targeting Parenting in Early Childhood: A Public Health Approach to Improve Outcomes for Children Living in Poverty. Child Development, 88(2), 388–397. https://doi.org/10.1111/cdev.12743 Moser, C., Chen, T., & Schoenebeck, S. Y. (2017). Parents? And Children?s Preferences about Parents Sharing about Children on Social Media. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 5221–5225. https://doi.org/10.1145/3025453.3025587 Nooraeni, R. (2017). Implementasi Program Parenting Dalam Menumbuhkan Perilaku Pengasuhan Positif Orang Tua Di PAUD Tulip Tarogong Kaler Garut. Jurnal Pendidikan Luar Sekolah, 13(2). Nottingham, E. (2013). ‘Dad! Cut that Part Out!’ Children’s Rights to Privacy in the Age of ‘Generation Tagged’: Sharenting, digital kidnapping and the child micro-celebrity. In Journal of Chemical Information and Modeling. O’Keeffe, G. S., Clarke-Pearson, K., & Council on Communications and Media. (2011). The Impact of Social Media on Children, Adolescents, and Families. PEDIATRICS, 127(4), 800–804. https://doi.org/10.1542/peds.2011-0054 Pan, X., & Yu, H. (2018). Different Effects of Cognitive Shifting and Intelligence on Creativity. The Journal of Creative Behavior, 52(3), 212–225. https://doi.org/10.1002/jocb.144 Prasetyo, Dimas., Syahnas, A. N. R., Fajriani, A., Nugraha, H. G., & Suryani, S. (2019). “Saya hanya mengunggah foto dan video anak saya ”. Intenational Conference on ECEP. Putra, A. M., & Febrina, A. (2019). Fenomena Selebgram Anak: Memahami Motif Orang tua. Jurnal ASPIKOM, 3(6), 1093–1108. https://doi.org/10.24329/aspikom.v3i6.396 Sakashita, M., & Kimura, J. (2011). Daughter as Mother’s Extended Self. In European advances in consumer research (In A. Bradshaw, C. Hackley, P. Maclaran (Eds.), Vol. 9, pp. 283–289). Association for Consumer Research. Salleh, A. S., & Noor, N. A. Mohd. (2019). Sharenting: Implikasinya dari Persepektif Perundangan Malaysia. Jurnal Undangundang Malaysia, 31(1), 121–156. Sanders, M. (2012). Development, evaluation, and multinational dissemination of the triple P-Positive Parenting Program. Annual Review of Clinical Psychology, 8, 345–379. Santini, P. M., & Williams, L. C. (2016). Parenting Programs to Prevent Corporal Punishment: A Systematic Review. Paidéia (Ribeirão Preto), 26(63), 121–129. https://doi.org/10.1590/1982-43272663201614 Sarkadi, A., Dahlberg, A., Fängström, K., & Warner, G. (2020). Children want parents to ask for permission before ‘sharenting’. Journal of Paediatrics and Child Health, 56(6), 981–983. https://doi.org/10.1111/jpc.14945 Shumaker, C., Loranger, D., & Dorie, A. (2017). Dressing for the Internet: A study of female self-presentation via dress on Instagram. Fashion, Style & Popular Culture, 4(3), 365–382. https://doi.org/10.1386/fspc.4.3.365_1 Siibak, A., & Traks, K. (2019). Viewpoints The dark sides of sharenting. Catalan Journal of Communication & Cultural Studies, 11(1), 115–121. https://doi.org/10.1386/cjcs.11.1.115 Sobur, A. (2001). Pers, Hak Privasi, dan Hak Publik. Mediator, 2(1), 81–91. http://dx.doi.org/10.24329/aspikom.v3i6.396 Steinberg, S. B. (2017). Sharenting: Children’s Privacy in the Age of social media. EMORY LAW JOURNAL, 66, 47. Traube, D. E., Hsiao, H.-Y., Rau, A., Hunt-O’Brien, D., Lu, L., & Islam, N. (2020). Advancing Home Based Parenting Programs through the Use of Telehealth Technology. Journal of Child and Family Studies, 29(1), 44–53. https://doi.org/10.1007/s10826-019-01458-w Trivette, C. M., & Dunst, C. J. (2009). Community-Based Parent Support Programs. 7. van der Velden, M., & El Emam, K. (2013). “Not all my friends need to know”: A qualitative study of teenage patients, privacy, and social media. Journal of the American Medical Informatics Association, 20(1), 16–24. https://doi.org/10.1136/amiajnl-2012-000949 Verswijvel, K., Walrave, M., Hardies, K., & Heirman, W. (2019). Sharenting, is it a good or a bad thing? Understanding how adolescents think and feel about sharenting on social network sites. Children and Youth Services Review, 104, 104401. https://doi.org/10.1016/j.childyouth.2019.104401 Wagner, A., & Gasche, L. A. (2018). Sharenting: Making decisions about other’s privacy on social networking sites. MKWI 2018 - Multikonferenz Wirtschaftsinformatik. World Health Organization (WHO). (2016). INSPIRE seven strategies for ending violence against children. World Health Organization. Wyatt Kaminski, J., Valle, L. A., Filene, J. H., & Boyle, C. L. (2008). A Meta-analytic Review of Components Associated with Parent Training Program Effectiveness. Journal of Abnormal Child Psychology, 36(4), 567–589. https://doi.org/10.1007/s10802-007-9201-9 Zeeuw, A. De, Media, M. A. N., & Culture, D. (2018). Exposing Childhoods Online (Issue June).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Pua, Sin Yi, und Boon Cheong Chew. „Black-hearted Sellers in the Skincare Industry: Their Activities and Prevention Strategies“. Journal of Technology Management and Business 10, Nr. 1 (25.06.2023). http://dx.doi.org/10.30880/jtmb.2023.10.01.002.

Der volle Inhalt der Quelle
Annotation:
While online purchases have increased substantially since the pandemic, the cases of “black-hearted” sellers taking advantage of their buyers using unethical activities or marketing tactics are increasing as well, especially in the skincare industry. If this continues, it will subsequently result in the online platform to become ‘untrustable’ among the skincare buyers. Hence, this paper aims to examine the activities of black-hearted sellers and suggest solutions that could prevent them from conducting their businesses. Using semi-structured interviews conducted with 20 experienced official skin care sellers, this paper found that the activities generated by the black-hearted sellers are counterfeiting, parallel imports, misleading information, reselling without authorisation, and identity theft. Also, several strategies that can prevent these activities are quality strategy, adjusting price strategies, technology strategies, enforcement strategies, supply chain structure, and marketing communication strategies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Finkelhor, David, Kerryann Walsh, Lisa Jones, Kimberly Mitchell und Anne Collier. „Youth Internet Safety Education: Aligning Programs With the Evidence Base“. Trauma, Violence, & Abuse, 03.04.2020, 152483802091625. http://dx.doi.org/10.1177/1524838020916257.

Der volle Inhalt der Quelle
Annotation:
Background: This review critically examines the messages of youth internet safety education programs in the light of research about both the dynamics of internet dangers and the efficacy of youth prevention education. Methods: Using terms “internet safety education” and “digital citizenship,” a Google search identified 12 multi-topic safety programs. Review articles were identified via Google Scholar for six forms of online harm to youth that have been targeted by many of these programs: cyberbullying (19 articles); online sexual exploitation (23 articles); sexting (19 articles); online fraud, hacking, and identity theft (6 articles); online suicide and self-harm promotion (18 articles); and internet overuse or addiction (15 articles). Findings: There appear to be mismatches between dynamics revealed in the research about internet harms and the messages emphasized in educational programs, particularly on the issues of sexual exploitation and sexting. Overall, the review literature also suggests major advantages to integrating internet safety into already well-established and evidence-based programs currently addressing related off-line harms, for example, programs focusing on general bullying, dating abuse, or sexual abuse prevention. The advantages stem from four factors: (1) the considerable overlap between online harms and similar off-line harms, (2) the apparent greater prevalence of off-line harms, (3) the evidence that the same risk factors lie behind both online and off-line harms, and most importantly, (4) the substantially superior evidence base for the longer standing programs developed originally around the off-line harms.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Gambín, Ángel Fernández, Anis Yazidi, Athanasios Vasilakos, Hårek Haugerud und Youcef Djenouri. „Deepfakes: current and future trends“. Artificial Intelligence Review 57, Nr. 3 (19.02.2024). http://dx.doi.org/10.1007/s10462-023-10679-x.

Der volle Inhalt der Quelle
Annotation:
AbstractAdvances in Deep Learning (DL), Big Data and image processing have facilitated online disinformation spreading through Deepfakes. This entails severe threats including public opinion manipulation, geopolitical tensions, chaos in financial markets, scams, defamation and identity theft among others. Therefore, it is imperative to develop techniques to prevent, detect, and stop the spreading of deepfake content. Along these lines, the goal of this paper is to present a big picture perspective of the deepfake paradigm, by reviewing current and future trends. First, a compact summary of DL techniques used for deepfakes is presented. Then, a review of the fight between generation and detection techniques is elaborated. Moreover, we delve into the potential that new technologies, such as distributed ledgers and blockchain, can offer with regard to cybersecurity and the fight against digital deception. Two scenarios of application, including online social networks engineering attacks and Internet of Things, are reviewed where main insights and open challenges are tackled. Finally, future trends and research lines are discussed, pointing out potential key agents and technologies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Obach, Alexandra, Báltica Cabieses, Francisca Vezzani, Consuelo Robledo, Alice Blukacz und Pablo Vial. „Perceived barriers and facilitators for adhering to COVID-19 preventive measures in Chile: a qualitative study in three large cities“. BMC Infectious Diseases 23, Nr. 1 (14.03.2023). http://dx.doi.org/10.1186/s12879-023-08118-x.

Der volle Inhalt der Quelle
Annotation:
Abstract Background Globally, it has been reported that different social determinants of health -structural, sociodemographic, economic, living conditions and cultural factors- may affect opportunities to adhere to prevention measures against SARS-CoV-2. The objective of this study was to explore the perceptions around barriers and facilitators for adherence to COVID-19 prevention measures among the adult population residing in three large cities in Chile from a social determinants of health perspective. Methods Qualitative paradigm, multiple case-study design. Online semi-structured interviews were conducted with men and women aged 18 and over from different socioeconomic groups residing in three large cities. For participant recruitment and selection, purposive contacts were made based on community and social media networks, followed by snowball sampling. Saturation was reached at 61 participants, after which a thematic analysis was carried out with the support of AtlasTi software. The Ethics Committee of the Universidad del Desarrollo in Chile approved this study. Results The main perceived barriers to adherence to COVID-19 preventive measures are linked to structural social determinants of health such as income, occupation, gender, access to basic supplies, and housing. Perceived facilitators are the fear of contagion and the incorporation of measures into daily habits. The social communication of preventive measures by health authorities is perceived as punitive, affecting adherence once the fear of contagion decreased in the country. It is also perceived that the recommended preventive measures are disconnected from communities’ cultural practices and people´s identity, as well as affected by gender inequities and socioeconomic conditions that stakeholders in the country do not sufficiently address. Conclusion Study findings suggest that adherence to preventive measures, such as social distancing, mask use, and hand washing, could be promoted through their incorporation into the daily life habits of people and communities. These measures should consider the structural social determinants that generate multiple barriers to adherence, like poverty, occupational risks, and overcrowding. Socio-cultural dimensions of health and everyday risks need further understanding among the different communities in the country, allowing for differences in viewpoints and practices based on gender, age, place, and social identity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Closson, Kalysha, Bongiwe Zulu, Julie Jesson, Janan J. Dietrich, Tatiana Pakhomova, C. Andrew Basham, Mags Beksinska und Angela Kaida. „Examining gender and sexual orientation differences in physical intimate partner violence experienced and perpetrated by youth living in eThekwini district South Africa during the COVID-19 pandemic“. BMC Public Health 23, Nr. 1 (21.11.2023). http://dx.doi.org/10.1186/s12889-023-17199-x.

Der volle Inhalt der Quelle
Annotation:
Abstract Background Young women and Lesbian, Gay, Bisexual, Trans, Non-binary/no gender, or Questioning (LGBTQ+) youth in South Africa face some of the highest global levels of intimate partner violence (IPV). Given limited evidence in the wake of the COVID-19 pandemic, which has fuelled IPV globally, we aimed to describe and compare experiences and perpetration of IPV of youth aged 16–24 by sexual orientation and gender identity (SOGI). Methods During the study period (December 2021-May 2022), youth aged 16–24 from eThekwini district, South Africa completed an online survey to understand multilevel impacts of the pandemic on youth. Participants were asked about experiences and perpetration of physical IPV since the start of the COVID-19 pandemic (March 2020). Descriptive statistics and adjusted logistic regressions compared the likelihood of experiencing and/or perpetrating physical IPV between cisgender and transgender inclusive heterosexual men; heterosexual women; gay, bisexual, or questioning men [GBQM]; lesbian, gay, bisexual, or questioning women [LGBQW]; or gender/sexual non-conforming youth [non-conforming]. Results Of 1,588 youth (mean age = 21.7 [SD = 2.3]; 71.7% Black) with non-missing SOGI and physical IPV data, 238 (15.0%) were LGBTQ+ (40.3% LGBQW and 36.1% non-conforming). Overall, 14.6% of respondents experienced physical IPV and 9.8% perpetrated physical IPV since the start of the pandemic, which differed by SOGI (12.3% of heterosexual men, 13.9% of heterosexual women, 22.0% of GBQM, 18.2% of LGBQW, and 25.0% of non-conforming youth experienced and 10.3% of heterosexual men; 7.7% of heterosexual women; 10.0% of GBQM; 18.2% of LGBQW; and 16.7% of non-conforming youth perpetrated). In adjusted models, compared to heterosexual women, non-conforming youth had increased odds of experiencing (adjusted odds ratio [aOR] = 2.36; 95%CI, 1.26–4.39) physical IPV and compared to heterosexual men, non-conforming youth had greater odds of perpetrating physical IPV (aOR = 2.19; 95%CI, 1.07–4.48) during the pandemic. Conclusion Over one in six youth in our study experienced and one in ten perpetrated physical IPV since the onset of the COVID-19 pandemic, with gender and sexual non-conforming youth experiencing and perpetrating IPV at significantly greater rates than cisgender/heterosexual peers. Our findings highlight the need for gender transformative efforts that move beyond the gender binary to support healthy relationships and IPV prevention for LGBTQ + youth in South Africa and globally.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Rothenberger, Liane, und Valerie Hase. „Key issue (Terrorism Coverage)“. DOCA - Database of Variables for Content Analysis, 26.03.2021. http://dx.doi.org/10.34778/2u.

Der volle Inhalt der Quelle
Annotation:
“Key issue” describes the main issue or perspective an article focuses on when reporting on a news topic. There might be different key issues for the same topic: When reporting on terrorism, articles can for example concentrate on the incident itself, the perpetrator behind it, victims and/or political reactions to terrorism. Field of application/theoretical foundation: Key issues share similarities with other variables such as news “frames”, “issue salience” or “issue ownership” that also try to identify different perspectives for the same or different news topics. Therefore, studies based on “Framing” (Entman, 1993) work with similar variables to analyze what issues journalists focus on and many studies cited here use the concept of framing to identify key issues, for example Li (2007) or Zhang & Hellmüller (2016). References/combination with other methods of data collection: Studies for example combine content analysis and interviews with journalists to shed more light on dynamics and structures of terrorism coverage, including key issues (Larsen, 2019). Example studies: Li (2007); Matthews (2016) Information on Li, 2007 Authors: Li (2007) Research question: How did television outlets frame 9/11 during the first 24 hours of coverage and how did this framing change over time? Object of analysis: News coverage by five TV outlets (ABC, CBS, NBC, CNN, and FOX news) Time frame of analysis: 24 hours after attacks on September 9 2001 occurred Info about variables Variable name/definition: Coverage frame: “The coverage frame is defined as the aspects of a perceived reality identified through a story that makes these aspects more salient in the news coverage” (Li, 2007, p. 676). Level of analysis: News story (TV) Variables and values: Political coverage frame, economic coverage frame, criminal coverage frame, environment coverage frame, safety coverage frame, human interest coverage frame, religion coverage frame, disaster coverage frame, other coverage frame Reliability: Scott’s pi: .8 Information on Matthews, 2016 Authors: Matthews (2016) Research question: How did newspapers react in the immediate aftermath of the London bombings 2005? Object of analysis: News coverage by nine UK newspapers and their Sunday equivalents (The Star, The Sun, Daily Mail, Daily Mirror, Daily Express, The Times, The Telegraph, The Guardian and The Independent) Time frame of analysis: July 8 2005 to July 15 2005 Info about variables Variable name/definition: Story themes Level of analysis: News article Variables and values: Reconstruction and reaction, bombers’ identities, police investigation, victims/the missing, heroism and survivors, London’s reaction Table 1. Measurement of “Key Issue” in terrorism coverage. Author(s) Sample Manifestations Reliability Codebook An et al. (2018) Articles from terrorist websites 31 different key issues, ranging from terrorist attacks to their political consequences Average Holsti value for all pairwise comparisons: .66 Available Du & Li (2017) Online news articles 6 different key issues, including “description and updates of the incident itself”, “causes of the incident”, “consequences of the incident”, “conflicting viewpoint related to the incident”, “condemn the terrorist behavior and discuss the punishment/reprisal”, and “background/history knowledge of the incident areas” Scott’s pi for all variables in study: between .798 and 1 Available Haußecker & Jirschitzka, 2010; Jirschitzka et al., 2010 Broadcasting programs 11 different key issues, ranging from war against terror to communication of terrorists Average Holsti value for all pairwise comparisons with five coders and one main coder: .66 Available Larsen (2019) Broadcasting programs and online news articles 3 different key issues, including “threat of terrorism”, “countering and prevention”, and ”terrorism as phenomenon” Cohen’s kappa: .782 Available Li (2007) Broadcasting programs 9 different key issues, including “political”, “economic”, “criminal”, “environment”, “safety”, “human interest”, “religion”, “disaster”, and “other” coverage frame Scott’s pi: .8 Not available Li & Izard (2003) Broadcasting programs and news articles 10 different key issues, including “business”, “World Trade Center”, “Pentagon”, “safety (concerning future attacks)”, “government and U.S. president, “criminal activity and terrorism,” “personal story”, “American public”, “U.S. Arab community”, and “past events” Scott’s pi for all nominal variables in study: between .78 and .96 Not available Matthews (2016) Newspaper articles 6 different key issues, including “reconstruction and reaction”, “bombers’ identities”, “police investigation”, “victims/the missing”, “heroism and survivors”, and “London’s reaction” Not reported Not available Zhang & Hellmüller (2016) Online news articles 8 key issues, sorted in the overarching categories “geopolitics” (consisting of “failing state”, “political opportunism”, “strategic game”, “geopolitical alignment”) and “existential threat” (consisting of “ISIS prowess”, “human rights crisis”, “economic consequences”, and “ISIS propaganda”) Krippendorf’s alpha: .73 Available References An, Y., Mejía, N. A., Arizi, A., Villalobos, M. M, & Rothenberger, L. (2018). Perpetrators’ strategic communication: Framing and identity building on ethno-nationalist terrorists’ websites. Communications, 43(2), 133–171. doi:10.1515/commun-2017-0057 Du, Y. R., & Li, L. (2017). When press freedom meets national interest: How terrorist attacks are framed in the news in China and the US. Global Media and China, 2(3–4), 284–302. doi:10.1177/2059436418755761 Entman, R. M. (1993). Framing: Toward clarification of a fractured paradigm. Journal of Communication, 43(4), 51-58. doi:10.1111/j.1460-2466.1993.tb01304.x Haußecker, N., & Jirschitzka, J. (2010). Mediale Konstruktion I: Methodisches Vorgehen—Inhaltsanalyse der Terrorberichterstattung in deutschen Fernsehnachrichten [Media construction I: Methods – content analysis of terrorism coverage in German TV news]. In W. Frindte & N. Haußecker (Eds.), Inszenierter Terrorismus [Staged terrorism] (pp. 67–89). VS Verlag für Sozialwissenschaften. Jirschitzka, J., Haußecker, N., & Frindte, W. (2010). Mediale Konstruktion II: Die Konstruktion des Terrorismus im deutschen Fernsehen – Ergebnisdarstellung und Interpretation. [Media construction II: the construction of terrorism in German TV - results and interpretation]. In W. Frindte & N. Haußecker (Eds.), Inszenierter Terrorismus [Staged terrorism] (pp. 81–119). Wiesbaden: VS Verlag für Sozialwissenschaften. Larsen, A. G. (2019). Threatening criminals and marginalized individuals: Frames and news conventions in reporting of radicalization and violent extremism. Media, War & Conflict, 12(3), 299–316. doi:10.1177/1750635218769331 Li, X. (2007). Stages of a crisis and media frames and functions: U.S. television coverage of the 9/11 incident during the first 24 hours. Journal of Broadcasting & Electronic Media, 51(4), 670–687. doi:10.1080/08838150701626578 Li, X., & Izard, R. (2003). 9/11 Attack coverage reveals similarities, differences. Newspaper Research Journal, 24(1), 204–219. oi:10.1177/073953290302400123 Matthews, J. (2016). Media performance in the aftermath of terror: Reporting templates, political ritual and the UK press coverage of the London Bombings, 2005. Journalism, 17(2), 173–189. doi:10.1177/1464884914554175 Zhang, X., & Hellmüller, L. (2016). Transnational media coverage of the ISIS threat: A global perspective? International Journal of Communication, 10, 766–785.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Döring, Nicola, und Roberto Walter. „Alcohol Portrayals on Social Media (Social Media)“. DOCA - Database of Variables for Content Analysis, 27.05.2022. http://dx.doi.org/10.34778/5h.

Der volle Inhalt der Quelle
Annotation:
The depiction of alcohol is the focus of a growing number of content analyses in the field of social media research. Typically, the occurrence and nature of alcohol representations are coded to measure the prevalence, normalization, or even glorification of alcohol and its consumption on different social media platforms (Moreno et al., 2016; Westgate & Holliday, 2016) and smartphone apps (Ghassemlou et al., 2020). But social media platforms and smartphone apps also play a role in the prevention of alcohol abuse when they disseminate messages about alcohol risks and foster harm reduction, abstinence, and sobriety (Davey, 2021; Döring & Holz, 2021; Tamersoy et al., 2015; Westgate & Holliday, 2016). Field of application/theoretical foundation: Social Cognitive Theory (SCT; Bandura 1986, 2009) as the dominant media effects theory in communication science, is applicable and widely applied to social media representations of alcohol: According to SCT, positive media portayals of alcohol and attractive role models consuming alcohol can influence the audience’s relation to alcohol. That’s why positive alcohol portayals in the media are considered a public health threat as they can foster increased and risky alcohol consumption among media users in general and young people in particular. The negative health impact predicted by SCT depends on different aspects of alcohol portrayals on social media that have been traditionally coded in manual content analyses (Beullens & Schepers, 2013; Mayrhofer & Naderer, 2019; Moreno et al., 2010) and most recently by studies relying on computational methods for content analysis (e.g. Ricard & Hassanpour, 2021). Core aspects of alcohol representations on social media are: a) the type of communicator / creator of alcohol-related social media content, b) the overall valence of the alcohol portrayal, c) the people consuming alcohol, d) the alcohol consumption behaviors, e) the social contexts of alcohol consumption, f) the types and brands of consumed alcohol, g) the consequences of alcohol consumption, and h) alcohol-related consumer protection messages in alcohol marketing (Moreno et al., 2016; Westgate & Holliday, 2016). For example, a normalizing portrayal shows alcohol consumption as a regular and normal behavior of diverse people in different contexts, while a glorifying portrayal shows alcohol consumption as a behavior that is strongly related to positive effects such as having fun, enjoying social community, feeling sexy, happy, and carefree (Griffiths & Casswell, 2011). While criticism of glorifying alcohol portrayals in entertainment media (e.g., music videos; Cranwell et al., 2015), television (e.g., Barker et al., 2021), and advertising (e.g., Curtis et al., 2018; Stautz et al., 2016) has a long tradition, the concern about alcohol representations on social media is relatively new and entails the phenomenon of alcohol brands and social media influencers marketing alcohol (Critchlow & Moodie, 2022; Turnwald et al., 2022) as well as ordinary social media users providing alcohol-related self-presentations (e.g., showing themselves partying and drinking; Boyle et al., 2016). Such alcohol-related self-presentations might elicit even stronger identification and imitation effects among social media audiences compared to regular advertising (Griffiths & Casswell, 2011). Because of its psychological and health impact, alcohol-related social media content – and alcohol marketing in particular – is also an issue of legal regulation. The World Health Organization states that “Europe is the heaviest-drinking region in the world” and strongly advocates for bans or at least stricter regulations of alcohol marketing both offline and online (WHO, 2020, p. 1). At the same time, the WHO points to the problem of clearly differentiating between alcohol marketing and other types of alcohol representations on social media. Apart from normalizing and glorifying alcohol portayals, there are also anti-alcohol posts and comments on social media. They usually point to the health risks of alcohol consumption and the dangers of alcohol addiction and, hence, try to foster harm reduction, abstincence and sobriety. While such negative alcohol portayals populate different social media platforms, an in-depth investigation of the spread, scope and content of anti-alcohol messages on social media is largely missing (Davey, 2021; Döring & Holz, 2021; Tamersoy et al., 2015). References/combination with other methods of data collection: Manual and computational content analyses of alcohol representations on social media platforms can be complemented by qualitative interview and quantitative survey data addressing alcohol-related beliefs and behaviors collected from social media users who a) create and publish alcohol-related social media content and/or b) are exposed to or actively search for and follow alcohol-related social media content (e.g., Ricard & Hassanpour, 2021; Strowger & Braitman, 2022). Furthermore, experimental studies are helpful to directly measure how different alcohol-related social media posts and comments are perceived and evaluated by recipients and if and how they can affect their alcohol-related thoughts, feelings, and behaviors (Noel, 2021). Such social media experiments can build on respective mass media experiments (e.g., Mayrhofer & Naderer, 2019). Insights from content analyses help to select or create appropriate stimuli for such experiments. Last but not least, to evaluate the effectiveness of alcohol marketing regulations, social media content analyses conducted within a longitudinal or trend study design (including measurements before and after new regulations came into effect) should be preferred over cross-sectional studies (e.g., Chapoton et al., 2020). Example Studies for Manual Content Analyses: Coding Material Measure Operationalization (excerpt) Reliability Source a) Creators of alcohol-related social media content Extensive explorations on Facebook, Instagram and TikTok Creators of alcohol-related social media content on Facebook, Instagram and TikTok Polytomous variable “Type of content creator” (1: alcohol industry; 2: media organization/media professional; 3: health organization/health professional; 4: social media influencer; 5: ordinary social media user; 6: other) Not available Döring & Tröger (2018) Döring & Holz (2021) b) Valence of alcohol-related social media content N = 3 015 Facebook comments N = 100 TikTok videos Valence of alcohol-related social media content (posts or comments) Binary variable “Valence of alcohol-related social media content” (1: positive/pro-alcohol sentiment; 2: negative/anti-alcohol sentiment) Cohen’s Kappa average of .72 for all alcohol-related variables in codebook* Döring & Holz (2021) *Russell et al. (2021) c) People consuming alcohol N = 160 Facebook profiles (profile pictures, personal photos, and text) Portrayal of people consuming alcohol on Facebook profiles Binary variable “Number of persons on picture” (1: alone; 2: with others) Cohen’s Kappa > .90 Beullens & Schepers (2013) d) Alcohol consumption behaviors N = 160 Facebook profiles (profile pictures, personal photos, and text) Type of depicted alcohol use/consumption Polytomous variable “Type of depicted alcohol use/consumption” (1: explicit use such as depiction of person drinking alcohol; 2: implicit use such as depiction of alcohol bottle on table; 3: alcohol logo only) Cohen’s Kappa = .89 Beullens & Schepers (2013) N = 100 TikTok videos Multiple alcoholic drinks consumed per person Binary variable “Multiple alcoholic drinks consumed per person” as opposed to having only one drink or no drink per person (1: present; 2: not present) Cohen’s Kappa average of .72 for all alcohol-related variables in codebook Russell et al. (2021) N = 100 TikTok videos Alcohol intoxication Binary variable “Alcohol intoxication” (1: present; 2: not present) Cohen’s Kappa average of .72 for all alcohol-related variables in codebook Russell et al. (2021) N = 4 800 alcohol-related Tweets Alcohol mentioned in combination with other substance use Binary variable “Alcohol mentioned in combination with tobacco, marijuana, or other drugs” (1: yes; 2: no) Cohen’s Kappa median of .73 for all pro-drinking variables in codebook Cavazos-Rehg et al. (2015) e) Social contexts of alcohol consumption N = 192 Facebook and Instagram profiles (profile pictures, personal photos, and text) Portrayal of social evaluative contexts of alcohol consumption on Facebook and Instagram profiles Polytomous variable “Social evaluative context” (1: negative context such as someone looking disapprovingly at a drunk person; 2: neutral context such as no explicit judgment or emotion is shown; 3: positive context such as people laughing and toasting with alcoholic drinks) Cohen’s Kappa ranging from .68 to .91 for all variables in codebook Hendriks et al. (2018), based on previous work by Beullens & Schepers (2013) N = 51 episodes with a total of N = 1 895 scenes of the American adolescent drama series “The OC” Portrayal of situational contexts of alcohol consumption in scenes of a TV series Polytomous variable “Setting of alcohol consumption” (1: at home; 2: at adult / youth party; 3: in a bar; 4: at work; 5: at other public place) Polytomous variable “Reason of alcohol consumption” (1: celebrating/partying; 2: habit; 3: stress relief; 4: social facilitation) Cohen’s Kappa for setting of alcohol consumption .90 Cohen’s Kappa for reason of alcohol consumption .71 Van den Bulck et al. (2008) f) Types and brands of consumed alcohol N = 17 800 posts of Instagram influencers and related comments Portrayal of different alcohol types and alcohol brands in Instagram posts Polytomous variable “Alcohol type” (1: wine; 2: beer; 3: cocktails; 4: spirits; 5: non-alcoholic drinks/0% alcohol) Binary variable “Alcohol brand visibility” (1: present if full brand name, recognizable logo, or brand name in header or tag are visible; 2: non-present) String variable “Alcohol brand name” (open text coding) Krippendorff’s Alpha ranging from .69 to 1.00 for all variables in codebook Hendriks et al. (2019) g) Consequences of alcohol consumption N = 400 randomly selected public MySpace profiles Portayal of consequences of alcohol consumption on MySpace profiles Five individually coded binary variables for different consequences associated with alcohol use (1: present; 2: not present): a) “Positive emotional consequence highlighting positive mood, feeling or emotion associated with alcohol use” b) “Negative emotional consequence highlighting negative mood, feeling or emotion associated with alcohol use” c) “Positive social consequences highlighting perceived social gain associated with alcohol use” d) “Negative social consequences highlighting perceived poor social outcomes associated with alcohol use” e) “Negative physical consequences describing adverse physical consequences or outcomes associated with alcohol use” Cohen’s Kappa ranging from 0.76 to 0.82 for alcohol references and alcohol use Moreno et al. (2010) h) Alcohol-related consumer protection messages in alcohol marketing N = 554 Tweets collected from 13 Twitter accounts of alcohol companies in Ireland Alcohol-related consumer protection messages in alcohol marketing (covers both mandatory and voluntary messages depending on national legislation) Four individually coded binary variables for different alcohol-related consumer protection messages in alcohol marketing (1: present; 2: not present): a) “Warning about the risks/danger of alcohol consumption” b) “Warning about the risks/danger of alcohol consumption when pregnant” c) “Warning about the link between alcohol consumption and fatal cancers” d) “Link/reference to website with public health information about alcohol” Not available Critchlow & Moodie (2022) The presented measures were developed for specific social media platforms, but are so generic that they can be used across different social media platforms and even across mass media channels such as TV, cinema, and advertisement. The presented measures cover different aspects of media portrayals of alcohol and can be used individually or in combination. Depending on the research aim, more detailed measures can be developed and added: for example, regarding the media portrayal of people consuming alcohol, additional measures can code people’s age, gender, ethnicity and further characteristics relevant to the respective research question. In the course of a growing body of content analyses addressing alcohol-related prevention messages on social media, respective measures can be added as well. References Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice-Hall. Bandura, A. (2009). Social cognitive theory of mass communication. In J. Bryant & M. B. Oliver (Eds.), Communication series. Media effects: Advances in theory and research (3rd ed., pp. 94–124). Routledge. Barker, A. B., Britton, J., Thomson, E., & Murray, R. L. (2021). Tobacco and alcohol content in soap operas broadcast on UK television: A content analysis and population exposure. Journal of Public Health (Oxford, England), 43(3), 595–603. https://doi.org/10.1093/pubmed/fdaa091 Boyle, S. C., LaBrie, J. W., Froidevaux, N. M., & Witkovic, Y. D. (2016). Different digital paths to the keg? How exposure to peers' alcohol-related social media content influences drinking among male and female first-year college students. Addictive Behaviors, 57, 21–29. https://doi.org/10.1016/j.addbeh.2016.01.011 Beullens, K., & Schepers, A. (2013). Display of alcohol use on Facebook: A content analysis. Cyberpsychology, Behavior and Social Networking, 16(7), 497–503. https://doi.org/10.1089/cyber.2013.0044 Cavazos-Rehg, P. A., Krauss, M. J., Sowles, S. J., & Bierut, L. J. (2015). "Hey everyone, I'm drunk." An evaluation of drinking-related Twitter chatter. Journal of Studies on Alcohol and Drugs, 76(4), 635–643. https://doi.org/10.15288/jsad.2015.76.635 Chapoton, B., Werlen, A.‑L., & Regnier Denois, V. (2020). Alcohol in TV series popular with teens: A content analysis of TV series in France 22 years after a restrictive law. European Journal of Public Health, 30(2), 363–368. https://doi.org/10.1093/eurpub/ckz163 Cranwell, J., Murray, R., Lewis, S., Leonardi-Bee, J., Dockrell, M., & Britton, J. (2015). Adolescents' exposure to tobacco and alcohol content in YouTube music videos. Addiction (Abingdon, England), 110(4), 703–711. https://doi.org/10.1111/add.12835 Critchlow, N., & Moodie, C. (2022). Consumer protection messages in alcohol marketing on Twitter in Ireland: A content analysis. Drugs: Education, Prevention and Policy, 1–8. https://doi.org/10.1080/09687637.2022.2028730 Curtis, B. L., Lookatch, S. J., Ramo, D. E., McKay, J. R., Feinn, R. S., & Kranzler, H. R. (2018). Meta-analysis of the association of alcohol-related social media use with alcohol consumption and alcohol-related problems in adolescents and young adults. Alcoholism, Clinical and Experimental Research, 42(6), 978–986. https://doi.org/10.1111/acer.13642 Davey, C. (2021). Online sobriety communities for women's problematic alcohol use: A mini review of existing qualitative and quantitative research. Frontiers in Global Women's Health, 2, 773921. https://doi.org/10.3389/fgwh.2021.773921 Döring, N., & Tröger, C. (2018). Zwischenbericht: Durchführung und Ergebnisse der summativen Evaluation des Facebook-Kanals „Alkohol? Kenn dein Limit.“ [Intermediate report: Implementation and results of the summative evaluation of the Facebook channel "Alcohol? Know your limit."]. Döring, N., & Holz, C. (2021). Alkohol in sozialen Medien: Wo ist der Platz für Prävention? [Alcohol in social media: Where is the space for prevention?]. Bundesgesundheitsblatt, Gesundheitsforschung, Gesundheitsschutz, 64(6), 697–706. https://doi.org/10.1007/s00103-021-03335-8 Ghassemlou, S., Marini, C., Chemi, C., Ranjit, Y. S., & Tofighi, B. (2020). Harmful smartphone applications promoting alcohol and illicit substance use: A review and content analysis in the United States. Translational Behavioral Medicine, 10(5), 1233–1242. https://doi.org/10.1093/tbm/ibz135 Griffiths, R., & Casswell, S. (2010). Intoxigenic digital spaces? Youth, social networking sites and alcohol marketing. Drug and Alcohol Review, 29(5), 525–530. https://doi.org/10.1111/j.1465-3362.2010.00178.x Hendriks, H., van den Putte, B., Gebhardt, W. A., & Moreno, M. A. (2018). Social drinking on social media: Content analysis of the social aspects of alcohol-related posts on Facebook and Instagram. Journal of Medical Internet Research, 20(6), e226. https://doi.org/10.2196/jmir.9355 Hendriks, H., Wilmsen, D., van Dalen, W., & Gebhardt, W. A. (2019). Picture me drinking: Alcohol-related posts by Instagram influencers popular among adolescents and young adults. Frontiers in Psychology, 10, 2991. https://doi.org/10.3389/fpsyg.2019.02991 Mayrhofer, M., & Naderer, B. (2019). Mass media as alcohol educator for everyone? Effects of portrayed alcohol consequences and the influence of viewers’ characteristics. Media Psychology, 22(2), 217–243. https://doi.org/10.1080/15213269.2017.1378112 Moreno, M. A., Briner, L. R., Williams, A., Brockman, L., Walker, L., & Christakis, D. A. (2010). A content analysis of displayed alcohol references on a social networking web site. The Journal of Adolescent Health: Official Publication of the Society for Adolescent Medicine, 47(2), 168–175. https://doi.org/10.1016/j.jadohealth.2010.01.001 Moreno, M. A., D’Angelo, J., & Whitehill, J. (2016). Social media and alcohol: Summary of research, intervention ideas and future study directions. Media and Communication, 4(3), 50–59. https://doi.org/10.17645/mac.v4i3.529 Noel, J. K. (2021). Using social media comments to reduce alcohol purchase intentions: An online experiment. Drug and Alcohol Review, 40(6), 1047–1055. https://doi.org/10.1111/dar.13262 Ricard, B. J., & Hassanpour, S. (2021). Deep learning for identification of alcohol-related content on social media (Reddit and Twitter): Exploratory analysis of alcohol-related outcomes. Journal of Medical Internet Research, 23(9), e27314. https://doi.org/10.2196/27314 Russell, A. M., Davis, R. E., Ortega, J. M., Colditz, J. B., Primack, B., & Barry, A. E. (2021). #Alcohol: Portrayals of alcohol in top videos on TikTok. Journal of Studies on Alcohol and Drugs, 82(5), 615–622. https://doi.org/10.15288/jsad.2021.82.615 Stautz, K., Brown, K. G., King, S. E., Shemilt, I., & Marteau, T. M. (2016). Immediate effects of alcohol marketing communications and media portrayals on consumption and cognition: A systematic review and meta-analysis of experimental studies. BMC Public Health, 16, 465. https://doi.org/10.1186/s12889-016-3116-8 Strowger, M., & Braitman, A. L. (2022). Using social network methodology to examine the effects of exposure to alcohol-related social media content on alcohol use: A critical review. Experimental and Clinical Psychopharmacology. Advance online publication. https://doi.org/10.1037/pha0000561 Tamersoy, A., Choudhury, M. de, & Chau, D. H. (2015). Characterizing smoking and drinking abstinence from social media. HT '15: The Proceedings of the 26th ACM Conference on Hypertext and Social Media, 2015, 139–148. https://doi.org/10.1145/2700171.2791247 Turnwald, B. P., Anderson, K. G., Markus, H. R., & Crum, A. J. (2022). Nutritional analysis of foods and beverages posted in social media accounts of highly followed celebrities. JAMA Network Open, 5(1), e2143087. https://doi.org/10.1001/jamanetworkopen.2021.43087 Van den Bulck, H., Simons, N., & van Gorp, B. (2008). Let's drink and be merry: The framing of alcohol in the prime-time American youth series The OC. Journal of Studies on Alcohol and Drugs, 69(6), 933–940. https://doi.org/10.15288/jsad.2008.69.933 Westgate, E. C., & Holliday, J. (2016). Identity, influence, and intervention: The roles of social media in alcohol use. Current Opinion in Psychology, 9, 27–32. https://doi.org/10.1016/j.copsyc.2015.10.014 World Health Organization Regional Office for Europe (WHO). (2020). Alcohol marketing in the WHO European Region: update report on the evidence and recommended policy actions. https://apps.who.int/iris/bitstream/handle/10665/336178/WHO-EURO-2020-1266-41016-55678-eng.pdf?sequence=1&isAllowed=y
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Franks, Rachel. „Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”“. M/C Journal 20, Nr. 2 (26.04.2017). http://dx.doi.org/10.5204/mcj.1214.

Der volle Inhalt der Quelle
Annotation:
IntroductionAccounts of criminals, their victims, and their pursuers have become entrenched within the sphere of popular culture; most obviously in the genres of true crime and crime fiction. The centrality of the pursuer in the form of the detective, within these stories, dates back to the nineteenth century. This, often highly-stylised and regularly humanised protagonist, is now a firm feature of both factual and fictional accounts of crime narratives that, today, regularly focus on the energies of the detective in solving a variety of cases. So familiar is the figure of the detective, it seems that these men and women—amateurs and professionals—have always had an important role to play in the pursuit and punishment of the wrongdoer. Yet, the first detectives were forced to overcome significant resistance from a suspicious public. Some early efforts to reimagine punishment and to laud the detective include articles written by Charles Dickens; pieces on public hangings and policing that reflect the great Victorian novelist’s commitment to shed light on, through written commentaries, a range of important social issues. This article explores some of Dickens’s lesser-known pieces, that—appearing in daily newspapers and in one of his own publications Household Words—helped to change some common perceptions of punishment and policing. Image 1: Harper's Magazine 7 December 1867 (Charles Dickens Reading, by Charles A. Barry). Image credit: United States Library of Congress Prints and Photographs Division. A Reliance on the Scaffold: Early Law Enforcement in EnglandCrime control in 1720s England was dependent upon an inconsistent, and by extension ineffective, network of constables and night watchmen. It would be almost another three decades before Henry Fielding established the Bow Street Foot Patrol, or Bow Street Runners, in 1749, “six men in blue coats, patrolling the area within six miles of Charing Cross” (Worsley 35). A large-scale, formalised police force was attempted by Pitt the Younger in 1785 with his “Bill for the Further prevention of Crime and for the more Speedy Detection and Punishment of Offenders against the Peace” (Lyman 144). The proposed legislation was withdrawn due to fierce opposition that was underpinned by fears, held by officials, of a divestment of power to a new body of law enforcers (Lyman 144).The type of force offered in 1785 would not be realised until the next century, when the work of Robert Peel saw the passing of the Metropolitan Police Act 1829. The Police Act, which “constituted a revolution in traditional methods of law enforcement” (Lyman 141), was focused on the prevention of crime, “to reassure the lawful and discourage the wrongdoer” (Hitchens 51). Until these changes were implemented violent punishment, through the Waltham Black Act 1723, remained firmly in place (Cruickshanks and Erskine-Hill 359) as part of the state’s arsenal against crime (Pepper 473).The Black Act, legislation often referred to as the ‘Bloody Code’ as it took the number of capital felonies to over 350 (Pepper 473), served in lieu of consistency and cooperation, across the country, in relation to the safekeeping of the citizenry. This situation inevitably led to anxieties about crime and crime control. In 1797 Patrick Colquhoun, a magistrate, published A Treatise on the Police of the Metropolis in which he estimated that, out of a city population of just under 1 million, 115,000 men and women supported themselves “in and near the Metropolis by pursuits either criminal-illegal-or immoral” (Lyman 144). Andrew Pepper highlights tensions between “crime, governance and economics” as well as “rampant petty criminality [… and] widespread political corruption” (474). He also notes a range of critical responses to crime and how, “a particular kind of writing about crime in the 1720s demonstrated, perhaps for the first time, an awareness of, or self-consciousness about, this tension between competing visions of the state and state power” (Pepper 474), a tension that remains visible today in modern works of true crime and crime fiction. In Dickens’s day, crime and its consequences were serious legal, moral, and social issues (as, indeed, they are today). An increase in the crime rate, an aggressive state, the lack of formal policing, the growth of the printing industry, and writers offering diverse opinions—from the sympathetic to the retributive—on crime changed crime writing. The public wanted to know about the criminal who had disturbed society and wanted to engage with opinions on how the criminal should be stopped and punished. The public also wanted to be updated on changes to the judicial system such as the passing of the Judgement of Death Act 1823 which drastically reduced the number of capital crimes (Worsley 122) and how the Gaols Act, also of 1823, “moved tentatively towards national prison reform” (Gattrell 579). Crimes continued to be committed and alongside the wrongdoers were readers that wanted to be diverted from everyday events by, but also had a genuine need to be informed about, crime. A demand for true crime tales demonstrating a broader social need for crimes, even the most minor infractions, to be publicly punished: first on the scaffold and then in print. Some cases were presented as sensationalised true crime tales; others would be fictionalised in short stories and novels. Standing Witness: Dickens at the ScaffoldIt is interesting to note that Dickens witnessed at least four executions in his lifetime (Simpson 126). The first was the hanging of a counterfeiter, more specifically a coiner, which in the 1800s was still a form of high treason. The last person executed for coining in England was in early 1829; as Dickens arrived in London at the end of 1822, aged just 10-years-old (Simpson 126-27) he would have been a boy when he joined the crowds around the scaffold. Many journalists and writers who have documented executions have been “criticised for using this spectacle as a source for generating sensational copy” (Simpson 127). Dickens also wrote about public hangings. His most significant commentaries on the issue being two sets of letters: one set published in The Daily News (1846) and a second set published in The Times (1849) (Brandwood 3). Yet, he was immune from the criticism directed at so many other writers, in large part, due to his reputation as a liberal, “social reformer moved by compassion, but also by an antipathy toward waste, bureaucratic incompetence, and above all toward exploitation and injustice” (Simpson 127). As Anthony Simpson points out, Dickens did not sympathise with the condemned: “He wrote as a realist and not a moralist and his lack of sympathy for the criminal was clear, explicit and stated often” (128). Simpson also notes that Dickens’s letters on execution written in 1846 were “strongly supportive of total abolition” while later letters, written in 1849, presented arguments against public executions rather than the practice of execution. In 1859 Dickens argued against pardoning a poisoner. While in 1864 he supported the execution of the railway carriage murderer Franz Müller, explaining he would be glad to abolish both public executions and capital punishment, “if I knew what to do with the Savages of civilisation. As I do not, I would rid Society of them, when they shed blood, in a very solemn manner” (in Simpson 138-39) that is, executions should proceed but should take place in private.Importantly, Dickens was consistently concerned about society’s fascination with the scaffold. In his second letter to The Daily News, Dickens asks: round what other punishment does the like interest gather? We read of the trials of persons who have rendered themselves liable to transportation for life, and we read of their sentences, and, in some few notorious instances, of their departure from this country, and arrival beyond the sea; but they are never followed into their cells, and tracked from day to day, and night to night; they are never reproduced in their false letters, flippant conversations, theological disquisitions with visitors, lay and clerical […]. They are tried, found guilty, punished; and there an end. (“To the Editors of The Daily News” 6)In this passage, Dickens describes an overt curiosity with those criminals destined for the most awful of punishments. A curiosity that was put on vile display when a mob gathered on the concourse to watch a hanging; a sight which Dickens readily admitted “made [his] blood run cold” (“Letter to the Editor” 4).Dickens’s novels are grand stories, many of which feature criminals and criminal sub-plots. There are, for example, numerous criminals, including the infamous Fagin in Oliver Twist; or, The Parish Boy’s Progress (1838); several rioters are condemned to hang in Barnaby Rudge: A Tale of the Riots of Eighty (1841); there is murder in The Life and Adventures of Martin Chuzzlewit (1844); and murder, too, in Bleak House (1853). Yet, Dickens never wavered in his revulsion for the public display of the execution as revealed in his “refusal to portray the scene at the scaffold [which] was principled and heartfelt. He came, reluctantly to support capital punishment, but he would never use its application for dramatic effect” (Simpson 141).The Police Detective: A Public Relations ExerciseBy the mid-1700s the crime story was one of “sin to crime and then the gallows” (Rawlings online): “Crimes of every defcription (sic) have their origin in the vicious and immoral habits of the people” (Colquhoun 32). As Philip Rawlings notes, “once sin had been embarked upon, capture and punishment followed” (online). The origins of this can be found in the formula relied upon by Samuel Smith in the seventeenth century. Smith was the Ordinary of Newgate, or prison chaplain (1676–1698), who published Accounts of criminals and their gruesome ends. The outputs swelled the ranks of the already burgeoning market of broadsides, handbills and pamphlets. Accounts included: 1) the sermon delivered as the prisoner awaited execution; 2) a brief overview of the crimes for which the prisoner was being punished; and 3) a reporting of the events that surrounded the execution (Gladfelder 52–53), including the prisoner’s behaviour upon the scaffold and any last words spoken. For modern readers, the detective and the investigation is conspicuously absent. These popular Accounts (1676–1772)—over 400 editions offering over 2,500 criminal biographies—were only a few pence a copy. With print runs in the thousands, the Ordinary earnt up to £200 per year for his efforts (Emsley, Hitchcock, and Shoemaker online). For:penitence and profit made comfortable bedfellows, ensuring true crime writing became a firm feature of the business of publishing. That victims and villains suffered was regrettable but no horror was so terrible anyone forgot there was money to be made. (Franks, “Stealing Stories” 7)As the changes brought about by the Industrial Revolution were having their full impact, many were looking for answers, and certainty, in a period of radical social transformation. Sin as a central motif in crime stories was insufficient: the detective was becoming essential (Franks, “True Crime” 239). “In the nineteenth century, the role of the newly-fashioned detective as an agent of consolation or security is both commercially and ideologically central to the subsequent project of popular crime writing” (Bell 8). This was supported by an “increasing professionalism and proficiency of policemen, detectives, and prosecutors, new understandings about psychology, and advances in forensic science and detection techniques” (Murley 10). Elements now included in most crime narratives. Dickens insisted that the detective was a crucial component of the justice system—a figure to be celebrated, one to take centre stage in the crime story—reflecting his staunch support “of the London Metropolitan Police” (Simpson 140). Indeed, while Dickens is known principally for exposing wretched poverty, he was also interested in a range of legal issues as can be evinced from his writings for Household Words. Image 2: Household Words 27 July 1850 (Front Page). Image credit: Dickens Journals Online. W.H. Wills argued for the acceptance of the superiority of the detective when, in 1850, he outlined the “difference between a regular and a detective policeman” (368). The detective must, he wrote: “counteract every sort of rascal whose only means of existence it avowed rascality, but to clear up mysteries, the investigation of which demands the utmost delicacy and tact” (368). The detective is also extraordinarily efficient; cases are solved quickly, in one example a matter is settled in just “ten minutes” (369).Dickens’s pro-police pieces, included a blatantly promotional, two-part work “A Detective Police Party” (1850). The narrative begins with open criticism of the Bow Street Runners contrasting these “men of very indifferent character” to the Detective Force which is “so well chosen and trained, proceeds so systematically and quietly, does its business in such a workman-like manner, and is always so calmly and steadily engaged in the service of the public” (“Police Party, Part I” 409). The “party” is just that: a gathering of detectives and editorial staff. Men in a “magnificent chamber”, seated at “a round table […] with some glasses and cigars arranged upon it; and the editorial sofa elegantly hemmed in between that stately piece of furniture and the wall” (“Police Party, Part I” 409). Two inspectors and five sergeants are present. Each man prepared to share some of their experiences in the service of Londoners:they are, [Dickens tells us] one and all, respectable-looking men; of perfectly good deportment and unusual intelligence; with nothing lounging or slinking in their manners; with an air of keen observation, and quick perception when addressed; and generally presenting in their faces, traces more or less marked of habitually leading lives of strong mental excitement. (“Police Party, Part I” 410) Dickens goes to great lengths to reinforce the superiority of the police detective. These men, “in a glance, immediately takes an inventory of the furniture and an accurate sketch of the editorial presence” and speak “very concisely, and in well-chosen language” and who present as an “amicable brotherhood” (“Police Party, Part I” 410). They are also adaptable and constantly working to refine their craft, through apeculiar ability, always sharpening and being improved by practice, and always adapting itself to every variety of circumstances, and opposing itself to every new device that perverted ingenuity can invent, for which this important social branch of the public service is remarkable! (“Police Party, Part II” 459)These detectives are also, in some ways, familiar. Dickens’s offerings include: a “shrewd, hard-headed Scotchman – in appearance not at all unlike a very acute, thoroughly-trained schoolmaster”; a man “with a ruddy face and a high sun-burnt forehead, [who] has the air of one who has been a Sergeant in the army” (“Police Party, Part I” 409-10); and another man who slips easily into the role of the “greasy, sleepy, shy, good-natured, chuckle-headed, un-suspicious, and confiding young butcher” (“Police Party, Part II” 457). These descriptions are more than just attempts to flesh out a story; words on a page reminding us that the author is not just another journalist but one of the great voices of the Victorian era. These profiles are, it is argued here, a deliberate strategy to reassure readers.In summary, police detectives are only to be feared by those residing on the wrong side of the law. For those without criminal intent; detectives are, in some ways, like us. They are people we already know and trust. The stern but well-meaning, intelligent school teacher; the brave and loyal soldier defending the Empire; and the local merchant, a person we see every day. Dickens provides, too, concrete examples for how everyone can contribute to a safer society by assisting these detectives. This, is perfect public relations. Thus, almost singlehandedly, he builds a professional profile for a new type of police officer. The problem (crime) and its solution (the detective) neatly packaged, with step-by-step instructions for citizens to openly support this new-style of constabulary and so achieve a better, less crime-ridden community. This is a theme pursued in “Three Detective Anecdotes” (1850) where Dickens continued to successfully merge “solid lower-middle-class respectability with an intimate knowledge of the criminal world” (Priestman 177); so, proffering the ideal police detective. A threat to the criminal but not to the hard-working and honest men, women, and children of the city.The Detective: As Fact and as FictionThese writings are also a precursor to one of the greatest fictional detectives of the English-speaking world. Dickens observes that, for these new-style police detectives: “Nothing is so common or deceptive as such appearances at first” (“Police Party, Part I” 410). In 1891, Arthur Conan Doyle would write that: “There is nothing so deceptive as an obvious fact” (78). Dickens had prepared readers for the consulting detective Sherlock Holmes: who was smarter, more observant and who had more determination to take on criminals than the average person. The readers of Dickens were, in many respects, positioned as prototypes of Dr John Watson: a hardworking, loyal Englishman. Smart. But not as smart as those who would seek to do harm. Watson needed Holmes to make the world a better place; the subscriber to Household Words needed the police detective.Another article, “On Duty with Inspector Field” (1851), profiled the “well-known hand” responsible for bringing numerous offenders to justice and sending them, “inexorably, to New South Wales” (Dickens 266). Critically this true crime narrative would be converted into a crime fiction story as Inspector Field is transformed (it is widely believed) into the imagined Inspector Bucket. The 1860s have been identified as “a period of awakening for the detective novel” (Ashley x), a predictor of which is the significant sub-plot of murder in Dickens’s Bleak House. In this novel, a murder is committed with the case taken on, and competently solved by, Bucket who is a man of “skill and integrity” a man presented as an “ideal servant” though one working for a “flawed legal system” (Walton 458). Mr Snagsby, of Bleak House, observes Bucket as a man whoseems in some indefinable manner to lurk and lounge; also, that whenever he is going to turn to the right or left, he pretends to have a fixed purpose in his mind of going straight ahead, and wheels off, sharply at the very last moment [… He] notices things in general, with a face as unchanging as the great mourning ring on his little finger, or the brooch, composed of not much diamond and a good deal of setting, which he wears in his shirt. (278) This passage, it is argued here, places Bucket alongside the men at the detective police party in Household Words. He is simultaneously superhuman in mind and manner, though rather ordinary in dress. Like the real-life detectives of Dickens’s articles; he is a man committed to keeping the city safe while posing no threat to law-abiding citizens. ConclusionThis article has explored, briefly, the contributions of the highly-regarded Victorian author, Charles Dickens, to factual and fictional crime writing. The story of Dickens as a social commentator is one that is familiar to many; what is less well-known is the connection of Dickens to important conversations around capital punishment and the rise of the detective in crime-focused narratives; particularly how he assisted in building the professional profile of the police detective. In this way, through fact and fiction, Dickens performed great (if under-acknowledged) public services around punishment and law enforcement: he contributed to debates on the death penalty and he helped to build trust in the radical social project that established modern-day policing.AcknowledgementsThe author offers her sincere thanks to the New South Wales Dickens Society, Simon Dwyer, and Peter Kirkpatrick. The author is also grateful to the reviewers of this article for their thoughtful comments and valuable suggestions. ReferencesAshley, Mike. “Introduction: Seeking the Evidence.” The Notting Hill Mystery. Author. Charles Warren Adams. London: The British Library, 2012. xxi-iv. Bell, Ian A. “Eighteenth-Century Crime Writing.” The Cambridge Companion to Crime Fiction. Ed. Martin Priestman. Cambridge: Cambridge UP, 2003/2006. 7-17.Brandwood, Katherine. “The Dark and Dreadful Interest”: Charles Dickens, Public Death and the Amusements of the People. MA Thesis. Washington, DC: Georgetown University, 2013. 19 Feb. 2017 <https://repository.library.georgetown.edu/bitstream/handle/10822/558266/Brandwood_georgetown_0076M_12287.pdf;sequence=1>.Collins, Philip. Dickens and Crime. London: Macmillan & Co, 1964.Cruickshanks, Eveline, and Howard Erskine-Hill. “The Waltham Black Act and Jacobitism.” Journal of British Studies 24.3 (1985): 358-65.Dickens, Charles. Oliver Twist; or, The Parish Boy’s Progress. London: Richard Bentley,1838.———. Barnaby Rudge: A Tale of the Riots of Eighty. London: Chapman & Hall, 1841. ———. The Life and Adventures of Martin Chuzzlewit. London: Chapman & Hall, 1844.———. “To the Editors of The Daily News.” The Daily News 28 Feb. 1846: 6. (Reprinted in Antony E. Simpson. Witnesses to the Scaffold. Lambertville: True Bill P, 2008. 141–149.)———. “Letter to the Editor.” The Times 14 Nov. 1849: 4. (Reprinted in Antony E. Simpson. Witnesses to the Scaffold. Lambertville: True Bill P, 2008. 149-51.)———. “A Detective Police Party, Part I.” Household Words 1.18 (1850): 409-14.———. “A Detective Police Party, Part II.” Household Words 1.20 (1850): 457-60.———. “Three Detective Anecdotes.” Household Words 1.25 (1850): 577-80.———. “On Duty with Inspector Field.” Household Words 3.64 (1851): 265-70.———. Bleak House. London: Bradbury and Evans, 1853/n.d.Doyle, Arthur Conan. “The Boscombe Valley Mystery.” The Adventures of Sherlock Holmes. London: Penguin, 1892/1981. 74–99.Emsley, Clive, Tim Hitchcock, and Robert Shoemaker. “The Proceedings: Ordinary of Newgate’s Accounts.” Old Bailey Proceedings Online, n.d. 4 Feb. 2017 <https://www.oldbaileyonline.org/static/Ordinarys-accounts.jsp>. Franks, Rachel. “True Crime: The Regular Reinvention of a Genre.” Journal of Asia-Pacific Pop Culture 1.2 (2016): 239-54. ———. “Stealing Stories: Punishment, Profit and the Ordinary of Newgate.” Refereed Proceedings of the 21st Conference of the Australasian Association of Writing Programs: Authorised Theft. Eds. Niloofar Fanaiyan, Rachel Franks, and Jessica Seymour. 2016. 1-11. 20 Mar. 2017 <http://www.aawp.org.au/publications/the-authorised-theft-papers/>.Gatrell, V.A.C. The Hanging Tree: Execution and the English People, 1770-1868. Oxford: Oxford UP, 1996.Gladfelder, Hal. Criminality and Narrative in Eighteenth-Century England. Baltimore: Johns Hopkins UP, 2001.Hitchens, Peter. A Brief History of Crime: The Decline of Order, Justice and Liberty in England. London: Atlantic Books, 2003.Lyman, J.L. “The Metropolitan Police Act of 1829.” Journal of Criminal Law, Criminology and Police Science 55.1 (1964): 141-54.Murley, Jean. The Rise of True Crime: 20th Century Murder and American Popular Culture. Westport: Praeger, 2008.Pepper, Andrew. “Early Crime Writing and the State: Jonathan Wilde, Daniel Defoe and Bernard Mandeville in 1720s London.” Textual Practice 25.3 (2011): 473-91. Priestman, Martin. “Post-War British Crime Fiction.” The Cambridge Companion to Crime Fiction. Ed. Martin Priestman. Cambridge: Cambridge UP, 2003. 173-89.Rawlings, Philip. “True Crime.” The British Criminology Conferences: Selected Proceedings, Volume 1: Emerging Themes in Criminology. Eds. Jon Vagg and Tim Newburn. London: British Society of Criminology (1998). 4 Feb. 2017 <http://www.britsoccrim.org/volume1/010.pdf>.Simpson, Antony E. Witnesses to the Scaffold: English Literary Figures as Observers of Public Executions. Lambertville: True Bill P, 2008.Walton, James. “Conrad, Dickens, and the Detective Novel.” Nineteenth-Century Fiction 23.4 (1969): 446-62.Wills, William Henry. “The Modern Science of Thief-Taking.” Household Words 1.16 (1850): 368-72.Worsley, Lucy. A Very British Murder: The Curious Story of How Crime Was Turned into Art. London: BBC Books, 2013/2014.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Pedersen, Isabel, und Kirsten Ellison. „Startling Starts: Smart Contact Lenses and Technogenesis“. M/C Journal 18, Nr. 5 (14.10.2015). http://dx.doi.org/10.5204/mcj.1018.

Der volle Inhalt der Quelle
Annotation:
On 17 January 2013, Wired chose the smart contact lens as one of “7 Massive Ideas That Could Change the World” describing a Google-led research project. Wired explains that the inventor, Dr. Babak Parviz, wants to build a microsystem on a contact lens: “Using radios no wider than a few human hairs, he thinks these lenses can augment reality and incidentally eliminate the need for displays on phones, PCs, and widescreen TVs”. Explained further in other sources, the technology entails an antenna, circuits embedded into a contact lens, GPS, and an LED to project images on the eye, creating a virtual display (Solve for X). Wi-Fi would stream content through a transparent screen over the eye. One patent describes a camera embedded in the lens (Etherington). Another mentions medical sensing, such as glucose monitoring of tears (Goldman). In other words, Google proposes an imagined future when we use contact lenses to search the Internet (and be searched by it), shop online, communicate with friends, work, navigate maps, swipe through Tinder, monitor our health, watch television, and, by that time, probably engage in a host of activities not yet invented. Often referred to as a bionic contact, the smart contact lens would signal a weighty shift in the way we work, socialize, and frame our online identities. However, speculative discussion over this radical shift in personal computing, rarely if ever, includes consideration of how the body, acting as a host to digital information, will manage to assimilate not only significant affordances, but also significant constraints and vulnerabilities. At this point, for most people, the smart contact lens is just an idea. Is a new medium of communication started when it is launched in an advertising campaign? When we Like it on Facebook? If we chat about it during a party amongst friends? Or, do a critical mass of people actually have to be using it to say it has started? One might say that Apple’s Macintosh computer started as a media platform when the world heard about the famous 1984 television advertisement aired during the American NFL Super Bowl of that year. Directed by Ridley Scott, the ad entails an athlete running down a passageway and hurling a hammer at a massive screen depicting cold war style rulers expounding state propaganda. The screen explodes freeing those imprisoned from their concentration camp existence. The direct reference to Orwell’s 1984 serves as a metaphor for IBM in 1984. PC users were made analogous to political prisoners and IBM served to represent the totalitarian government. The Mac became a something that, at the time, challenged IBM, and suggested an alternative use for the desktop computer that had previously been relegated for work rather than life. Not everyone bought a Mac, but the polemical ad fostered the idea that Mac was certainly the start of new expectations, civic identities, value-systems, and personal uses for computers. The smart contact lens is another startling start. News of it shocks us, initiates social media clicks and forwards, and instigates dialogue. But, it also indicates the start of a new media paradigm that is already undergoing popular adoption as it is announced in mainstream news and circulated algorithmically across media channels. Since 2008, news outlets like CNN, The New York Times, The Globe and Mail, Asian International News, United News of India, The Times of London and The Washington Post have carried it, feeding the buzz in circulation that Google intends. Attached to the wave of current popular interest generated around any technology claiming to be “wearable,” a smart contact lens also seems surreptitious. We would no longer hold smartphones, but hide all of that digital functionality beneath our eyelids. Its emergence reveals the way commercial models have dramatically changed. The smart contact lens is a futuristic invention imagined for us and about us, but also a sensationalized idea socializing us to a future that includes it. It is also a real device that Parviz (with Google) has been inventing, promoting, and patenting for commercial applications. All of these workings speak to a broader digital culture phenomenon. We argue that the smart contact lens discloses a process of nascent posthuman adaptation, launched in an era that celebrates wearable media as simultaneously astonishing and banal. More specifically, we adopt technology based on our adaptation to it within our personal, political, medial, social, and biological contexts, which also function in a state of flux. N. Katherine Hayles writes that “Contemporary technogenesis, like evolution in general, is not about progress ... rather, contemporary technogenesis is about adaptation, the fit between organisms and their environments, recognizing that both sides of the engagement (human and technologies) are undergoing coordinated transformations” (81). This article attends to the idea that in these early stages, symbolic acts of adaptation signal an emergent medium through rhetorical processes that society both draws from and contributes to. In terms of project scope, this article contributes a focused analysis to a much larger ongoing digital rhetoric project. For the larger project, we conducted a discourse analysis on a collection of international publications concerning Babak Parviz and the invention. We searched for and collected newspaper stories, news broadcasts, YouTube videos from various sources, academic journal publications, inventors’ conference presentations, and advertising, all published between January 2008 and May 2014, generating a corpus of more than 600 relevant artifacts. Shortly after this time, Dr. Parviz, a Professor at the University of Washington, left the secretive GoogleX lab and joined Amazon.com (Mac). For this article we focus specifically on the idea of beginnings or genesis and how digital spaces increasingly serve as the grounds for emergent digital cultural phenomena that are rarely recognized as starting points. We searched through the corpus to identify a few exemplary international mainstream news stories to foreground predominant tropes in support of the claim we make that smart contacts lenses are a startling idea. Content producers deliberately use astonishment as a persuasive device. We characterize the idea of a smart contact lens cast in rhetorical terms in order to reveal how its allure works as a process of adaptation. Rhetorician and philosopher, Kenneth Burke writes that “rhetorical language is inducement to action (or to attitude)” (42). A rhetorical approach is instrumental because it offers a model to explain how we deploy, often times, manipulative meaning as senders and receivers while negotiating highly complex constellations of resources and contexts. Burke’s rhetorical theory can show how messages influence and become influenced by powerful hierarchies in discourse that seem transparent or neutral, ones that seem to fade into the background of our consciousness. For this article, we also concentrate on rhetorical devices such as ethos and the inventor’s own appeals through different modes of communication. Ethos was originally proposed by Aristotle to identify speaker credibility as a persuasive tactic. Addressed by scholars of rhetoric for centuries, ethos has been reconfigured by many critical theorists (Burke; Baumlin Ethos; Hyde). Baumlin and Baumlin suggest that “ethos describes an audience’s projection of authority and trustworthiness onto the speaker ... ethos suggests that the ethical appeal to be a radically psychological event situated in the mental processes of the audience – as belonging as much to the audience as to the actual character of a speaker” (Psychology 99). Discussed in the next section, our impression of Parviz and his position as inventor plays a dramatic role in the surfacing of the smart contact lens. Digital Rhetoric is an “emerging scholarly discipline concerned with the interpretation of computer-generated media as objects of study” (Losh 48). In an era when machine-learning algorithms become the messengers for our messages, which have become commodity items operating across globalized, capitalist networks, digital rhetoric provides a stable model for our approach. It leads us to demonstrate how this emergent medium and invention, the smart contact lens, is born amid new digital genres of speculative communication circulated in the everyday forums we engage on a daily basis. Smart Contact Lenses, Sensationalism, and Identity One relevant site for exploration into how an invention gains ethos is through writing or video penned or produced by the inventor. An article authored by Parviz in 2009 discusses his invention and the technical advancements that need to be made before the smart contact lens could work. He opens the article using a fictional and sensationalized analogy to encourage the adoption of his invention: The human eye is a perceptual powerhouse. It can see millions of colors, adjust easily to shifting light conditions, and transmit information to the brain at a rate exceeding that of a high-speed Internet connection.But why stop there?In the Terminator movies, Arnold Schwarzenegger’s character sees the world with data superimposed on his visual field—virtual captions that enhance the cyborg’s scan of a scene. In stories by the science fiction author Vernor Vinge, characters rely on electronic contact lenses, rather than smartphones or brain implants, for seamless access to information that appears right before their eyes. Identity building is made to correlate with smart contact lenses in a manner that frames them as exciting. Coming to terms with them often involves casting us as superhumans, wielding abilities that we do not currently possess. One reason for embellishment is because we do not need digital displays on the eyes, so the motive to use them must always be geared to transcending our assumed present condition as humans and society members. Consequently, imagination is used to justify a shift in human identity along a future trajectory.This passage above also instantiates a transformation from humanist to posthumanist posturing (i.e. “the cyborg”) in order to incent the adoption of smart contact lenses. It begins with the bold declarative statement, “The human eye is a perceptual powerhouse,” which is a comforting claim about our seemingly human superiority. Indexing abstract humanist values, Parviz emphasizes skills we already possess, including seeing a plethora of colours, adjusting to light on the fly, and thinking fast, indeed faster than “a high-speed Internet connection”. However, the text goes on to summon the Terminator character and his optic feats from the franchise of films. Filmic cyborg characters fulfill the excitement that posthuman rhetoric often seems to demand, but there is more here than sensationalism. Parviz raises the issue of augmenting human vision using science fiction as his contextualizing vehicle because he lacks another way to imbricate the idea. Most interesting in this passage is the inventor’s query “But why stop there?” to yoke the two claims, one biological (i.e., “The human eye is a perceptual powerhouse”) and one fictional (i.e. Terminator, Vernor Vinge characters). The query suggests, Why stop with human superiority, we may as well progress to the next level and embrace a smart contact lens just as fictional cyborgs do. The non-threatening use of fiction makes the concept seem simultaneously exciting and banal, especially because the inventor follows with a clear description of the necessary scientific engineering in the rest of the article. This rhetorical act signifies the voice of a technoelite, a heavily-funded cohort responding to global capitalist imperatives armed with a team of technologists who can access technological advancements and imbue comments with an authority that may extend beyond their fields of expertise, such as communication studies, sociology, psychology, or medicine. The result is a powerful ethos. The idea behind the smart contact lens maintains a degree of respectability long before a public is invited to use it.Parviz exhumes much cultural baggage when he brings to life the Terminator character to pitch smart contact lenses. The Terminator series of films has established the “Arnold Schwarzenegger” character a cultural mainstay. Each new film reinvented him, but ultimately promoted him within a convincing dystopian future across the whole series: The Terminator (Cameron), Terminator 2: Judgment Day (Cameron), Terminator 3: Rise of the Machines (Mostow), Terminator Salvation (McG) and Terminator Genisys (Taylor) (which appeared in 2015 after Parviz’s article). Recently, several writers have addressed how cyborg characters figure significantly in our cultural psyche (Haraway, Bukatman; Leaver). Tama Leaver’s Artificial Culture explores the way popular, contemporary, cinematic, science fiction depictions of embodied Artificial Intelligence, such as the Terminator cyborgs, “can act as a matrix which, rather than separating or demarcating minds and bodies or humanity and the digital, reinforce the symbiotic connection between people, bodies, and technologies” (31). Pointing out the violent and ultimately technophobic motive of The Terminator films, Leaver reads across them to conclude nevertheless that science fiction “proves an extremely fertile context in which to address the significance of representations of Artificial Intelligence” (63).Posthumanism and TechnogenesisOne reason this invention enters the public’s consciousness is its announcement alongside a host of other technologies, which seem like parts of a whole. We argue that this constant grouping of technologies in the news is one process indicative of technogenesis. For example, City A.M., London’s largest free commuter daily newspaper, reports on the future of business technology as a hodgepodge of what ifs: As Facebook turns ten, and with Bill Gates stepping down as Microsoft chairman, it feels like something is drawing to an end. But if so, it is only the end of the technological revolution’s beginning ... Try to look ahead ten years from now and the future is dark. Not because it is bleak, but because the sheer profusion of potential is blinding. Smartphones are set to outnumber PCs within months. After just a few more years, there are likely to be 3bn in use across the planet. In ten years, who knows – wearables? smart contact lenses? implants? And that’s just the start. The Internet of Things is projected to be a $300bn (£183bn) industry by 2020. (Sidwell) This reporting is a common means to frame the commodification of technology in globalized business news that seeks circulation as much as it does readership. But as a text, it also posits how individuals frame the future and their participation with it (Pedersen). Smart contacts appear to move along this exciting, unstoppable trajectory where the “potential is blinding”. The motive is to excite and scare. However, simultaneously, the effect is predictable. We are quite accustomed to this march of innovations that appears everyday in the morning paper. We are asked to adapt rather than question, consequently, we never separate the parts from the whole (e.g., “wearables? smart contact lenses? Implants”) in order to look at them critically.In coming to terms with Cary Wolf’s definition of posthumanism, Greg Pollock writes that posthumanism is the questioning that goes on “when we can no longer rely on ‘the human’ as an autonomous, rational being who provides an Archimedean point for knowing about the world (in contrast to “humanism,” which uses such a figure to ground further claims)” (208). With similar intent, N. Katherine Hayles formulating the term technogenesis suggests that we are not really progressing to another level of autonomous human existence when we adopt media, we are in effect, adapting to media and media are also in a process of adapting to us. She writes: As digital media, including networked and programmable desktop stations, mobile devices, and other computational media embedded in the environment, become more pervasive, they push us in the direction of faster communication, more intense and varied information streams, more integration of humans and intelligent machines, and more interactions of language with code. These environmental changes have significant neurological consequences, many of which are now becoming evident in young people and to a lesser degree in almost everyone who interacts with digital media on a regular basis. (11) Following Hayles, three actions or traits characterize adaptation in a manner germane to the technogenesis of media like smart contact lenses. The first is “media embedded in the environment”. The trait of embedding technology in the form of sensors and chips into external spaces evokes the onset of The Internet of Things (IoT) foundations. Extensive data-gathering sensors, wireless technologies, mobile and wearable components integrated with the Internet, all contribute to the IoT. Emerging from cloud computing infrastructures and data models, The IoT, in its most extreme, involves a scenario whereby people, places, animals, and objects are given unique “embedded” identifiers so that they can embark on constant data transfer over a network. In a sense, the lenses are adapted artifacts responding to a world that expects ubiquitous networked access for both humans and machines. Smart contact lenses will essentially be attached to the user who must adapt to these dynamic and heavily mediated contexts.Following closely on the first, the second point Hayles makes is “integration of humans and intelligent machines”. The camera embedded in the smart contact lens, really an adapted smartphone camera, turns the eye itself into an image capture device. By incorporating them under the eyelids, smart contact lenses signify integration in complex ways. Human-machine amalgamation follows biological, cognitive, and social contexts. Third, Hayles points to “more interactions of language with code.” We assert that with smart contact lenses, code will eventually govern interaction between countless agents in accordance with other smart devices, such as: (1) exchanges of code between people and external nonhuman networks of actors through machine algorithms and massive amalgamations of big data distributed on the Internet;(2) exchanges of code amongst people, human social actors in direct communication with each other over social media; and (3) exchanges of coding and decoding between people and their own biological processes (e.g. monitoring breathing, consuming nutrients, translating brainwaves) and phenomenological (but no less material) practices (e.g., remembering, grieving, or celebrating). The allure of the smart contact lens is the quietly pressing proposition that communication models such as these will be radically transformed because they will have to be adapted to use with the human eye, as the method of input and output of information. Focusing on genetic engineering, Eugene Thacker fittingly defines biomedia as “entail[ing] the informatic recontextualization of biological components and processes, for ends that may be medical or nonmedical (economic, technical) and with effects that are as much cultural, social, and political as they are scientific” (123). He specifies, “biomedia are not computers that simply work on or manipulate biological compounds. Rather, the aim is to provide the right conditions, such that biological life is able to demonstrate or express itself in a particular way” (123). Smart contact lenses sit on the cusp of emergence as a biomedia device that will enable us to decode bodily processes in significant new ways. The bold, technical discourse that announces it however, has not yet begun to attend to the seemingly dramatic “cultural, social, and political” effects percolating under the surface. Through technogenesis, media acclimatizes rapidly to change without establishing a logic of the consequences, nor a design plan for emergence. Following from this, we should mention issues such as the intrusion of surveillance algorithms deployed by corporations, governments, and other hegemonic entities that this invention risks. If smart contact lenses are biomedia devices inspiring us to decode bodily processes and communicate that data for analysis, for ourselves, and others in our trust (e.g., doctors, family, friends), we also need to be wary of them. David Lyon warns: Surveillance has spilled out of its old nation-state containers to become a feature of everyday life, at work, at home, at play, on the move. So far from the single all-seeing eye of Big Brother, myriad agencies now trace and track mundane activities for a plethora of purposes. Abstract data, now including video, biometric, and genetic as well as computerized administrative files, are manipulated to produce profiles and risk categories in a liquid, networked system. The point is to plan, predict, and prevent by classifying and assessing those profiles and risks. (13) In simple terms, the smart contact lens might disclose the most intimate information we possess and leave us vulnerable to profiling, tracking, and theft. Irma van der Ploeg presupposed this predicament when she wrote: “The capacity of certain technologies to change the boundary, not just between what is public and private information but, on top of that, between what is inside and outside the human body, appears to leave our normative concepts wanting” (71). The smart contact lens, with its implied motive to encode and disclose internal bodily information, needs considerations on many levels. Conclusion The smart contact lens has made a digital beginning. We accept it through the mass consumption of the idea, which acts as a rhetorical motivator for media adoption, taking place long before the device materializes in the marketplace. This occurrence may also be a sign of our “posthuman predicament” (Braidotti). We have argued that the smart contact lens concept reveals our posthuman adaptation to media rather than our reasoned acceptance or agreement with it as a logical proposition. By the time we actually squabble over the price, express fears for our privacy, and buy them, smart contact lenses will long be part of our everyday culture. References Baumlin, James S., and Tita F. Baumlin. “On the Psychology of the Pisteis: Mapping the Terrains of Mind and Rhetoric.” Ethos: New Essays in Rhetorical and Critical Theory. Eds. James S. Baumlin and Tita F. Baumlin. Dallas: Southern Methodist University Press, 1994. 91-112. Baumlin, James S., and Tita F. Baumlin, eds. Ethos: New Essays in Rhetorical and Critical Theory. Dallas: Southern Methodist University Press, 1994. Bilton, Nick. “A Rose-Colored View May Come Standard.” The New York Times, 4 Apr. 2012. Braidotti, Rosi. The Posthuman. Cambridge: Polity, 2013. Bukatman, Scott. Terminal Identity: The Virtual Subject in Postmodern Science Fiction. Durham: Duke University Press, 1993. Burke, Kenneth. A Rhetoric of Motives. Berkeley: University of California Press, 1950. Cameron, James, dir. The Terminator. Orion Pictures, 1984. DVD. Cameron, James, dir. Terminator 2: Judgment Day. Artisan Home Entertainment, 2003. DVD. Etherington, Darrell. “Google Patents Tiny Cameras Embedded in Contact Lenses.” TechCrunch, 14 Apr. 2014. Goldman, David. “Google to Make Smart Contact Lenses.” CNN Money 17 Jan. 2014. Haraway, Donna. Simians, Cyborgs and Women: The Reinvention of Nature. London: Free Association Books, 1991. Hayles, N. Katherine. How We Think: Digital Media and Contemporary Technogenesis. Chicago: University of Chicago, 2012. Hyde, Michael. The Ethos of Rhetoric. Columbia: University of South Carolina Press, 2004. Leaver, Tama. Artificial Culture: Identity, Technology, and Bodies. New York: Routledge, 2012. Losh, Elizabeth. Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes. Boston: MIT Press. 2009. Lyon, David, ed. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. New York: Routledge, 2003. Mac, Ryan. “Amazon Lures Google Glass Creator Following Phone Launch.” Forbes.com, 14 July 2014. McG, dir. Terminator Salvation. Warner Brothers, 2009. DVD. Mostow, Jonathan, dir. Terminator 3: Rise of the Machines. Warner Brothers, 2003. DVD. Parviz, Babak A. “Augmented Reality in a Contact Lens.” IEEE Spectrum, 1 Sep. 2009. Pedersen, Isabel. Ready to Wear: A Rhetoric of Wearable Computers and Reality-Shifting Media. Anderson, South Carolina: Parlor Press, 2013. Pollock, Greg. “What Is Posthumanism by Cary Wolfe (2009).” Rev. of What is Posthumanism?, by Cary Wolfe. Journal for Critical Animal Studies 9.1/2 (2011): 235-241. Sidwell, Marc. “The Long View: Bill Gates Is Gone and the Dot-com Era Is Over: It's Only the End of the Beginning.” City A.M., 7 Feb. 2014. “Solve for X: Babak Parviz on Building Microsystems on the Eye.” YouTube, 7 Feb. 2012. Taylor, Alan, dir. Terminator: Genisys. Paramount Pictures, 2015. DVD. Thacker, Eugene “Biomedia.” Critical Terms for Media Studies. Eds. W.J.T Mitchell and Mark Hansen, Chicago: Chicago Press, 2010. 117-130. Van der Ploeg, Irma. “Biometrics and the Body as Information.” Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Ed. David Lyon. New York: Routledge, 2003. 57-73. Wired Staff. “7 Massive Ideas That Could Change the World.” Wired.com, 17 Jan. 2013.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie