Journal articles on the topic 'Archives Australia Management Computer programs'

To see the other types of publications on this topic, follow the link: Archives Australia Management Computer programs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 40 journal articles for your research on the topic 'Archives Australia Management Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sanett, Shelby. "Archival Digital Preservation Programs: Staffing, Costs, and Policy." Preservation, Digital Technology & Culture 42, no. 3 (September 2013): 137–49. http://dx.doi.org/10.1515/pdtc-2013-0019.

Full text
Abstract:
AbstractA three-part longitudinal research study- conducted from 1999-2007-gathered information on management practices in national archives that were developing digital preservation programs. In the first two rounds, data was collected from surveys and interviews. The third round was an in-depth case study conducted at the National Archives of Australia (Sanett 2008). Three core areas of practice in the emerging digital preservation programs were selected for further exploration after the first round: staffing, costs, and policy. Generally, the data indicated that these three areas remained underdeveloped in archival digital preservation programs. This article discusses results of the study and is an overview of what has changed in these areas since the study ended in 2007.
APA, Harvard, Vancouver, ISO, and other styles
2

Barwick, Linda, Sharon Huebner, Lyndon Ormond-Parker, and Sally Treloyn. "Reclaiming archives: guest editorial." Preservation, Digital Technology & Culture 50, no. 3-4 (December 1, 2021): 99–104. http://dx.doi.org/10.1515/pdtc-2022-0008.

Full text
Abstract:
Abstract Highlighting perspectives from First Nations peoples whose cultural heritage is held in archives of various types, this article sets the scene for this special edition on “Reclaiming Archives.” Emerging protocols for Indigenous community engagement with archiving institutions have been driven by community demands for access, digitisation and return of archival cultural heritage records, and supported by various peak professional organisations such as the International Council on Archives, the International Council of Museums and the Indigenous Archives Collective. A complex history of exploitation, resistance and trauma surrounds First Nations cultural records created during Australia“s “Assimilation Era“ (roughly 1935-1975), and several contributions to the volume explore the implications of this colonial past for management and reclamation of such archival records today. Indeed, the authors contend that institutions today have much to learn from engagement with community members seeking to reappropriate their cultural records. The essay finishes by relating the issues outlined above to the articles presented in this issue, which provide perspectives from Australia and internationally regarding Indigenous cultural collections, with special reference to research-based collections of Indigenous music and dance.
APA, Harvard, Vancouver, ISO, and other styles
3

Liew, Chern Li, Vanessa King, and Gillian Oliver. "Social Media in Archives and Libraries: A Snapshot of Planning, Evaluation, and Preservation Decisions." Preservation, Digital Technology & Culture 44, no. 1 (March 1, 2015): 3–11. http://dx.doi.org/10.1515/pdtc-2014-0023.

Full text
Abstract:
Abstract This paper reports the findings from research which explored decision making and practices underpinning the implementation or non-adoption of social media in archives and libraries worldwide. Archives and libraries continue to face demands, whether from senior management, funding agencies, the government, or taxpayers to demonstrate accountability. Evaluation provides evidence to meet such demands and to gain, validate, or sustain support for programs and activities. Being able to show success is a key step for archives and libraries that need to rationalize or win support for the continuance of their social media efforts. Related to this are questions about whether or not there should be a preservation strategy for the content of social media as well as a plan for sustainability of infrastructure to support these activities. Our survey findings suggest that archives and libraries know that they are not necessarily choosing the evaluation methods that can best demonstrate the achievement of their intentions, and furthermore that they lack strategies and policies for preservation and sustainability.
APA, Harvard, Vancouver, ISO, and other styles
4

Putri, Friska Aldahwa. "Peran Arsiparis dalam Pengelolaan Otomasi Arsip di Era Digital." ABDI PUSTAKA: Jurnal Perpustakaan dan Kearsipan 2, no. 2 (July 4, 2022): 53–57. http://dx.doi.org/10.24821/jap.v2i2.6928.

Full text
Abstract:
Arsip mempunyai peranan yang penting bagi setiap organisasi atau institusi. Arsip merupakan suatu dokumen yang disimpan oleh lembaga yang bertanggung jawab dalam mengelola dokumen atau menyelenggarakan program kearsipan. Pengelolaan arsip yang baik bisa menunjang kegiatan administratif berjalan lebih lancar. Perkembangan teknologi yang pesat pada saat ini, serta kemunculan berbagai sistem digital membuat arsip semakin berkembang. Arsip yang disimpan dalam bentuk elektronik dapat berupa gambar, suara, video, tulisan, atau lainnya. Arsip elektronik dapat diolah dalam program komputer, disimpan dalam media penyimpanan data elektronik, dan dapat diakses dengan media elektronik. Hal ini sangat berpengaruh pada orang yang mempunyai profesi di bidang informasi, terutama arsiparis. Tujuan artikel ini untuk mendeskripsikan bagaimana arsiparis mengelola arsip di era digital. Jenis penelitian ini menggunakan pendekatan kualitatif deskriptif dengan metode literature review atau tinjauan pustaka. The Role of Archives in Archive Automation Management in the Digital Age. Archives have an essential role for every organization or institution. An archive is a document kept by an institution responsible for managing documents or organizing an archival program. Good archive management can support administrative activities to run more smoothly. The rapid development of technology at this time and the emergence of various digital systems make archives growing. Archives stored in electronic form can be in the form of images, sounds, videos, writings, or others. Electronic archives can be processed in computer programs, stored in electronic data storage media, and accessed by electronic media. This is very influential on people who have a profession in information, especially archivists. This article aims to describe how archivists manage archives in the digital era. This type of research uses a descriptive qualitative approach with a literature review method or literature review.
APA, Harvard, Vancouver, ISO, and other styles
5

Sangeeth L R, Silpa, Saji K. Mathew, and Vidyasagar Potdar. "Information Processing view of Electricity Demand Response Systems: A Comparative Study Between India and Australia." Pacific Asia Journal of the Association for Information Systems 12 (June 30, 2020): 27–63. http://dx.doi.org/10.17705/1thci.12402.

Full text
Abstract:
Abstract Background: In recent years, demand response (DR) has gained increased attention from utilities, regulators, and market aggregators to meet the growing demands of electricity. The key aspect of a successful DR program is the effective processing of data and information to gain critical insights. This study aims to identify information processing needs and capacity that interact to improve energy DR effectiveness. To this end, organizational information processing theory (OIPT) is employed to understand the role of Information Systems (IS) resources in achieving desired DR program performance. This study also investigates how information processing for DR systems differ between developing (India) and developed (Australia) countries. Method: This work adopts a case study methodology to propose a theoretical framework using OIPT for information processing in DR systems. The study further employs a comparative case data analyses between Australian and Indian DR initiatives. Results: Our cross case analysis identifies variables of value creation in designing DR programs - pricing structure for demand side participation, renewable integration at supply side, reforms in the regulatory instruments, and emergent technology. This research posits that the degree of information processing capacity mediates the influence of information processing needs on energy DR effectiveness. Further, we develop five propositions on the interaction between task based information processing needs and capacity, and their influence on DR effectiveness. Conclusions: The study generates insights on the role of IS resources that can help stakeholders in the electricity value chain to take informed and intelligent decisions for improved performance of DR programs. Recommended Citation Sangeeth L R, Silpa; Mathew, Saji K.; and Potdar, Vidyasagar (2020) "Information Processing view of Electricity Demand Response Systems: A Comparative Study Between India and Australia," Pacific Asia Journal of the Association for Information Systems: Vol. 12: Iss. 4, Article 2. DOI: 10.17705/1pais.12402 Available at: https://aisel.aisnet.org/pajais/vol12/iss4/2
APA, Harvard, Vancouver, ISO, and other styles
6

Priandika, Adhie Thyo, Afitra Tanthowi, and Donaya Pasha. "Permodelan Sistem Pembayaran SPP Berbasis Sms Gateway Pada SMK Negeri 1 Bandar Lampung." Journal of Engineering and Information Technology for Community Service 1, no. 1 (September 15, 2022): 21–25. http://dx.doi.org/10.33365/jeit-cs.v1i1.130.

Full text
Abstract:
SMK Negeri 1 Bandar Lampung is an educational institution located on Jl. Morotai Island Jl. Morotai Island No. 33, Jagabaya III, Sukarame, Bandar Lampung City, Lampung 35122, Indonesia. SMK Negeri 1 Bandar Lampung has expertise programs, namely Dressing, Catering, Information and Communication Technology, Animation and Business and Management. As for the SPP payment system at SMK Negeri 1 Bandar Lampung it is still done manually, where the Administrative Officer still uses a book to record SPP payment data. This causes SPP data storage is still in the form of archives, where data storage media like this are easy to damage or lose, and archives that accumulate make the performance of school staff not good. From this problem, the idea emerged to create a desktop-based application and an sms gateway, in which it can manage payment transaction data and provide information to parents related to tuition transactions. The methodology used in making this application is the Waterfall method. The programming language used is Java Neatbeans, the database uses MySQL and Gammu as a tool to connect the SMS Gateway. Supported by the existence of a computer at the institution. With the application of the desktop-based tuition payment information system and SMS Gateway, it is hoped that it will make it easier to manage transactions and provide information to parents
APA, Harvard, Vancouver, ISO, and other styles
7

Stuart, Katharine. "Methods, methodology and madness." Records Management Journal 27, no. 2 (July 17, 2017): 223–32. http://dx.doi.org/10.1108/rmj-05-2017-0012.

Full text
Abstract:
Purpose This paper aims to present findings from a recent study examining current records management as fit for digital government in Australia. Design/methodology/approach This paper draws on findings from the first phase of research for a postdoctoral degree. This research was collected through an online quantitative survey of government records management professionals in Australia. The survey’s purpose was to understand whether the profession has kept pace with advances in, and expectations of, digital government. Building on the findings of the survey, this paper explores the concepts of methodology and methods and applies them to current digital records management in the Australian Government. Methodology for Australian Government digital records management is contained in the 2015 Digital Continuity 2020 policy. However, measuring method proved more difficult. The researcher supplemented data published by the National Archives of Australia and the Department of Finance with data from her own research to measure the validity of methods by examining suitability of current requirements. Findings Australian Government records management professionals overwhelmingly feel requirements, organisational culture and behaviour form a barrier to implementing successful records management programs. This paper finds that the Australian Government is buying ten times more digital storage per year than the sum of all of the digital Australian Government records known. This suggests perhaps not all records are recognised. While there will always be more storage than records, the ratio should not be so inflated. Further problems are found with requirements for records management being seen as mostly paper-based and too resource intensive to be of use. This research, combined with a contemporary literature review, shows that there is an imbalance with the current methodology and methods and asks the question: Has a methodology (Digital Continuity 2020) been created without suitable and known methods being in place? Research limitations/implications The method for collecting survey data was based on self-reporting, which can lead to limitations in that the population sample may exaggerate their response or demonstrate bias. However, responses to the survey were common enough to eliminate bias. The study is based on the Australian Government; however, findings may translate to other governments. This paper presents findings from the first phase of research of a postdoctoral degree. Not all findings are presented, only those relevant to the topic. Originality/value As the Australian Government moves to become a true digital government, records management is still required to ensure accountability of government actions and decisions. However, while the government transitions to digital, and information stores continue to grow, the question of whether records management has kept up with the rapid pace of digital information flow and expansion does not need to be asked. Instead, the time has come to ask, “What can we do to keep up?”
APA, Harvard, Vancouver, ISO, and other styles
8

Dyda, Amalie, Magid Fahim, Jon Fraser, Marianne Kirrane, Ides Wong, Keith McNeil, Maree Ruge, Colleen L. Lau, and Clair Sullivan. "Managing the Digital Disruption Associated with COVID-19-Driven Rapid Digital Transformation in Brisbane, Australia." Applied Clinical Informatics 12, no. 05 (October 2021): 1135–43. http://dx.doi.org/10.1055/s-0041-1740190.

Full text
Abstract:
Abstract Background The COVID-19 pandemic has forced rapid digital transformation of many health systems. These innovations are now entering the literature, but there is little focus on the resulting disruption. Objective We describe the implementation of digital innovations during the COVID-19 response of Australia's largest health service, Metro North (in Brisbane, Queensland), the challenges of the subsequent digital disruption, how these were managed, and lessons learned. Methods Prior to the COVID-19 pandemic, the Australian state of Queensland created the Queensland Digital Clinical Charter, which provides guidance for the development of digital health programs. The guidelines utilize three horizons: digitizing workflows, leveraging digital data to transform clinical care, and reimagining new and innovative models of care. The technical response to COVID-19 in Metro North is described across these horizons. The rapid digital response caused significant disruption to health care delivery; management of the disruption and the outcomes are detailed. This is a participatory action research project, with members of the research team assisting with leading the implementation project informing the case report content. Results Several digital innovations were introduced across Metro North during the COVID-19 response. This resulted in significant disruption creating digital hypervigilance, digital deceleration, data discordance, and postdigital “depression.” Successful management of the digital disruption minimized the negative effects of rapid digital transformation, and contributed to the effective management of the pandemic in Queensland. Conclusion The rapid digital transformation in Metro North during COVID-19 was successful in several aspects; however, ongoing challenges remain. These include the need to improve data sharing and increase interoperability. Importantly, the innovations need to be evaluated to ensure that Metro North can capitalize on these changes and incorporate them into long-term routine practice. Moving forward, it will be essential to manage not only the pandemic, but increasingly, the resultant digital disruption.
APA, Harvard, Vancouver, ISO, and other styles
9

Robertson, M. J., G. J. Rebetzke, and R. M. Norton. "Assessing the place and role of crop simulation modelling in Australia." Crop and Pasture Science 66, no. 9 (2015): 877. http://dx.doi.org/10.1071/cp14361.

Full text
Abstract:
Computer-based crop simulation models (CSMs) are well entrenched as tools for a wide variety of research, development and extension applications. Despite this, critics remain and there are perceptions that CSMs have not contributed to impacts on-farm or in the research community, particularly with plant breeding. This study reviewed the literature, interviewed 45 stakeholders (modellers, institutional representatives and clients of modelling), and analysed the industry-funded project portfolio to ascertain the current state of use of CSMs in the grains industry in Australia, including scientific progress, impacts and development needs. We found that CSMs in Australia are widely used, with ~100 active and independent users, ~15 model developers, and at any one time ~10 postgraduate students, chiefly across six public research institutions. The dominant platform used is APSIM (Agricultural Production Systems Simulator). It is widely used in the agronomic domain. Several cases were documented where CSM use had a demonstrable impact on farm and research practice. The updating of both plant and soil process routines in the models has slowed and even stalled in recent years, and scientific limitations to future use were identified: the soil–plant nitrogen cycle, root growth and function, soil surface water and residue dynamics, impact of temperature extremes on plant function, and up-to-date cultivar parameter sets. There was a widespread appreciation of and optimism for the potential of CSMs to assist with plant-breeding activities, such as environmental characterisation, trait assessment, and design of plant-breeding programs. However, we found little evidence of models or model output being used by plant breeders in Australia, despite significant impacts that have emerged recently in larger international breeding programs. Closer cooperation between geneticists, physiologists and breeders will allow gene-based approaches to characterise and parameterise cultivars in CSMs, demonstrated by recent progress with phenology in wheat. This will give models the ability to deal with a wider range of potential genotype × environment × management scenarios.
APA, Harvard, Vancouver, ISO, and other styles
10

Lysenko, E., E. Polovneva, L. Timofeeva, K. Fedotovskih, V. Chistyakova, and A. Yur'eva. "Research of Educational Programs in the Trending Areas of Economics for University Integration to the International Educational Space: Case of the Ural Federal University named after the First President of Russia B.N. Yeltsin." Management of the Personnel and Intellectual Resources in Russia 11, no. 5 (November 24, 2022): 43–53. http://dx.doi.org/10.12737/2305-7807-2022-11-5-43-53.

Full text
Abstract:
The article is devoted to the monitoring study of educational programs offered by the world's leading universities in the most popular fields today: energy, computer and engineering sciences, human resource management. The master's degree programs of universities included in the QS World University Rankings and additional educational courses presented on the international Coursera platform were selected as the basis for comparative analysis. The role of internationalization in university practice is considered from the point of view of the strategic direction of development and increasing the competitiveness of the university in the world market of educational services. The features of educational programs successfully implemented in the conditions of internationalization of education in Russia and various parts of the world – Europe, Asia, America, Australia – are determined. It is revealed that the development of internationalization of Russian education takes into account the peculiarities of domestic regions and is carried out in line with global trends, which allows maintaining and developing competitiveness among foreign universities. Practical recommendations are formulated for the formation of a strategy for the integration of the Ural Federal University named after the first President of Russia B. N. Yeltsin into the international educational space, maintaining and improving its competitiveness within the framework of the internationalization of educational programs.
APA, Harvard, Vancouver, ISO, and other styles
11

Kennedy, Brooke P. A., Bonny Cumming, and Wendy Y. Brown. "Global Strategies for Population Management of Domestic Cats (Felis catus): A Systematic Review to Inform Best Practice Management for Remote Indigenous Communities in Australia." Animals 10, no. 4 (April 11, 2020): 663. http://dx.doi.org/10.3390/ani10040663.

Full text
Abstract:
Pet domestic cat (Felis catus) populations are increasing all around the world, resulting in an increase in contact with humans and wildlife, potentially spreading zoonotic diseases and predating on wildlife. With the recently identified rise in cat populations in remote Indigenous communities in Australia, culturally appropriate cat population management strategies are required. A systematic review process was conducted to review the current global cat population management practices that are suitable for owned, free-roaming cat populations in these communities. Eight articles on in-situ field cat populations and five studies simulating computer modelled cat populations reported results of 66 population management interventions. Surgical Sterilisation (SS) was used in all socialised owned cat articles. The trap–neuter–release (TNR) method was used most frequently on unsocialised cats and gained the best results when the trap–remove (TR) method was used concurrently to adopt out unwanted social cats and euthanise ill or injured cats. The results of this review suggest that long-term TNR/SS programs supplemented with TR provide the current most ethically sound best practice, humane method of managing cat populations in remote Australian Indigenous communities. It is also recognised that no one plan will fit all, and that further research on the micro-level techniques used to deploy both TNR and TR needs to occur, and that culturally appropriate community consultation during all processes is vital in achieving a sustainable management program.
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, E., T. Fernandez, M. Basheti, C. Gordon, and B. Saini. "P102 Sleep health management practices in Australian residential aged care facilities: The perspective of registered nurses." SLEEP Advances 3, Supplement_1 (October 1, 2022): A62—A63. http://dx.doi.org/10.1093/sleepadvances/zpac029.172.

Full text
Abstract:
Abstract Background Sleep disturbances are commonly experienced by older people living in residential aged care facilities. Non-pharmacological approaches have a strong evidence base, however research shows that medications (sedatives, antidepressants, antipsychotics) are often used inappropriately. However, little is known about healthcare professionals’ current sleep health management approaches in residential aged care facilities. Aims and objectives This study aimed to explore the current sleep health management practices in Australian residential aged care facilities and investigate potential ways to improve non-pharmacological and pharmacological sleep health practices in the future. Design Qualitative inductive thematic analysis of semi-structured interviews guided by COREQ guidelines. Methods Semi-structured interviews were to be conducted with registered nurses and aged care pharmacists recruited using a convenience-sampling and snowballing approach. Interviews were audio-recorded, transcribed verbatim and inductively analysed for emergent themes. Results Fourteen interviews were conducted with registered nurses in New South Wales. Thematic analysis derived three main themes: 1) Awareness and observations of sleep health, 2) Healthcare approach to sleep health management in residential aged care facilities and, 3) Organisational constraints to evidence-based sleep health care provision. Conclusion Registered nurses assess residents’ sleep health and attempt to manage sleep health through both non-pharmacological and pharmacological strategies. Organisational culture and staffing ratios negatively impact the delivery of best evidence-based practice but effective communication between the multidisciplinary team appears to facilitate management of sleep disturbances. Participants emphasized the need for sleep health educational programs and the development of national sleep health management guidelines across aged care in Australia.
APA, Harvard, Vancouver, ISO, and other styles
13

Keane, Robert E. "Describing wildland surface fuel loading for fire management: a review of approaches, methods and systems." International Journal of Wildland Fire 22, no. 1 (2013): 51. http://dx.doi.org/10.1071/wf11139.

Full text
Abstract:
Wildland fuelbeds are exceptionally complex, consisting of diverse particles of many sizes, types and shapes with abundances and properties that are highly variable in time and space. This complexity makes it difficult to accurately describe, classify, sample and map fuels for wildland fire research and management. As a result, many fire behaviour and effects software prediction systems use a generalised description of fuels to simplify data collection and entry into various computer programs. There are several major fuel description systems currently used in the United States, Canada and Australia, and this is a source of confusion for many in fire management. This paper (1) summarises the challenges of describing fuels, (2) contrasts approaches (association, classification and abstraction) for developing fuel description systems and (3) discusses possible future directions in wildland fuel description and science to transition to a universal fuel description system. Most discussion centres on surface fuel loadings as the primary descriptive characteristic. This synthesis paper is intended to provide background for understanding surface fuel classification and description systems and their use in simulating fire behaviour and effects, quantifying carbon inventories and evaluating site productivity.
APA, Harvard, Vancouver, ISO, and other styles
14

Nasri, Edy, Yul Hendra, and M. Nur Farezi. "REKAYASA PERANGKAT LUNAK PENGARSIPAN DIGITAL DOKUMEN ACCOUNTING FINANCIAL DENGAN PENDEKAN METODE MVC." Jurnal Ilmiah Sains dan Teknologi 5, no. 1 (February 26, 2021): 1–13. http://dx.doi.org/10.47080/saintek.v5i1.1193.

Full text
Abstract:
In the activities of document interception has an important role in the processing of document archiving in an agency or company and is used in supporting administrative processes or other activities. If the archiving of documents owned is not well managed can lead to difficulty finding the information that has been stored and ultimately can hinder the next stage of the work process. In the practice of paper-based records management, many problems are faced, thus giving space to electronic media as an alternative in archiving management. In archival terminology, electronic media is grouped as a new media archive, one form of storage of new media archives is digital media. Digital media usually requires tools in the form of computers, because it cannot be read directly, can be processed in computer programs and stored in digital data storage media. In This research discussed how to design, implement the system and maintenance and security of documents so as to avoid damage. This Software Engineering was created with MVC approach by using Framwork Codeigniter with the aim of archiving this digital document done to help and prevent a very long process in the storage and search of a document needed in a fast, precise and detailed time
APA, Harvard, Vancouver, ISO, and other styles
15

Žaja, Lana. "Survey Research and Analysis of the Educational Program „Office Business and Documentation Management“, Based on the Content of Module I.: Professional Training in the Croatian State Archives." Moderna arhivistika 2020, no. 2 (November 10, 2020): 285–305. http://dx.doi.org/10.54356/ma/2020/2/zpdu1315.

Full text
Abstract:
The article provides a survey of conducted educational programs „Office administration and records management", based on the content of module I. of the professional training in the Croatian State Archives (hereinafter referred to as HDA), which were held in the period from February 2016 to February 2019. The reason for choosing this exact period lies in the fact that since February 2016 a systematic distribution of anonymous polls to all the participants has begun and those polls have served as a basis for creating a compilation of statistical reports and analysis of data obtained from them. Anonymous polls were first experimentally distributed to participants in November 2015, and they were computer processed to serve as a model of experimentally conducted research based on the content of the module I of professional development in HDA. Survey research covers a period of 36 months, in which 10 courses in the period from February 2016 to February 2019 were held, with a total of 417 participants from all over Croatia. This article is conceptually structured according to the methodology which deals with survey research with a help of statistical methods, and the obtained results aim to improve the quality of teaching, to complete teaching materials and improve the insight into the final outcome of the course and the competencies that participants acquire at the end of the course.
APA, Harvard, Vancouver, ISO, and other styles
16

Barker, Sean M., and Jane E. Williamson. "Collaborative photo-identification and monitoring of grey nurse sharks (Carcharias taurus) at key aggregation sites along the eastern coast of Australia." Marine and Freshwater Research 61, no. 9 (2010): 971. http://dx.doi.org/10.1071/mf09215.

Full text
Abstract:
Before the worldwide decline of the ‘globally vulnerable’ Carcharias taurus may be addressed, an understanding of its migratory patterns and locations, and/or times when sharks may be vulnerable, is required to identify habitats that are critical to its survival. A collaborative framework for photo-identification and monitoring of C. taurus may greatly assist with conservation management initiatives. Images of C. taurus were sourced from public submissions to the www.spotashark.com (verified 12 February 2009) website and during targeted surveys. A computer-assisted program (I3S) was used to match the images of sharks photographically from the database. Research revealed patterns of movement, site utilisation and population structure similar to those in previous tagging studies. With the use of an underwater camera and two laser-scaling devices, 408 individual sharks were identified. Average occupancy times at two locations in New South Wales (NSW), Australia, were 308 days (Fish Rock) and 363 days (Magic Point). Seventeen individuals undertook northward or southward movements, averaging 350 km. The present study showed that a broad-based technique for data acquisition, coupled with rigorous evaluation of photographic identifications can provide support for local research and management programs and may aid with the conservation of the C. taurus species worldwide.
APA, Harvard, Vancouver, ISO, and other styles
17

Pham, Clarabelle, Tiffany K. Gill, Elizabeth Hoon, Muhammad Aziz Rahman, Deirdre Whitford, John Lynch, and Justin Beilby. "Profiling bone and joint problems and health service use in an Australian regional population: The Port Lincoln Health Study." Australian Health Review 37, no. 4 (2013): 504. http://dx.doi.org/10.1071/ah13064.

Full text
Abstract:
Objectives To describe the burden of bone and joint problems (BJP) in a defined regional population, and to identify characteristics and service-usage patterns. Methods In 2010, a health census of adults aged ≥15 years was conducted in Port Lincoln, South Australia. A follow-up computer-assisted telephone interview provided more specific information about those with BJP. Results Overall, 3350 people (42%) reported current BJP. General practitioners (GP) were the most commonly used provider (85%). People with BJP were also 85% more likely to visit chiropractors, twice as likely to visit physiotherapists and 34% more likely to visit Accident and Emergency or GP out of hours (compared with the rest of the population). Among the phenotypes, those with BJP with co-morbidities were more likely to visit GP, had a significantly higher mean pain score and higher levels of depression or anxiety compared with those with BJP only. Those with BJP only were more likely to visit physiotherapists. Conclusions GP were significant providers for those with co-morbidities, the group who also reported higher levels of pain and mental distress. GP have a central role in effectively managing this phenotype within the BJP population including linking allied health professionals with general practice to manage BJP more efficiently. What is known about the topic? As a highly prevalent group of conditions that are likely to impact on health-related quality of life and are a common cause of severe long-term disability, musculoskeletal conditions place a significant burden on individuals and the health system. However, far less is known about access and usage of musculoskeletal-related health services and programs in Australia. What does this paper add? As a result of analysing the characteristics of the overall BJP population, as well as phenotypes within it, a greater understanding of patterns of health service interactions, care pathways and opportunities for targeted improvements in delivery of care may be identified. The results emphasise that participants with BJP utilised the services of a narrow range of providers, which may have workforce implications for these sectors. The funding models for physiotherapists and chiropractors in Australia involve a mix of private and fees for service, which limits access to those who have private health insurance or can pay directly for these services. What are the implications for practitioners? These analyses indicate the importance of linking allied health professionals with general practice to manage BJP more efficiently. Alternative and appropriate care pathways need to be more strongly developed and identified for effective management of these conditions rather than relying on a traditional range of practitioners. Alternatively, greater ease of access to allied health practitioners may enable more effective treatment and improved quality of life for those with BJP. There is an urgent need to develop an effective population-based model of integrated care for BJP within regional Australia.
APA, Harvard, Vancouver, ISO, and other styles
18

Depczynski, Barbara, and Ann Poynten. "Acceptance and Effect of Continuous Glucose Monitoring on Discharge From Hospital in Patients With Type 2 Diabetes: Open-label, Prospective, Controlled Study." JMIR Diabetes 7, no. 2 (May 9, 2022): e35163. http://dx.doi.org/10.2196/35163.

Full text
Abstract:
Background Continuous glucose monitors (CGM) can provide detailed information on glucose excursions. There is little information on safe transitioning from hospital back to the community for patients who have had diabetes therapies adjusted in hospital and it is unclear whether newer technologies may facilitate this process. Objective Our aim was to determine whether offering CGM on discharge would be acceptable and if CGM initiated on hospital discharge in people with type 2 diabetes (T2DM) would reduce hospital re-presentations at 1 month. Methods This was an open-label study. Adult inpatients with T2DM, who were to be discharged home and required postdischarge glycemic stabilization, were offered usual care consisting of clinic review at 2 weeks and at 3 months. In addition to usual care, participants in the intervention arm were provided with a Libre flash glucose monitoring system (Abbott Australia). An initial run-in phase for the first 20 participants was planned, where all consenting participants were enrolled in an active arm. Subsequently, all participants were to be randomized to the active arm or usual care control group. Results Of 237 patients screened during their hospital admission, 34 had comorbidities affecting cognition that prevented informed consent and affected their ability to learn to use the CGM device. In addition, 21 were not able to be approached as the material was only in English. Of 101 potential participants who fulfilled eligibility criteria, 19 provided consent and were enrolled. Of the 82 patients who declined to participate, 31 advised that the learning of a new task toward discharge was overwhelming or too stressful and 26 were not interested, with no other details. Due to poor recruitment, the study was terminated without entering the randomization phase to determine whether CGM could reduce readmission rate. Conclusions These results suggest successful and equitable implementation of telemedicine programs requires that any human factors such as language, cognition, and possible disengagement be addressed. Recovery from acute illness may not be the ideal time for introduction of newer technologies or may require more novel implementation frameworks.
APA, Harvard, Vancouver, ISO, and other styles
19

Wulan, Sri, and Lara Fridani. "Teaching Strategy in Early Childhood Education: Child-Friendly Classroom Management to Anticipate Bullying Behaviours." JPUD - Jurnal Pendidikan Usia Dini 15, no. 2 (November 30, 2021): 379–94. http://dx.doi.org/10.21009/jpud.152.10.

Full text
Abstract:
Bullying behaviour can have a negative impact on a child's physical and psychological health. Bullying in the classroom is a challenge for early-childhood educators. Preschool is the first place outside the home where children face social challenges when interacting with their classmates. Child-Friendly Class is the first step and part of the Children Friendly School (CSF) as a UNICEF program and an important Indonesian government policy to prevent the emergence of child bullying behaviour. This study aims to identify needs in the process of developing a Child-Friendly Classroom Management model to anticipate bullying behaviour. This research and development method uses an adaptation of the Rowntree model which includes three stages of the process and data collection techniques using interviews, questionnaires, and observation. The results of this study indicate that the preparation of an effective classroom management guidebook to create child-friendly classes needs to be followed up immediately. Several findings related to teachers' perceptions of classroom management, and child-friendly classes prove that child-friendly classes have not been implemented properly in PAUD institutions, with bullying behaviour still appearing in early childhood in PAUD institutions. PAUD teachers understand that it is important to implement classroom management but so far there has been no manual on how to manage effective classrooms as well as training related to the implementation of effective classroom management. The creation of child-friendly classes is believed to be able to help teachers suppress the emergence of bullying behaviour in early childhood. Keywords: Child-Friendly Classroom Management, Bullying Prevention, Early Childhood Education References: Allday, R. A., Hinkson-Lee, K., Hudson, T. M., Neilsen-Gatti, S., Kleinke, A., & Russel, C. S. (2012). Training General Educators to Increase Behavior-Specific Praise: Effects on Students with EBD. Behavioral Disorders, 37, 87–98. Alsaker, F. D., & Valkanover, S. (2012). The Bernese Program against Victimization in Kindergarten and Elementary School. New Directions for Youth Development, 2012(133), 15–28. https://doi.org/10.1002/yd.20004 Arseneault, L., Walsh, E., Trzesniewski, K., Newcombe, R., Caspi, A., & Moffitt, T. E. (2006). Bullying Victimization Uniquely Contributes to Adjustment Problems in Young Children: A Nationally Representative Cohort Study. PEDIATRICS, 118(1), 130–138. https://doi.org/10.1542/peds.2005-2388 Benedict, E., Horner, R. H., & Squires, J. (2007). Assessment and Implementation of Positive Behavior Support in Preschools. Topics in Early Childhood Special Education, 27, 174–192. Boz, Y. (2008). Turkish student teachers’ concerns about teaching. European Journal of Teacher Education, 31(4), 367–377. https://doi.org/10.1080/02619760802420693 Bradshaw, C. P., & Johnson, R. M. (2011). The Social Context of Bullying and Peer Victimization: An Introduction to the Special Issue. Journal of School Violence, 10(2), 107–114. https://doi.org/10.1080/15388220.2011.557145 Bradshaw, C. P., Sawyer, A. L., & O’Brennan, L. M. (2009). A Social Disorganization Perspective on Bullying-Related Attitudes and Behaviors: The Influence of School Context. American Journal of Community Psychology, 43(3–4), 204–220. https://doi.org/10.1007/s10464-009-9240-1 Bullock, J. R. (2002). Bullying among Children. Childhood Education, 78(3), 130–133. https://doi.org/10.1080/00094056.2002.10522721 Çobanoğlu, F., Ayvaz-Tuncel, Z., & Ordu, A. (2018). Child-friendly Schools: An Assessment of Secondary Schools. Universal Journal of Educational Research, 6(3), 466–477. https://doi.org/10.13189/ujer.2018.060313 Cothran, D. J., Kulinna, P. H., & Garrahy, D. A. (2003). “This is kind of giving a secret away...”: Students’ perspectives on effective class management. Teaching and Teacher Education, 19(4), 435–444. https://doi.org/10.1016/S0742-051X(03)00027-1 Cross, D., Monks, H., Hall, M., Shaw, T., Pintabona, Y., Erceg, E., Hamilton, G., Roberts, C., Waters, S., & Lester, L. (2011). Three‐year results of the Friendly Schools whole‐of‐school intervention on children’s bullying behaviour. British Educational Research Journal, 37(1), 105–129. https://doi.org/10.1080/01411920903420024 Cross, D., Pintabona, Y., Hall, M., Hamilton, G., & Erceg, E. (2004). Validated Guidelines for School-Based Bullying Prevention and Management. International Journal of Mental Health Promotion, 6(3), 34–42. https://doi.org/10.1080/14623730.2004.9721937 Cross, D., Runions, K. C., Shaw, T., Wong, J. W. Y., Campbell, M., Pearce, N., Burns, S., Lester, L., Barnes, A., & Resnicow, K. (2019). Friendly Schools Universal Bullying Prevention Intervention: Effectiveness with Secondary School Students. International Journal of Bullying Prevention, 1(1), 45–57. https://doi.org/10.1007/s42380-018-0004-z Evertson, C. M., & Weinstein, C. S. (2012). Handbook of Classroom Management: Research, Practice, and Contemporary Issues. Fox, B. H., Farrington, D. P., & Ttofi, M. M. (2012). Successful Bullying Prevention Programs: Influence of Research Design, Implementation Features, and Program Components. Research Design, 6, 10. Georgiou, S. N. (2008). Bullying and victimization at school: The role of mothers. The British Journal of Educational Psychology, 78 Pt 1, 109–125. Hammarberg, T. (1998). A School for Children with Rights. UNICEF International Child Development Centre. Hymel, S., & Swearer, S. M. (2015). Four decades of research on school bullying: An introduction. American Psychologist, 70(4), 293–299. https://doi.org/10.1037/a0038928 Johansen, A., Little, S. G., & Akin-Little, A. (2011). An Examination of New Zealand Teachers’ Attributions and Perceptions of Behaviour, Classroom Management, and the Level of Formal Teacher Training Received in Behaviour Management. King, E. (2020). Implications for the child friendly schools policy within Cambodia’s cultural and primary school context. Asia-Pacific Journal of Teacher Education, 48(4), 375–388. https://doi.org/10.1080/1359866X.2019.1645811 Kirves, L., & Sajaniemi, N. (2012). Bullying in early educational settings. Early Child Development and Care,182(3–4), 383–400. https://doi.org/10.1080/03004430.2011.646724 MacSuga, A. S., & Simonsen, B. (2011). Increasing Teachers’ Use of Evidence-Based Classroom Management Strategies through Consultation: Overview and Case Studies. Beyond Behavior, 20, 4–12. Maida, P. (2006). Child-Friendly-School-Manual. UNICEF. Modipane, M., & Themane, M. (2014). Teachers’ social capital as a resource for curriculum development: Lessons learnt in the implementation of a Child-Friendly Schools programme. South African Journal of Education, 34(4), 1–8. https://doi.org/10.15700/201412052105 Monks, C. P., Smith, P. K., & Swettenham, J. (2005). Psychological correlates of peer victimisation in preschool: Social cognitive skills, executive function and attachment profiles. Aggressive Behavior, 31(6), 571–588. https://doi.org/10.1002/ab.20099 Olweus, D. (1994). Bullying at School: Basic Facts and Effects of a School Based Intervention Program. Journal of Child Psychology and Psychiatry, 35(7), 1171–1190. https://doi.org/10.1111/j.1469-7610.1994.tb01229.x O’Neill, S. C., & Stephenson, J. (2011). Classroom behaviour management preparation in undergraduate primary teacher education in Australia: A web-based investigation. Australian Journal of Teacher Education, 36(10). https://doi.org/10.14221/ajte.2011v36n10.3 O’Neill, S., & Stephenson, J. (2012). Does classroom management coursework influence pre-service teachers’ perceived preparedness or confidence? Teaching and Teacher Education, 28(8), 1131–1143. https://doi.org/10.1016/j.tate.2012.06.008 Osher, D., Kelly, D. L., Tolani-Brown, N., Shors, L., & Chen, C.-S. (2009). American Institutes for Research 1000 Thomas Jefferson Street , NW Washington, DC 20007-3835. 13. Perren, S., Stadelmann, S., & Von Klitzing, K. (2009). Child and family characteristics as risk factors for peer victimization in kindergarten. Swiss Journal of Educational Research, 36(1), 13–32. https://doi.org/10.24452/sjer.36.1.4806 Reinke, W. M., Lewis-Palmer, T., & Merrell, K. (2008). The Classroom Check-up: A Classwide Teacher Consultation Model for Increasing Praise and Decreasing Disruptive Behavior. School Psychology Review, 37(3), 315–332. PubMed. Repo, L., & Sajaniemi, N. (2015). Prevention of bullying in early educational settings: Pedagogical and organisational factors related to bullying. European Early Childhood Education Research Journal, 23(4), 461–475. https://doi.org/10.1080/1350293X.2015.1087150 Rigby, K. (2003). Consequences of Bullying in Schools. The Canadian Journal of Psychiatry, 48(9), 583–590. https://doi.org/10.1177/070674370304800904 Rowntree, D. (1994). Preparing Materials for Open, Distance and Flexible Learning: An Action Guide for Teachers and Trainers. Kogan Page. https://books.google.com.jm/books?id=6Tf1kH6MQZ0C Sainio, M., Veenstra, R., Huitsing, G., & Salmivalli, C. (2011). Victims and their defenders: A dyadic approach. International Journal of Behavioral Development, 35(2), 144–151. https://doi.org/10.1177/0165025410378068 Salmivalli, C. (2002). Is there an age decline in victimization by peers at school? Educational Research, 44(3), 269–277. https://doi.org/10.1080/00131880210135331 Saracho, O. (2016). Contemporary Perspectives on Research on Bullying and Victimization in Early Childhood Education. Information Age Publishing, Incorporated. https://books.google.co.id/books?id=dalCDQAAQBAJ Saracho, O. N. (2017). Bullying Prevention Strategies in Early Childhood Education. Early Childhood Education Journal, 45(4), 453–460. https://doi.org/10.1007/s10643-016-0793-y Sempowicz, T., & Hudson, P. (2011). Analysing Mentoring Dialogues for Developing a Preservice Teacher’s Classroom Management Practices. Australian Journal of Teacher Education, 36(8). https://doi.org/10.14221/ajte.2011v36n8.4 Smith, J. D., Schneider, B. H., Smith, P. K., & Ananiadou, K. (2004). The Effectiveness of Whole-School Antibullying Programs: A Synthesis of Evaluation Research. School Psychology Review, 33, 547–560. Sourander, A., Ronning, J., Brunstein-Klomek, A., Gyllenberg, D., Kumpulainen, K., Niemelä, S., Helenius, H., Sillanmäki, L., Ristkari, T., Tamminen, T., Moilanen, I., Piha, J., & Almqvist, F. (2009). Childhood Bullying Behavior and Later Psychiatric Hospital and Psychopharmacologic Treatment. ARCH GEN PSYCHIATRY, 66(9), 9. Tauber, R. T. (2007). Classroom Management: Sound Theory and Effective Practice. Praeger Publishers. https://books.google.la/books?id=XiQFyR41kysC Ttofi, M. M., & Farrington, D. P. (2011). Effectiveness of school-based programs to reduce bullying: A systematic and meta-analytic review. Journal of Experimental Criminology, 7(1), 27–56. https://doi.org/10.1007/s11292-010-9109-1 Ttofi, M. M., & Farrington, D. P. (2012). Bullying prevention programs: The importance of peer intervention, disciplinary methods and age variations. Journal of Experimental Criminology, 8(4), 443–462. https://doi.org/10.1007/s11292-012-9161-0 Unal, Z., & Unal, A. (2012). The Impact of Years of Teaching Experience on the Classroom Management Approaches of Elementary School Teachers. International Journal of Instruction, 5, 41–60. UNICEF. (2007). Implementation Handbook for The Convention on The Rights of The Child (3th Edition). UNICEF. Vaillancourt, T., McDougall, P., Hymel, S., Krygsman, A., Miller, J., Stiver, K., & Davis, C. (2008). Bullying: Are researchers and children/youth talking about the same thing? International Journal of Behavioral Development, 32(6), 486–495. https://doi.org/10.1177/0165025408095553 Vlachou, M., Andreou, E., Botsoglou, K., & Didaskalou, E. (2011). Bully/Victim Problems Among Preschool Children: A Review of Current Research Evidence. Educational Psychology Review, 23(3), 329–358. https://doi.org/10.1007/s10648-011-9153-z Vlachou, M., Botsoglou, K., & Andreou, E. (2014). Bullying/Victimization in Preschool Children. https://doi.org/10.13140/2.1.5086.1764 Vreeman, R. C., & Carroll, A. E. (2007). A systematic review of school-based interventions to prevent bullying. Archives of Pediatrics & Adolescent Medicine, 161 1, 78–88. Witvliet, M., Olthof, T., Hoeksma, J. B., Goossens, F. A., Smits, M. S. I., & Koot, H. M. (2010). Peer Group Affiliation of Children: The Role of Perceived Popularity, Likeability, and Behavioral Similarity in Bullying. Social Development, 19(2), 285–303. https://doi.org/10.1111/j.1467-9507.2009.00544.x Yaşar, M. (2017). Adaptation of General System Theory and Structural Family Therapy Approach to Classroom Management in Early Childhood Education* *. 32.
APA, Harvard, Vancouver, ISO, and other styles
20

Brindal, Emily, Gilly A. Hendrie, Jill Freyne, and Manny Noakes. "A Mobile Phone App Designed to Support Weight Loss Maintenance and Well-Being (MotiMate): Randomized Controlled Trial." JMIR mHealth and uHealth 7, no. 9 (September 4, 2019): e12882. http://dx.doi.org/10.2196/12882.

Full text
Abstract:
Background Few people successfully maintain lost weight over the longer term. Mobile phones have the potential to deliver weight loss management programs that can encourage self-monitoring while also providing some behavioral therapy to assist users in developing personal skills that may be necessary for improved longer term weight loss maintenance. Objective The aim of this study was to evaluate a program supporting weight maintenance, which uses a behaviorally based mobile phone app to manage weight, food, exercise, mood, and stress. Methods In a randomized controlled trial over 24 weeks, the full version of the app (MotiMate) was compared with a control app (monitoring only; excluding mood and stress) for its effect on weight, diet, and psychological well-being. Both apps had the same visual appearance and were designed to deliver all intervention content without face-to-face contact. The control version included features to track weight, food intake, and exercise with limited feedback and no encouraging/persuasive features. The intervention app included more persuasive and interactive features to help users track their weight, food intake, and physical activity and prompted users to enter data each day through notifications and included a mood and stress workshopping tool. Participants were recruited through advertising and existing databases. Clinic visits occurred at baseline, 4 weeks, 8 weeks, 12 weeks, and 24 weeks. At all visits, the clinical trial manager recorded body weight, and participants then completed a computer-delivered survey, which measured psychological and lifestyle outcomes. Objective app usage data were recorded throughout the trial. Results A total of 88 adults who had lost and maintained at least 5% of their body weight within the last 2 years were randomized (45 MotiMate and 43 control). Overall, 75% (66/88) were female, and 69% (61/88) completed week 24 with no differences in dropout by condition (χ21,87=0.7, P=.49). Mixed models suggested no significant changes in weight or psychological outcomes over 24 weeks regardless of condition. Of 61 completers, 53% (32/61) remained within 2% of their starting weight. Significant increases occurred over 24 weeks for satisfaction with life and weight loss self-efficacy regardless of app condition. Diet and physical activity behaviors did not vary by app or week. Negative binomial models indicated that those receiving the full app remained active users of the app for 46 days longer than controls (P=.02). Users of the full version of the app also reported that they felt more supported than those with the control app (P=.01). Conclusions Although some aspects of the intervention app such as usage and user feedback showed promise, there were few observable effects on behavioral and psychological outcomes. Future evaluation of the app should implement alternative research methods or target more specific populations to better understand the utility of the coping interface. Trial Registration Australia New Zealand Clinical Trials Registry ACTRN12614000474651; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=366120
APA, Harvard, Vancouver, ISO, and other styles
21

Plugatar, Yu V., N. B. Ermakov, P. V. Krestov, N. V. Matveyeva, V. B. Martynenko, V. B. Golub, V. Yu Neshataeva, et al. "The concept of vegetation classification of Russia as an image of contemporary tasks of phytocoenology." Vegetation of Russia, no. 38 (July 2020): 3–12. http://dx.doi.org/10.31111/vegrus/2020.38.3.

Full text
Abstract:
The scientific discussion concerning the development of the promising approaches for phyto-diversity conservation and the rational use of plant resources in Russian Federation was held at the Presidium of the Russian Academy of Sciences in December 2019. After the reports of leading scientists from biological institutes, a resolution No. 195 dated December 10, 2019 «Global changes in terrestrial ecosystems of Russia in the 21st century: challenges and opportunities» was adopted. The resolution includes a set of priority scientific aims including the development and application of modern technologies for inventory of the plant communities and the development of vegetation classification in Russia. As a result of the opinion exchange between phytocoenologists from different regions, the Concept of Russian Vegetation Classification was proposed. It is based on the following principles. 1. The use of the ecological-floristic approach and the hierarchy of the main syntaxonomic categories applied for the Classification of Vegetation of Europe. 2. Development of the Russian archive of geobotanical relevés and syntaxa in accordance with international standards and with the remote access functions. 3. Application of strict rules for syntaxon names formulated in the International Code of Phytosociological Nomenclature. The Concept assumes the development of a special program «Russian Vegetation Classification» with the justification of the necessity for targeted funding of the program in Research Institutions and Universities involved for solving this scientific problem on the principle of network collaboration. The final results of this program will be represented in the multi-volume publication «Vegetation of Russia». A shortened version of the Concept (English version was kindly revised by Dr. Andrew Gillison, Center for Biodiversity Management, Cairns, Queensand, Australia) is below. Vegetation classification of Russia Research Program Concept Systematic classification and inventory of plant communities (phytocoenoses) is fundamental to the study and forecasting of contemporary complex processes in the biosphere, controlled among other factors, by global climate change. Vegetation classification serves as a common language that enables professionals in various fields of science to communicate and interact with each other in the process of studying and formulating practical ecosystem-related management decisions. Because plant community types can carry a great deal of information about the environment, nearly all approaches to simulation of changes in global biota are based inevitably on vegetation categories. Phytocoenosis is a keystone element when assessing the biodiversity genetic potential, formulating decisions in biological resource management and in sustaining development across Russian territories. Among the world’s vegetation classification systems, phytosociology is a system in which the concept of plant association (basic syntaxon) is the basic element in the classification of phytocoenoses. The phytosociological approach as applied in this concept proposal, has its origins in the Brussels Botanical Congress in 1910. However, despite the broad acceptance of phytocoenotic diversity as a fundamental methodological tool for understanding biosphere processes and managing biological resources nowadays, we still lack a unified approach as to its systematization at both global and country levels with the consequence that, there is no a single classification system. The results obtained by vegetation scientists working under European Vegetation Survey led by L. Mucina became the effective reference for international cooperation in vegetation classification. In the last 17 years they have produced a system of vegetation classification of Europe, including the European part of Russia (Mucina et al., 2016. «Vegetation of Europe: hierarchical floristic classification system of vascular plant, bryophyte, lichen, and algal communities»). Despite the fact that «Vegetation of Europe» is based on ecological and floristic principles, it nevertheless represents an example of the synthesis of one of the most effective approaches to systematizing vegetation diversity by different vegetation science schools. The synthetic approach implemented in this study assumes full accounting of the ecological indicative significance of the floristic composition and structure of plant community and habitat attributes. The approach has already demonstrated its high efficiency for understanding and forecast modeling both natural and anthropogenic processes in the biosphere, as well as in assessment of the environmental and resource significance of vegetation (ref). The demand for this approach is supported by its implementation in a number of pan-European and national projects: NATURE 2000, CORINE, CarHAB, funded at the state and pan-European levels. Currently, one of the main systems for the study and protection of habitats within the framework of environmental programs of the European Union (Davies, Moss, 1999; Rodwell et al., 2002; Moss, 2008; Linking..., 2015; Evans et al., 2018) is EUNIS (European Nature Information System), the framework of which is a multilevel classification of habitats in Europe has been established. EUNIS was used as the basis for the preparation and establishment of the Red List of European Habitats (Rodwell et al., 2013). It is approved by the Commission of the European Union (EU) (Habitats Directive 92/43 / EEC, Commission of the European Communities) for use in environmental activities of EU countries. In its Resolution of 10.12.2019, the Presidium of the Russian Academy of Sciences (RAS) expressed the need in a modern vegetation classification for the assessment of the ecosystem transformations under current climate changes and increasing anthropogenic impacts, as well as in development of effective measures for the conservation and rational use of plant resources of Russia. The resolution recommended the development of the Concept of Vegetation Classification of Russia to the Science Council for biodiversity and biological resources (at RAS Department of biological sciences — Section of Botany). As a consequence, a group of Russian vegetation researchers has developed the Concept for Vegetation Classification of Russia and proposed principles and a plan for its implementation. Aim Elaboration of a system of vegetation classification of Russia reflecting the natural patterns of plant communities formation at different spatial and geographical levels and serving as the fundamental basis for predicting biosphere processes, science-based management of bioresources, conservation of biodiversity and, ultimately, rational nature management for planning sustainable development of its territories. Research goals 1. Development of fundamental principles for the classification of vegetation by synthesis of the achievements of Russian and world’s vegetation science. 2. Inventory of plant community diversity in Russia and their systematization at different hierarchical levels. Elaboration and publication of a Prodromus of vegetation of Russia (syntaxon checklist) with an assessment of the correctness of syntaxa, their Nomenclatural validization and bibliography. Preparation and publication of a book series «Vegetation of Russia» with the entire classification system and comprehensive description of all syntaxonomic units. 3. The study of bioclimatic patterns of the phytocoenotic diversity in Russia for predictive modeling of biosphere processes. Assessment of qualitative changes in plant cover under global climate change and increasing anthropogenic impact in its various forms. 4. Assessment of the conservation value of plant communities and ecosystems. Habitat classification within Russia on the basis of the vegetation classification with a reference to world experience. 5. Demonstration of the opportunities of the vegetation classification for the assessment of actual plant resources, their future prognoses under climate and resource use change, optimization of nature management, environmental engineering and planning of projects for sustainable development. Basic principles underlying the vegetation classification of Russia I. Here we address the synthesis of accumulated theoretical ideas about the patterns of vegetation diversity and the significant features of phytocoenoses. The main goal is to identify the most significant attributes of the plant cover at different hierarchical levels of classification: floristic, structural-phytocoenotic, ecotopic and geographical.We propose the following hierarchy of the main syntaxonomical categories used in the classification of European vegetation (Mucina et al., 2016) by the ecological-floristic approach (Braun-Blanquet): Type of vegetation, Class, Order, Alliance, Association. Applying the ecological-floristic approach to the vegetation classification of Russia will maximize the use of the indicative potential of the plant community species composition to help solve the complex tasks of modern ecology, notably plant resource management, biodiversity conservation, and the forecast of vegetation response to environmental change of environment changes. II. We plan to establish an all-Russian archive of geobotanical relevés in accordance with international standards and reference information system on the syntaxonomical diversity coupled with implemented remote access capabilities. At present, the archives in botanical, biological, environmental and geographical institutes of the Russian Academy of Sciences, as well as those of universities, have accumulated a large mass of geobotanical relevés for most regions of Russia (according to preliminary estimates — more than 300,000). These documents, which are fundamental to solving the most important national tasks for the conservation and monitoring of the natural human environment, need to be declared a National treasure. In this respect, the development of the all-Russian Internet portal for the vegetation classification is an urgent priority. III. The vegetation classification procedure will be based on a generalization of field data (geobotanical relevés) performed in accordance with international standards, using up-to-date mathematical and statistical methods and information technology. IV. The vegetation classification of Russia will be based on strict rules for naming of syntaxa, according to their validity as formulated in the International Code of Phytosociological Nomenclature, which is constantly being improved (Weber et al., 2020). These underlying principles will help develop the ecological indicative potential of a wide range of vegetation features that can be used to focus on solving a range of global and regional ecology problems, plant resources management, biodiversity protection, and forecasting of the consequences of environmental changes. Prospects for the implementation of the concept «Vegetation classification of Russia» At present, the academic research centers and universities of Moscow, St. Petersburg, Novosibirsk, Vladivostok, Irkutsk, Murmansk, Crimea, Bashkiria, Komi and other regions have sufficient scientific potential to achieve the goals in the framework of the special Program of the Russian Academy of Sciences — that is, to develop a vegetation classification of Russia. To achieve this goal will require: - organization of a network of leading teams within the framework of the Scientific Program of the Russian Academy of Sciences «Vegetation classification of Russia», adjustment of the content of state assignment with the allocation of additional funding. - approval of the thematic Program Committee by the RAS for the development of organizational approaches and elaboration of specific plans for the realization of the Scientific Program, - implementation of the zonal-geographical principle in organization of activity on developing the regional classifications and integrating them into a single classification system of the vegetation of Russia. - ensuring the integration of the system of vegetation classification of Russia with similar systems in the countries of the former USSR, Europe, USA, China, Japan, etc. Potential organizations-participants in the scientific Program — 18 institutes of the Russian Academy of Sciences and 8 Universities. Estimated timelines of the implementation of the concept «Vegetation classification of Russia» — 2021–2030. General schedule for the entire period of research 2021. Approval of classification principles, unified methodical and methodological approaches by project participants. Discussion and elaboration of the rules of organization of the all-Russian archive of geobotanical relevés and syntaxa. 2022–2026. Formation of all-Russian archive of geobotanical relevés and syntaxa. Development of plant community classification and identification of the potential indicative features of units of different ranks based on quantitative methods and comparative syntaxonomic analysis with existing classification systems in Europe, North and East Asia. Justification of new concepts for key syntaxa. The study of environmental and geographical patterns of the vegetation diversity in Russia using up-to-date methods of ordination modeling and botany-geography ana­lysis. 2022. Publication of a Prodromus of vegetation classification of Russia. Schedule for the publication of volumes of the «Vegetation classification of Russia» 2023. «Boreal forests and pre-tundra woodlands» 2024. «Forests of the temperate zone» 2025. «Tundra and polar deserts» and «Alpine ve­getation» 2026. «Steppe vegetation» and «Meadow vegetation» 2027. «Aquatic and bog vegetation» 2028. «Halophytic vegetation» 2029. «Synanthropic vegetation» 2027–2030. Development of criteria for assessing the environmental significance of the plant community syntaxonomic categories for various natural zones based on world criteria. Preparation of the volume «Classification of habitats of Russia and assessment of their environmental significance».
APA, Harvard, Vancouver, ISO, and other styles
22

Wishart, Alison. "Make It So: Harnessing Technology to Provide Professional Development to Regional Museum Workers." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1519.

Full text
Abstract:
IntroductionIn regional Australia and New Zealand, museums and art galleries are increasingly becoming primary sites of cultural engagement. They are one of the key tourist attractions for regional towns and expected to generate much needed tourism revenue. In 2017 in New South Wales alone, there were three million visitors to regional galleries and museums (MGNSW 13). However, apart from those (partially) funded by local councils, they are often run on donations, good will, and the enthusiasm of volunteers. Regional museums and galleries provide some paid, and more unpaid, employment for ageing populations. While two-thirds of Australia’s population lives in capital cities, the remainder who live in regional towns are likely to be in the 60+ age cohort because people are choosing to retire away from the bustling, growing cities (ABS). At last count, there were about 3000 museums and galleries in Australia with about 80% of them located in regional areas (Scott). Over the last 40 years, this figure has tripled from the 1000 regional and provincial museums estimated by Peter Piggott in his 1975 report (24). According to a 2014 survey (Shaw and Davidson), New Zealand has about 470 museums and galleries and about 70% are located outside capital cities. The vast majority, 85%, have less than five, full-time paid staff, and more than half of these were run entirely by ageing volunteers. They are entrusted with managing the vast majority of the history and heritage collections of Australia and New Zealand. These ageing volunteers need a diverse range of skills and experience to care for and interpret collections. How do you find the time and budget for professional development for both paid staff and volunteers? Many professional development events are held in capital cities, which are often a significant distance from the regional museum—this adds substantially to the costs of attending and the time commitment required to get there. In addition, it is not uncommon for people working in regional museums to be responsible for everything—from security, collection management, conservation, research, interpretation and public programs to changing the light bulbs. While there are a large number of resources available online, following a manual is often more difficult than learning from other colleagues or learning in a more formal educational or vocational environment where you can receive timely feedback on your work. Further, a foundational level of prior knowledge and experience is often required to follow written instructions. This article will suggest some strategies for low cost professional development and networking. It involves planning, thinking strategically and forming partnerships with others in the region. It is time to harness the power of modern communications technology and use it as a tool for professional development. Some models of professional development in regional areas that have been implemented in the past will also be reviewed. The focus for this article is on training and professional development for workers in regional museums, heritage sites and keeping places. Regional art galleries have not been included because they tend to have separate regional networks and training opportunities. For example, there are professional development opportunities provided through the Art Galleries Association of Australia and their state branches. Regional galleries are also far more likely to have one or more paid staff members (Winkworth, “Fixing the Slums” 2). Regional Museums, Volunteers, and Social CapitalIt is widely accepted that regional museums and galleries enhance social capital and reduce social isolation (Kelly 32; Burton and Griffin 328). However, while working in a regional museum or gallery can help to build friendship networks, it can also be professionally isolating. How do you benchmark what you do against other places if you are two or more hours drive from those places? How do you learn from other colleagues if all your colleagues are also isolated by the ‘tyranny of distance’ and struggling with the same lack of access to training? In 2017 in New South Wales alone, there were 8,629 active volunteers working in regional museums and galleries giving almost five million hours, which Museums and Galleries NSW calculated was worth over $150 million per annum in unpaid labour (MGNSW 1). Providing training and professional development to this group is an investment in Australia’s social and cultural capital.Unlike other community-run groups, the museums and heritage places which have emerged in regional Australia and New Zealand are not part of a national or state branch network. Volunteers who work for the Red Cross, Scouts or Landcare benefit from being part of a national organisation which provides funding, support workers, a website, governance structure, marketing, political advocacy and training (Winkworth, “Let a Thousand Flowers” 11). In Australia and New Zealand, this role is undertaken by the Australian Museums and Galleries Association AMaGA (formerly Museums Australia) and Museums Aotearoa respectively. However, both of these groups operate at the macro policy level, for example organising annual conferences, publishing a journal and developing Indigenous policy frameworks, rather than the local, practical level. In 1995, due to their advocacy work, Landcare Australia received $500 million over five years from the federal government to fund 5000 Landcare groups, which are run by 120,000 volunteers (Oppenheimer 177). They argued successfully that the sustainable development of land resources started at the local level. What do we need to do to convince government of the need for sustainable development of our local and regional museum and heritage resources?Training for Volunteers Working in Regional Museums: The Current SituationAnother barrier to training for regional museum workers is the assumption that the 70:20:10 model of professional development should apply. That is, 70% of one’s professional development is done ‘on the job’ by completing tasks and problem-solving; 20% is achieved by learning from mentors, coaches and role models and 10% is learnt from attending conferences and symposia and enrolling in formal courses of study. However, this model pre-supposes that there are people in your workplace whom you can learn from and who can show you how to complete a task, and that you are not destroying or damaging a precious, unique object if you happen to make a mistake.Some museum volunteers come with skills in research, marketing, administration, customer service or photography, but very few come with specific museum skills like writing exhibition text, registering an acquisition or conserving artefacts. These skills need to be taught. As Kylie Winkworth has written, museum management now requires a [...] skills set, which is not so readily found in small communities, and which in many ways is less rewarding for the available volunteers, who may have left school at 15. We do not expect volunteer librarians to catalogue books, which are in any case of low intrinsic value, but we still expect volunteers in their 70s and 80s to catalogue irreplaceable heritage collections and meet ever more onerous museum standards. That so many volunteers manage to do this is extraordinary. (“Let a Thousand Flowers” 13)Workers in regional museums are constantly required to step outside their comfort zones and learn new skills with minimal professional support. While these challenging experiences can be very rewarding, they are also potentially damaging for our irreplaceable material cultural heritage.Training for museum professionals has been on the agenda of the International Council of Museums (ICOM) since 1947 (Boylan 62). However, until 1996, their work focused on recommending curricula for new museum professionals and did not include life-long learning and on-going professional development. ICOM’s International Committee for the Training of Personnel (ICTOP) and the ICOM Executive has responded to this in their new curricula—ICOM Curricula Guidelines for Professional Museum Development, but this does not address the difficulties staff or volunteers working in regional areas face in accessing training.In some parts of Australia, there are regional support and professional development programs in place. For example, in Queensland, there is the Museum Development Officer (MDO) network. However, because of the geographic size of the state and the spread of the museums, these five regionally based staff often have 60-80 museums or keeping places in their region needing support and so their time and expertise is spread very thinly. It is also predominantly a fee-for-service arrangement. That is, the museums have to pay for the MDO to come and deliver training. Usually this is done by the MDO working with a local museum to apply for a Regional Arts Development Fund (RADF) grant. In Victoria there is a roving curator program where eligible regional museums can apply to have a professional curator come and work with them for a few days to help the volunteers curate exhibitions. The roving curator can also provide advice on “develop[ing] high quality exhibitions for diverse audiences” via email, telephone and networking events. Tasmania operates a similar scheme but their two roving curators are available for up to 25 days of work each year with eligible museums, provided the local council makes a financial contribution. The New South Wales government supports the museum advisor program through which a museum professional will come to your museum for up to 20 days/year to give advice and hands-on training—provided your local council pays $7000, an amount that is matched by the state government—for this service. In 2010, in response to recommendations in the Dunn Report (2007), the Collections Council of Australia (CCA) established a pilot project with the City of Kalgoorlie-Boulder in Western Australia and $120,000 in funding from the Myer Foundation to trial the provision of a paid Collections Care Coordinator who would provide free training, expertise and support to local museums in the region. Tragically, CCA was de-funded by the Cultural Ministers Council the same year and the roll-out of a hub and spoke regional model was not supported by government due to the lack of an evidence base (Winkworth, “Let a Thousand Flowers” 18). An evaluation of the trial project would have tested a different model of regional training and added to the evidence base.All these state-based models (except the aborted Collections Care hub in Western Australia) require small regional museums to compete with each other for access to a museum professional and to successfully apply for funding, usually from their local council or state government. If they are successful, the training that is delivered is a one-off, as they are unlikely to get a second slice of the regional pie.An alternative to this competitive, fly-in fly-out, one-off model of professional development is to harness the technology and resources of local libraries and other cultural facilities in regional areas. This is what the Sydney Opera House Trust did in March 2019 to deliver their All about Women program of speakers via live streaming to 37 satellite sites throughout Australia and New Zealand.Harnessing Technology and Using Regional Library Infrastructure to Provide Training: ScenarioImagine the following scenario. It is a Monday morning in a regional library in Dubbo, New South Wales. Dubbo is 391 km or five hours drive by car from the nearest capital city (Sydney) and there are 50 regional museums within a 100 km radius. Ten people are gathered in a meeting room at the library watching a live stream of the keynote speakers who are presenting at their national museums conference. They are from five regional museums where they work as volunteers or part-time paid staff. They cannot afford to pay $2000, or more, to attend the conference, but they are happy to self-fund to drive for an hour or two to link up with other colleagues to listen to the presentations. They make notes and tweet in their questions using the conference twitter handle and hashtag. They have not been exposed to international speakers in the industry before and the ideas presented are fresh and stimulating. When the conference breaks for morning tea, they take a break too and get to know each other over a cuppa (provided free of charge by the library). Just as the networking sessions at conferences are vitally important for the delegates, they are even more important to address social isolation amongst this group. When they reconvene, they discuss their questions and agree to email the presenters with the questions that are unresolved. After the conference keynote sessions finish, the main conference (in the capital city) disperses into parallel sessions, which are no longer available via live stream.To make the two-hour drive more worthwhile and continue their professional development, they have arranged to hold a significance assessment workshop as well. Each museum worker has brought along photographs of one item in their collection that they want to do more research on. Some of them have also brought the object, if it is small and robust enough to travel. They have downloaded copies of Significance 2.0 and read it before they arrived. They started to write significance reports but could not fully understand how to apply some of the criteria. They cannot afford to pay for professional workshop facilitators, but they have arranged for the local studies librarian to give them an hour of free training on using the library’s resources (online and onsite) to do research on the local area and local families. They learn more about Trove, Papers Past and other research tools which are available online. This is hands-on and computer-based skills training using their own laptops/tablets or the ones provided by the library. After the training with the librarian, they break into two groups and read each other’s significance reports and make suggestions. The day finishes with a cuppa at 2.30pm giving them time to drive home before the sun sets. They agree to exchange email addresses so they can keep in touch. All the volunteers and staff who attended these sessions in regional areas feel energised after these meetings. They no longer feel so isolated and like they are working in the dark. They feel supported just knowing that there are other people who are struggling with the same issues and constraints as they are. They are sick of talking about the lack of budget, expertise, training and resources and want to do something with what they have.Bert (fictional name) decides that it is worth capitalising on this success. He emails the people who came to the session in Dubbo to ask them if they would like to do it again but focus on some different training needs. He asks them to choose two of the following three professional development options. First, they can choose to watch and discuss a recording of the keynote presentations from day two of the recent national conference. The conference organisers have uploaded digital recordings of the speakers’ presentations and the question time to the AMaGA website. This is an option for local libraries that do not have sufficient bandwidth to live stream video. The local library technician will help them cast the videos to a large screen. Second, they can each bring an object from their museum collection that they think needs conservation work. If the item is too fragile or big to move, they will bring digital photographs of it instead. Bert consulted their state-based museum and found some specialist conservators who have agreed to Skype or Facetime them in Dubbo free of charge, to give them expert advice about how to care for their objects, and most importantly, what not to do. The IT technician at Dubbo Library can set up their meeting room so that they can cast the Skype session onto a large smart screen TV. One week before the event, they will send a list of their objects and photographs of them to the conservator so that she can prepare, and they can make best use of her time. After this session, they will feel more confident about undertaking small cleaning and flattening treatments and know when they should not attempt a treatment themselves and need to call on the experts. Third, they could choose to have a training session with the council’s grants officer on writing grant applications. As he assesses grant applications, he can tell them what local councils look for in a successful grant application. He can also inform them about some of the grants that might be relevant to them. After the formal training, there will be an opportunity for them to exchange information about the grants they have applied for in the past—sometimes finding out what’s available can be difficult—and work in small groups to critique each other’s grant applications.The group chooses options two and three, as they want more practical skills development. They take a break in the middle of the day for lunch, which gives them the opportunity to exchange anecdotes from their volunteer work and listen to and support each other. They feel validated and affirmed. They have gained new skills and don’t feel so isolated. Before they leave, Alice agrees to get in touch with everyone to organise their next regional training day.Harnessing Technology and Using Regional Library Infrastructure to Provide Training: BenefitsThese scenarios need not be futuristic. The training needs are real, as is the desire to learn and the capacity of libraries to support regional groups. While funding for regional museums has stagnated or declined in recent years, libraries have been surging ahead. In August 2018, the New South Wales Government announced an “historic investment” of $60 million into all 370 public libraries that would “transform the way NSW’s public libraries deliver much-needed services, especially in regional areas” (Smith). Libraries are equipped and charged with the responsibility of enabling local community groups to make best use of their resources. Most state and national museum workers are keen to share their expertise with their regional colleagues: funding and distance are often the only barriers. These scenarios allow national conference keynote speakers to reach a much larger audience than the conference attendees. While this strategy might reduce the number of workers from regional areas who pay to attend conferences, the reality is that due to distance, other volunteer commitments, expense and family responsibilities, they probably would not attend anyway. Most regional museums and galleries and their staff might be asset-rich, but they are cash-poor, and the only way their workers get to attend conferences is if they win a bursary or grant. In 2005, Winkworth said: “the future for community museums is to locate them within local government as an integral part of the cultural, educational and economic infrastructure of the community, just like libraries and galleries” (“Fixing the Slums” 7). Fourteen years on, very little progress has been made in this direction. Those museums which have been integrated into the local council infrastructure, such as at Orange and Wagga Wagga in western New South Wales, are doing much better than those that are still stuck in ‘cultural poverty’ and trying to operate independently.However, the co-location and convergence of museums, libraries and archives is only successful if it is well managed. Helena Robinson has examined the impact on museum collection management and interpretation of five local government funded, converged collecting institutions in Australia and New Zealand and found that the process is complex and does not necessarily result in “optimal” cross-disciplinary expertise or best practice outcomes (14158).ConclusionRobinson’s research, however, did not consider community-based collecting institutions using regional libraries as sites for training and networking. By harnessing local library resources and making better use of existing communications technology it is possible to create regional hubs for professional development and collegiate support, which are not reliant on grants. If the current competitive, fly-in fly-out, self-funded model of providing professional development and support to regional museums continues, then the future for our cultural heritage collections and the dedicated volunteers who care for them is bleak. Alternatively, the scenarios I have described give regional museum workers agency to address their own professional development needs. This in no way removes the need for leadership, advocacy and coordination by national representative bodies such as AMaGA and Museums Aotearoa. If AMaGA partnered with the Australian Library and Information Association (ALIA) to stream their conference keynote sessions to strategically located regional libraries and used some of their annual funding from the Department of Communication and the Arts to pay for museum professionals to travel to some of those sites to deliver training, they would be investing in the nation’s social and cultural capital and addressing the professional development needs of regional museum workers. This would also increase the sustainability of our cultural heritage collections, which are valuable economic assets.ReferencesAustralian Bureau of Statistics. “2071.0—Census of Population and Housing: Reflecting Australia—Snapshot of Australia, 2016”. Canberra: Australian Bureau of Statistics, 2017. 17 Mar. 2019 <https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by%20Subject/2071.0~2016~Main%20Features~Snapshot%20of%20Australia,%202016~2>.Boylan, Patrick. “The Intangible Heritage: A Challenge and an Opportunity for Museums and Museum Professional Training.” International Journal of Intangible Heritage 1 (2006): 53–65.Burton, Christine, and Jane Griffin. “More than a Museum? Understanding How Small Museums Contribute to Social Capital in Regional Communities.” Asia Pacific Journal of Arts & Cultural Management 5.1 (2008): 314–32. 17 Mar. 2019 <http://apjacm.arts.unimelb.edu.au/article/view/32>.Dunn, Anne. The Dunn Report: A Report on the Concept of Regional Collections Jobs. Adelaide: Collections Council of Australia, 2007.ICOM Curricula Guidelines for Professional Museum Development. 2000. <http://museumstudies.si.edu/ICOM-ICTOP/comp.htm>.Kelly, Lynda. “Measuring the Impact of Museums on Their Communities: The Role of the 21st Century Museum.” New Roles and Issues of Museums INTERCOM Symposium (2006): 25–34. 17 Mar. 2019 <https://media.australianmuseum.net.au/media/dd/Uploads/Documents/9355/impact+paper+INTERCOM+2006.bb50ba1.pdf>.Museums and Galleries New South Wales (MGNSW). 2018 NSW Museums and Galleries Sector Census. Museums and Galleries of New South Wales. Data and Insights—Culture Counts. Sydney: MGNSW, 2019. 17 Mar. 2019 <https://mgnsw.org.au/wp-content/uploads/2019/02/2018-NSW-Museum-Gallery-Sector-Census.pdf>Oppenheimer, Melanie. Volunteering: Why We Can’t Survive without It. Sydney: U of New South Wales P, 2008.Pigott, Peter. Museums in Australia 1975. Report of the Committee of Inquiry on Museums and National Collections Including the Report of the Planning Committee on the Gallery of Aboriginal Australia. Canberra: Australian Government Printing Service, 1975. 17 Mar. 2019 <https://apo.org.au/node/35268>.Public Sector Commission, Western Australia. 70:20:10 Framework Learning Philosophy. Perth: Government of Western Australia, 2018. 17 Mar. 2019 <https://publicsector.wa.gov.au/centre-public-sector-excellence/about-centre/702010-framework>.Robinson, Helena. “‘A Lot of People Going That Extra Mile’: Professional Collaboration and Cross-Disciplinarity in Converged Collecting Institutions.” Museum Management and Curatorship 31 (2016): 141–58.Scott, Lee. National Operations Manager, Museums Australia, Personal Communication. 22 Oct. 2018.Shaw, Iain, and Lee Davidson, Museums Aotearoa 2014 Sector Survey Report. Wellington: Victoria U, 2014. 17 Mar. 2019 <http://www.museumsaotearoa.org.nz/sites/default/files/documents/museums_aotearoa_sector_survey_2014_report_-_final_draft_oct_2015.pdf>.Smith, Alexandra. “NSW Libraries to Benefit from $60 Million Boost.” Sydney Morning Herald 24 Aug. 2018. 17 Mar. 2019 <https://www.smh.com.au/politics/nsw/nsw-libraries-to-benefit-from-60-million-boost-20180823-p4zzdj.html>. Winkworth, Kylie. “Fixing the Slums of Australian Museums; or Sustaining Heritage Collections in Regional Australia.” Museums Australia Conference Paper. Canberra: Museums Australia, 2005. ———. “Let a Thousand Flowers Bloom: Museums in Regional Australia.” Understanding Museums—Australian Museums and Museology. Eds. Des Griffin and Leon Paroissien. Canberra: National Museum of Australia, 2011. 17 Mar. 2019 <https://nma.gov.au/research/understanding-museums/KWinkworth_2011.html>.
APA, Harvard, Vancouver, ISO, and other styles
23

Thorpe, Kirsten, Kimberly Christen, Lauren Booker, and Monica Galassi. "Designing archival information systems through partnerships with Indigenous communities." Australasian Journal of Information Systems 25 (October 3, 2021). http://dx.doi.org/10.3127/ajis.v25i0.2917.

Full text
Abstract:
I Indigenous peoples in Australia have been heavily documented in colonial archives and collections. The past two decades have seen significant materials from Galleries, Libraries, Archives and Museums (GLAM) institutions being returned to Indigenous communities in Australia through physical or digital repatriation of materials. The digital return of materials requires both appropriate systems for returning both the digital collections, metadata and contextual information that relates to them, and agreements, policies, and procedures for meaningfully engaging with Indigenous communities throughout the process. Importantly, the information returned needs to be accessible, readable, and usable in local community contexts based on understanding local community needs. This paper discusses priorities around engaging with Indigenous peoples to reshape and build archival information systems and access points that support community requirements for digital return and management of cultural heritage materials in local settings. The paper discusses future priorities for designing archival information systems to support Indigenous sovereignty, including data stewardship and preservation approaches. These concerns are discussed and raised as part of the research and development of the global Mukurtu Content Management System (CMS) project, including within the New South Wales (NSW) Australian Mukurtu Hub.
APA, Harvard, Vancouver, ISO, and other styles
24

Alam, Sultana Lubna, Ruonan Sun, and John Campbell. "Helping Yourself or Others? Motivation Dynamics for High-Performing Volunteers in GLAM Crowdsourcing." Australasian Journal of Information Systems 24 (May 18, 2020). http://dx.doi.org/10.3127/ajis.v24i0.2599.

Full text
Abstract:
While most crowdsourcing (CS) cases in the literature focus on commercial organisations, little is known about volunteers’ motivation of initial and continued participation in not-for-profit CS projects and importantly, about how the motivations may change over time. It is vital to understand motivation and motivational dynamics in a not-for-profit context because a fundamental challenge for not-for-profit CS initiations is to recruit and keep volunteers motivated without any formal contract or financial incentives. To tackle this challenge, we explore high performing volunteers’ initial motivation for joining and sustaining with a GLAM (galleries, libraries, archives and museums) CS project. We situated our interpretive exploration in a case study of the Australian Newspapers CS project initiated by the National Library of Australia. Based on the case study, we found that high-performing volunteers were motivated by a combination of personal, collective, and external factors classified into intrinsic, extrinsic, and internalised extrinsic motivations. Further, we found that these motivations changed over time. Specifically, many volunteers presented substantial personal (i.e., personal interest and fun) and community-centric motivations (i.e. altruism and non-profit cause) when they initially joined the project, whereas external motivations (i.e., recognition and rewards) had a greater impact on long-term participation. Our findings offer implications for CS system design (e.g., user profiles, tagging and commenting), incentive structure (e.g., reputation-based ranking, leader boards), and relational mechanisms (e.g., open communication channels) to stimulate sustainable contributions for not-for-profit CS initiatives.
APA, Harvard, Vancouver, ISO, and other styles
25

Bonofiglio, Federico, Fabio C. De Leo, Connor Yee, Damianos Chatzievangelou, Jacopo Aguzzi, and Simone Marini. "Machine learning applied to big data from marine cabled observatories: A case study of sablefish monitoring in the NE Pacific." Frontiers in Marine Science 9 (August 26, 2022). http://dx.doi.org/10.3389/fmars.2022.842946.

Full text
Abstract:
Ocean observatories collect large volumes of video data, with some data archives now spanning well over a few decades, and bringing the challenges of analytical capacity beyond conventional processing tools. The analysis of such vast and complex datasets can only be achieved with appropriate machine learning and Artificial Intelligence (AI) tools. The implementation of AI monitoring programs for animal tracking and classification becomes necessary in the particular case of deep-sea cabled observatories, as those operated by Ocean Networks Canada (ONC), where Petabytes of data are now collected each and every year since their installation. Here, we present a machine-learning and computer vision automated pipeline to detect and count sablefish (Anoplopoma fimbria), a key commercially exploited species in the N-NE Pacific. We used 651 hours of video footage obtained from three long-term monitoring sites in the NEPTUNE cabled observatory, in Barkley Canyon, on the nearby slope, and at depths ranging from 420 to 985 m. Our proposed AI sablefish detection and classification pipeline was tested and validated for an initial 4.5 month period (Sep 18 2019-Jan 2 2020), and was a first step towards validation for future processing of the now decade-long video archives from Barkley Canyon. For the validation period, we trained a YOLO neural network on 2917 manually annotated frames containing sablefish images to obtain an automatic detector with a 92% Average Precision (AP) on 730 test images, and a 5-fold cross-validation AP of 93% (± 3.7%). We then ran the detector on all video material (i.e., 651 hours from a 4.5 month period), to automatically detect and annotate sablefish. We finally applied a tracking algorithm on detection results, to approximate counts of individual fishes moving on scene and obtain a time series of proxy sablefish abundance. Those proxy abundance estimates are among the first to be made using such a large volume of video data from deep-sea settings. We discuss our AI results for application on a decade-long video monitoring program, and particularly with potential for complementing fisheries management practices of a commercially important species.
APA, Harvard, Vancouver, ISO, and other styles
26

Grzebieta, Raphael. "Proceedings of the 2021 Australasian Road Safety Conference - Melbourne." Proceedings of the Australasian Road Safety Conference, September 27, 2021, 1–554. http://dx.doi.org/10.33492/arsc-2021.

Full text
Abstract:
These proceedings describe research, educational and policing program implementation and policy and management strategies related to all aspects of road safety and especially related to the conference theme of Towards Zero: A Fresh Approach. The 2021 conference covers a comprehensive range of topics including speed, infrastructure and road design, education, licensing, vehicle design, impairment due to alcohol, drugs and mobile phones. The conference also presents innovative symposium sessions including interdisciplinary approaches combining safety, the law and design and showcasing successful programs involving at-risk youth, older drivers and safety approaches for non-occupants, specifically when we walk and ride a bicycle. Around 600 delegates from 28 countries attended the on-line virtual conference, held in this format because of COVID 19 restrictions. Authors of accepted Extended Abstracts and Full Papers represented international and local institutions from all aspects of their respective communities including research centres, private companies, government agencies and community groups. The Extended Abstracts and links to Full Papers presented in these Proceedings provide an indication of the important work being done in Australia, New Zealand and internationally as part of the United Nations, One UN Vision for Road Safety to reduce the number of crashes roads by 50 percent by 2030.
APA, Harvard, Vancouver, ISO, and other styles
27

"Pesantren-based Transformational Leadership: Strategies toward International Superior Madrasah in Indonesia." Webology 18, SI05 (October 30, 2021): 1023–40. http://dx.doi.org/10.14704/web/v18si05/web18279.

Full text
Abstract:
Transformational leadership is one of the models for the initial change that can encourage Madrasah Aliyah to excel, both at the national and international levels. This study is a qualitative study with an interactive analysis model on transformational leadership strategies at the international Madrasah Aliyah Amanatul Ummah Mojokerto and the Serpong Insan Cendekia State Madrasah Aliyah. This study concluded that the first strategy to increase the influence of the idealism of the madrasah principal towards an international pesantren-based Madrasah Aliyah is the strong commitment between the principal and teachers, employees, students, as well as parents, beginning with planning (RKM) using school review, quality assurance, benchmarking, and quality control accompanied by exemplary values, an effort to maintain mutual trust as well as the sincerity of all stakeholders. Then, the second strategy is to foster inspirational motivation for the principals of international pesantren-based Madrasah Aliyah which is reflected in the ability of madrasah principals who can motivate and inspire their subordinates to improve the quality of education together. For example, the achievement of madrasah principals, teachers and students winning the international olympiad between 2010-2020 is supported by the principle of Islamic boarding school that is 'The Islamic Role Model is The First Key to Build Great Leaders'. Furthermore, The third strategy is to strengthen the intellectual stimulus of Madrasah Aliyah's principal with superior international standards based on Islamic boarding school values, which is reflected in several positive changes made and achieved by the madrasah's principal, both the quality of the input, process, and output, such as student achievements in national and international levels such as scholarships to the Middle East, Europe, Japan, and Australia. Finally, the last strategy is to transform the madrasah principal’s individualized considereation towards superior international pesantren-based Madrasah Aliyah which is reflected in the ability of madrasah principals in managing human resources appropriately, including managing the right competencies for human resources through the competency development programs for teachers and employees continuously; and improving abilities through training supported by the principles of responsibility and exemplary, which are the characteristics of pesantren.
APA, Harvard, Vancouver, ISO, and other styles
28

C. Fox, Tyler. "The Integration of Doulas into the Pregnancy Care Teams of Women of Color in the United States." HPHR Journal, no. 34 (2021). http://dx.doi.org/10.54111/0001/hh6.

Full text
Abstract:
The United States has one of the highest maternal mortality ratios of any country in the Organization for Economic Cooperation and Development (OECD) at 17.4 per 100,000 live births as of 2017, far more than Canada, Sweden, Australia, or Germany (OECD.Stat, 2021). A primary reason for this considerable difference between the U.S. and other OECD countries is the racial disparity in maternal mortality. One intervention aimed at addressing this racial disparity is the integration of a doula, a professionally trained companion who provides birth support, into a woman’s biomedical care team (Gilliland, 2002). The doula works with their client throughout pregnancy, through delivery, and in the postnatal period, providing guidance and encouragement to the mother while also working within the healthcare system to advocate for, and in some cases to protect, her. This paper will provide a general background on maternal death in the United States, highlighting the historical and modern instances of racism and its impact on maternal health; examining the use of doulas as an intervention for reducing maternal death, using New York City as a case study; and discussing the potential implications of a national expansion of Medicaid reimbursed doula programs aimed at improving maternal outcomes countrywide.
APA, Harvard, Vancouver, ISO, and other styles
29

Hung, Ta Huy. "Management’s Perception of Key Performance Indicators for Vietnam Small and Medium Enterprises." VNU Journal of Science: Economics and Business 34, no. 1 (March 24, 2018). http://dx.doi.org/10.25073/2588-1108/vnueab.4138.

Full text
Abstract:
Key Performance Indicators in performance management system was attracted by researchers and practitioners. In order to effective implemented KPIs in SMEs, managers must deeply understand about the KPIs, role of KPIs, implemented KPIs. Based on the quantitative method by doing survey with 162 SEMs, author indicated the current situation of the perception of SMEs manager about the fundamental of KPI, roles of KPIs and difficulty implemented KPIs in performance management system. Based on the consistent theory about KPIs , author proposed some solution for manager to enhance their knowledge of KPIs. Keywords SMEs, KPIs , Performance appraisal References Ahmad, M. M., & Dhafr, N. (2002). Establishing and improving manufacturing performance measures. Robotics and Computer-Integrated Manufacturing, 18(3), 171-176. Aylin Ates, Patrizia Garengo, Paola Cocca, Umit Bititci (2013), The development of SME managerial practice for effective performance management, Journal of Small Business and Enterprise Development, 20(1), 28-54Ayoup, H., Omar, N. H., & Rahman, I. K. A. (2012). Implementation of Balance Scorecard (BSC) in a Malaysian GLC: Perceptions of Middle Managers. Asia-Pacific Management Accounting Journal, 7(2), 99-126.Barney, J. (1991), ‘Firm resources and sustained competitive advantage’ Journal of Management, 17(1), 99-120Cagliano, R., Blackmon, K. and Voss, C. (2001).Small firms under microscope: international differences in production/operations management practices and performance. Integrated Manufacturing Systems, 12, 469– 482.Corbett, L. M. (1998). Benchmarking manufacturing performance in Australia and New Zealand. Benchmarking for Quality Management & Technology, 5(4), 271-282. De Waal, A. A. (2003). Behavioral factors important for the successful implementation and use of performance management systems. Management Decision, 41(8), 688-697.Garengo, P., Biazzo, S., & Bititci, U. S. (2005). Performance measurement systems in SMEs: A review for a research agenda. International journal of management reviews, 7(1), 25-47.Epstein, M. J., & Roy, M.-J. (2001). Sustainability in action: Identifying and measuring the key performance drivers. Long range planning, 34(5), 585-604. Evans, N. (2005). Assessing the Balanced Scorecard as a Management Tool for Hotels, International Journal of Contemporary Hospitality, Management Accounting, 17, 5 : 376-390.Jakelski, D., & Lebrasseur, R. (1997). Implementing continuous improvement in the North American mining industry. Technological Forecasting and Social Change, 55(2), 165-177. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (1998). Multivariate data analysis (Vol. 5): Prentice hall Upper Saddle River, NJ.Lado, A. A., & Wilson, M. C. (1994), ‘Human resource systems and sustained competitive advantage: A competency-based perspective’, Academy of management review, 19(4), 699-727.Mai Thanh Lan (2016), Xây dựng các năng lực cho nhà quản trị cấp trung nhằm nâng cao năng lực cạnh tranh của doanh nghiệp, Tạp chí Kinh tế & phát triển, 225, 90-99.Lê Quân (2015), Lãnh đạo doanh nghiệp Việt Nam: Hội đồng quản trị; Ban điều hành; Khung năng lực; Thẻ điểm cân bằng; Chỉ số hoàn thành, NXB Đại học Quốc Gia Hà Nội, Hà Nội.Martins, R.A. and Salerno, M.S. (1999). Use of new performance measurement system, some empirical findings. In Managing Operations Networks – VI International EurOMA Conference, Venice, Italy, 7–8 JuneParmenter, D. (2010). Key performance indicators (KPI): developing, implementing, and using winning KPIs: John Wiley & Sons.Rodriguez, R. R., Saiz, J. J. A., & Bas, A. O. (2009). Quantitative relationships between key performance indicators for supporting decision-making processes. Computers in Industry, 60(2), 104-113. Shahin, A., & Mahbod, M. A. (2007). Prioritization of key performance indicators: An integration of analytical hierarchy process and goal setting. International Journal of Productivity and Performance Management, 56(3), 226-240.Nguyễn Đình Thọ (2012). Phương pháp nghiên cứu khoa học trong kinh doanh. Thiết kế và thực hiện. Hà Nội: Nhà xuất bản Lao động xã hộiTsai, Y.-C., & Cheng, Y.-T. (2012). Analyzing key performance indicators (KPIs) for E-commerce and Internet marketing of elderly products: A review. Archives of gerontology and geriatrics, 55(1), 126-132. Yeung, J. F., Chan, A. P., & Chan, D. W. (2009). A computerized model for measuring and benchmarking the partnering performance of construction projects. Automation in Construction, 18(8), 1099-1113.
APA, Harvard, Vancouver, ISO, and other styles
30

Forsyth, Ellen. "Collecting Community Stories: Local Studies Collections and What They Can Tell You About the Community." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1523.

Full text
Abstract:
IntroductionThis article investigates how local studies collections in public libraries can help people explore the experiences of regional Australia. Some of this discovery can be done online, but as not all local studies material has been catalogued, is online or available in a digital format, some of this exploration will need to be onsite at public libraries throughout Australia. This exploration could be combined with other investigations into regional areas. What are local studies collections in public libraries? These collections are defined as beinginclusive of local history and so the local collection should support studies that look at the historical past, both distant and recent, or at current concerns in the community, such as local environmental issues, or plans for the future development of a locality. (Dewe 1–2)This broader look at the context of a place should provide information in a range of formats to help explore an area, and to find out about the history, geography and the environment as well as other local concerns and issues. Local studies collections should contain recent as well as older material. Each local studies collection will be different (McCausland; Bateman; Johnston; Gregg; Heap and Pymm) with some of these differences simply being because each area has a unique collection of stories which can be told about it. Other differences will be in how each public library interprets their remit to collect information and stories about a community, and which stories are included or excluded from the collection. There are budget constraints as well because each public library has to choose how to fund local studies as part of their overall library provision which means there are tensions and competing priorities in what is collected and how it is made available for research as well as information and entertainment. Some areas have more research activity so there is more being written, photographed, drawn, or otherwise recorded about an area, but no matter how small an area is, there is usually new local studies material being continually created.Local Studies CollectionsLocal studies collections are important as they provide key information about an area. For professional scholars, even in social history, the local becomes interesting only within a larger context, however. Local case studies may throw light on wider questions (Reid and Macafee 127).This highlights the value which local studies can contribute as part of research as these collections may provide case studies to explore, or different avenues to investigate. It also shows the importance of information in many local studies collections being brought together so the separate, local information can be connected to other local information. This bringing together can be as a result of research or through an aggregation system such as Trove (“Trove”).Peter Reid and Caroline Macafee have stated that becausethe potential is always there for local history to be pulled into issues of wider concern, it could be said to occupy a liminal space, a borderland between knowledge that is personal, and therefore academically trivial, and knowledge that is generalizable and therefore worthy of scientific attention. (127)This seems a harsh description, but it shows how these collections can be undervalued and that this undervaluing can risk them being overlooked by biographers, historians, and other researchers. Despite this thinking, local studies collections can offer unique and valuable insights into people and places; including for regional areas. The skilled library staff who manage these collections are also key resources in the history of regional areas, as they can help connect the local studies information to other local collections. As well as connecting people to the resources, the unwritten knowledge of staff is a separate and very important resource.How to Discover Local Studies CollectionsA good way to start exploring local studies collections is by searching Trove. Trove had, around the time of writing, “over 457,524,491 Australian and online resources” (online) and is an Australia-wide database, managed by the National Library of Australia. It enables you to search many library catalogues with one search tool which means that you can search once, in one place, rather than by individual library or museum catalogues. Trove brings together metadata including catalogue records, mostly from library catalogues, from organisations who choose to contribute access to their information. Some of the resources you can search for on Trove are in local studies collections in public libraries or held by other organisations which collect local information such as state and national libraries. Start your search by the name of the location which you are exploring. Be as specific as possible, as you can always broaden your search later. If the item has been digitised, or is already digital, you are often able to view or listen to this material online.As well as providing access to library catalogues, many local newspapers have been digitised and are searchable and viewable on Trove. Some newspapers have been digitised up to 1955, while some titles have fewer years available online, and microfilm will need to be used to find more recently produced information. Public libraries often hold the microfilm for their local newspapers. State libraries may hold them as well. This timeline of digital access is important to keep in mind as searching newspapers on Trove is very easy and searching on microfilm is not so appealing because of having to work through each newspaper page by page, microfilm roll by microfilm roll. You need to check the information about what issues of a newspaper have been digitised so you know when you need to start looking at microfilm copies rather than digitised ones. Older newspapers often include syndicated stories, so an event may have occurred in an area you are interested in but be reported in the newspaper from another area. You could also use the Trove API (application programming interface) to explore high volume digitised newspaper or catalogue data (Sherratt).This method of starting with Trove can also be a helpful way to find out which public library is in the area you are looking for, as the name of the organisation which holds the resources is listed online. You can click on a link to take you to their catalogue. While public libraries are often named for the town they are in, you may be looking for a place with a different name, so this method can be helpful. It can also show resources held in other libraries which may relate to the area of your research. Trove Mosaic by Mitchell Whitelaw (online), although an older interface, is a visual way to explore Trove and clearly highlights the different organisations contributing photographs.Libraries include local studies photographs in their social media and a very small number of them are collecting social media about their community (Forsyth et al.). Searching social media for terms such as #flashbackFriday or #throwbackThursday may also provide a way to discover local studies material online, although depending on your research topic, this method could be too haphazard an approach. There are still some local studies blogs to follow (MacRitchie) and searching for these can also provide information about local studies material in public libraries.Public Libraries and Local StudiesYou can also start at the public library. Depending on where in Australia you are searching there are different tools to help find your local public library. Rather than list them all, a useful starting point is to go to your favourite search engine and search for the name of town/suburb followed by public library. This should connect you with information about the local library through the library website, the regional library website (where two or more councils work together to provide a public library service), or via the council website. This is likely to provide sufficient information to be able to contact the library. However, before you contact the library, search the library catalogue. They may even have a separate local studies database for some or all of the local studies collection. This is why is it a good idea to start with Trove, before going to a local library search, as Trove should be aggregating collection information from a variety of sources bringing together the local public library as well as other organisations (sometimes some unexpected ones) which have material of relevance.Work from the State Library of New South Wales had demonstrated that not everything in local studies collection is catalogued (State Library of New South Wales) which makes it impossible to search for everything online. Quite a few (but not all) public libraries have a webpage where they describe their local studies collections and services. This can provide helpful information so that if you do not find something online you can telephone or email the library seeking further information. If the library is nearby you could simply visit it, but it is best to ring or email first if your time is limited, as it can be helpful to make an appointment to ensure that staff will be able to assist you with using the library collection. For searching the catalogues for local studies information, again, be as specific as possible, knowing you can always broaden your search terms. Helpfully, most (but not all) library catalogues have a sort by date option once material has been found, and some even have local studies specific search help. Often you can view or listen to digitised material online, but some libraries only make low resolution images available, which is rarely of good enough quality for research. When you have searched the catalogue or other online local studies database and not found anything, contact the library as they will be able to provide further information.Library staff will help you use their collections. Some public libraries charge a fee for more detailed research, others, quite reasonably, require you to do this more detailed research yourself.There are many variables, and it really depends on what and where you are researching. Perhaps you are looking for a written history of each area you plan to visit when exploring regional areas of Australia, or you might be planning to visit local studies collections to see how they lead you to areas and stories of local interest, or there is a particular research question you want to explore in several regional areas. How local studies books and other materials are written will depend on the time they were written, and the purpose for them. They can depict ideas and priorities which are outdated and/or offensive.Not Everything Is on TroveWhile Trove is a suggested starting place, given that every item in local studies collections is not catalogued, visiting the local public library can be an important step to take. Always check if the local studies area has different opening hours to the rest of the library. If part or all of the local studies collection is in a locked room, visiting the library at a very busy time is unwise as it may make it harder for the staff to assist you as they will have many other priorities and you may not be able to access the collection.Visiting the Library Visiting a public library and looking at how their local studies collection is arranged can help you see the collecting priorities. It also makes it very clear as to which public libraries have prioritised their local studies information. Occasionally the local studies area will be a partnership with both the library and the local family or local history society providing resources or the collection. This can result in different access conditions being applied to different collections.Visiting the collection means you can talk with the library staff about the history of the area as part of your experience of regional Australia. It is interesting to see how different local studies collections are arranged and how the local area is promoted through the collection and any displays or merchandise for sale. Often local publications will be for sale in the library so that you can purchase titles about the history of the area. Some councils commission histories of their areas, other times niche histories will be written by people in the community and the local studies collection can be a helpful way to discover these.Keep in mind that local government boundaries change (Leigh) and this may mean that resources you are looking for could be in a neighbouring area, rather than the location you are exploring. This is another reason to start with Trove.You May Not Be Able to See Everything Even If You Visit...For reasons of preservation you may not be able to see everything in the local studies collection even if you visit. Sometimes you need to watch out for special tours, which may not coincide with your visit to the area. There may be parts of the collection stored but not fully explored by staff, waiting their time in the queue to be catalogued and made available for research. Generally public library staff will be very helpful for you in your research, particularly if you have specific questions about the area.Know about CopyrightKnow the information about duration of copyright as some libraries say on their catalogues that everything which has been digitised is in copyright. This may be accidental as a result of some bulk cataloguing processes linked with digitisation. Stating something is in copyright is not the same as it being in copyright. The Australian Copyright Council has a helpful information sheet on the duration of copyright to help you understand what is in copyright and how long it is likely to continue to be in copyright.ChallengesThere will be collection gaps. The risk of bias is highlighted by the statement that libraries “are not, and have never been, socially or politically neutral institutions” (Gibson et al. 753). There has not been detailed research exploring these collection gaps, so the exact extent of exclusion or omission of information is not yet able to be quantified. There is arenewed professional imperative to position information centers as central locations for social justice work [which] has also turned our attention to the need to preserve materials that support a diverse and pluralistic society … [and] as a duty to steward unexplored histories. (Sheffield 573)Material may not be in the collection because it was not collected, or because it was not created. For example, in the past not everyone could afford a camera which means they may not have photographed or videoed their family, or public events. Not every grave had a headstone so someone may not have their grave recorded. Public libraries recognise these gaps, and in some areas library staff create or commission content to help with these omissions. For example, oral histories can be recorded to include stories which were not available in other ways, and photographs can be taken of current events to make sure a wider exploration of local stories are recorded in the local studies collection.Conclusion (and Opportunities)Grant White states, in relation to local studies that thesurvival of the artefact is only ever significant when it can be accessed by someone who can see meaning in it. The collection is in fact much more than the material sitting upon the shelves, it is access to it. Access which keeps it current in the community memory rather than as a separated, isolated adjunct. It is also the participation of the community in the creation of the collection, feeding it with its experience, reflections and memories. (98)This access is crucial, and with digitisation and digital collecting the access can increasingly be at a distance, without actually visiting a library. This increasing online access, especially through aggregated sites such as Trove, will hopefully enable research exploring the similarities and differences of regional areas, as connections can be made, and not only by people who can afford to travel to different places to do research. Digitisation, digital collecting, effective cataloguing and use of metadata can open up access to collections, just as digital preservation, preservation of other formats and conservation can help make sure that these materials are available into the future. Connecting to skilled staff who manage these collections is another way of exploring access as there will be information not recorded anywhere you can find, but which the staff may know because of their experience and knowledge of the collection as well as their knowledge of the community they work in.If you have been using public library local studies collections for research, it is helpful if you can share this research back with the public library, helping to build their collection for other people who are researching the region, even if they are exploring different topics. It may be a printed book you are providing, but more public libraries are able to accept donations of ebooks, or other online content. This can be a helpful way for you to contribute to the collections which have assisted in your research.ReferencesBateman, Shirley. “Innovation in Local Studies Collections and Programs: How Melbourne Library Service Is Fostering Community Pride.” Australasian Public Libraries and Information Services 25.1 (2012): 12–18.Dewe, Michael. Ed. Local Studies Collection Management. London: Ashgate, 2002.Forsyth, Ellen, Ngarie Macqueen, and Daniel Nitsikopoulos. Contemporary Collecting: Collecting Instagram for Local Studies. ALIA Information Online, 2019.Gibson, Amelia N., Renate L. Chancellor, Nicole A. Cooke, Sarah Park Dahlen, Shari A. Lee, and Yasmeen L. Shorish. “Libraries on the Frontlines: Neutrality and Social Justice.” Equality, Diversity and Inclusion: An International Journal 36.8 (2017): 751–66.Gregg, Alison. “Our Heritage: The Role of Archives and Local Studies Collections.” Australasian Public Libraries and Information Services 15.3 (2002): 126–32.Heap, Amy, and Bob Pymm. “Wagga Wagga Women’s Wireless and the Web: Local Studies and New Technologies.” The Australian Library Journal 58.1 (2009): 5–16.Johnston, Clinton. “Capture and Release: Cataloguing Cultural Heritage at Marrickville Library and History Services.” The Australian Library Journal 62.3 (2013): 218–23.Leigh, Carol. “From Filing Cabinet to Cultural Centre: Creating a Community History Centre in Wanneroo Western Australia.” Australasian Public Libraries and Information Services 25.2 (2012): 83–88.MacRitchie, John. “The Manly Art of Local Studies Blogging: A New Approach to Old Stories.” Australasian Public Libraries and Information Services 25.2 (2012): 89–93.McCausland, Sigrid. “Archives for the People: Public Libraries and Archives in New South Wales.” The Australian Library Journal 64.4 (2015): 270.Reid, Peter H., and Caroline Macafee. “The Philosophy of Local Studies in the Interactive Age.” Journal of Librarianship and Information Science 39.3 (2007): 126–41.Sheffield, Rebecka T. “More than Acid-Free Folders: Extending the Concept of Preservation to Include the Stewardship of Unexplored Histories.” Library Trends 64.3 (2016): 572.Sherratt, Tim. “Asking Better Questions: History, Trove and the Risks That Count.” Copyfight. Ed. Phillipa McGuinness. Sydney: NewSouth Publishing, 2015. 112–24.State Library of New South Wales. NSW Public Libraries Local Studies Audit. 2014.“Trove.” Trove 7 Apr. 2019 <https://trove.nla.gov.au/>.White, Grant. “Message in a Bottle: Community Memory in the Local Studies Collection.” APLIS 13.3 (2000): 6.Whitelaw, Mitchell. “TroveMosaic: Exploring Trove Images.” TroveMosaic: Exploring Trove Images 7 Apr. 2019 <http://mtchl.net/TroveMosaic/>.
APA, Harvard, Vancouver, ISO, and other styles
31

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
32

Mallan, Kerry Margaret, and Annette Patterson. "Present and Active: Digital Publishing in a Post-print Age." M/C Journal 11, no. 4 (June 24, 2008). http://dx.doi.org/10.5204/mcj.40.

Full text
Abstract:
At one point in Victor Hugo’s novel, The Hunchback of Notre Dame, the archdeacon, Claude Frollo, looked up from a book on his table to the edifice of the gothic cathedral, visible from his canon’s cell in the cloister of Notre Dame: “Alas!” he said, “this will kill that” (146). Frollo’s lament, that the book would destroy the edifice, captures the medieval cleric’s anxiety about the way in which Gutenberg’s print technology would become the new universal means for recording and communicating humanity’s ideas and artistic expression, replacing the grand monuments of architecture, human engineering, and craftsmanship. For Hugo, architecture was “the great handwriting of humankind” (149). The cathedral as the material outcome of human technology was being replaced by the first great machine—the printing press. At this point in the third millennium, some people undoubtedly have similar anxieties to Frollo: is it now the book’s turn to be destroyed by yet another great machine? The inclusion of “post print” in our title is not intended to sound the death knell of the book. Rather, we contend that despite the enduring value of print, digital publishing is “present and active” and is changing the way in which research, particularly in the humanities, is being undertaken. Our approach has three related parts. First, we consider how digital technologies are changing the way in which content is constructed, customised, modified, disseminated, and accessed within a global, distributed network. This section argues that the transition from print to electronic or digital publishing means both losses and gains, particularly with respect to shifts in our approaches to textuality, information, and innovative publishing. Second, we discuss the Children’s Literature Digital Resources (CLDR) project, with which we are involved. This case study of a digitising initiative opens out the transformative possibilities and challenges of digital publishing and e-scholarship for research communities. Third, we reflect on technology’s capacity to bring about major changes in the light of the theoretical and practical issues that have arisen from our discussion. I. Digitising in a “post-print age” We are living in an era that is commonly referred to as “the late age of print” (see Kho) or the “post-print age” (see Gunkel). According to Aarseth, we have reached a point whereby nearly all of our public and personal media have become more or less digital (37). As Kho notes, web newspapers are not only becoming increasingly more popular, but they are also making rather than losing money, and paper-based newspapers are finding it difficult to recruit new readers from the younger generations (37). Not only can such online-only publications update format, content, and structure more economically than print-based publications, but their wide distribution network, speed, and flexibility attract advertising revenue. Hype and hyperbole aside, publishers are not so much discarding their legacy of print, but recognising the folly of not embracing innovative technologies that can add value by presenting information in ways that satisfy users’ needs for content to-go or for edutainment. As Kho notes: “no longer able to satisfy customer demand by producing print-only products, or even by enabling online access to semi-static content, established publishers are embracing new models for publishing, web-style” (42). Advocates of online publishing contend that the major benefits of online publishing over print technology are that it is faster, more economical, and more interactive. However, as Hovav and Gray caution, “e-publishing also involves risks, hidden costs, and trade-offs” (79). The specific focus for these authors is e-journal publishing and they contend that while cost reduction is in editing, production and distribution, if the journal is not open access, then costs relating to storage and bandwith will be transferred to the user. If we put economics aside for the moment, the transition from print to electronic text (e-text), especially with electronic literary works, brings additional considerations, particularly in their ability to make available different reading strategies to print, such as “animation, rollovers, screen design, navigation strategies, and so on” (Hayles 38). Transition from print to e-text In his book, Writing Space, David Bolter follows Victor Hugo’s lead, but does not ask if print technology will be destroyed. Rather, he argues that “the idea and ideal of the book will change: print will no longer define the organization and presentation of knowledge, as it has for the past five centuries” (2). As Hayles noted above, one significant indicator of this change, which is a consequence of the shift from analogue to digital, is the addition of graphical, audio, visual, sonic, and kinetic elements to the written word. A significant consequence of this transition is the reinvention of the book in a networked environment. Unlike the printed book, the networked book is not bound by space and time. Rather, it is an evolving entity within an ecology of readers, authors, and texts. The Web 2.0 platform has enabled more experimentation with blending of digital technology and traditional writing, particularly in the use of blogs, which have spawned blogwriting and the wikinovel. Siva Vaidhyanathan’s The Googlization of Everything: How One Company is Disrupting Culture, Commerce and Community … and Why We Should Worry is a wikinovel or blog book that was produced over a series of weeks with contributions from other bloggers (see: http://www.sivacracy.net/). Penguin Books, in collaboration with a media company, “Six Stories to Start,” have developed six stories—“We Tell Stories,” which involve different forms of interactivity from users through blog entries, Twitter text messages, an interactive google map, and other features. For example, the story titled “Fairy Tales” allows users to customise the story using their own choice of names for characters and descriptions of character traits. Each story is loosely based on a classic story and links take users to synopses of these original stories and their authors and to online purchase of the texts through the Penguin Books sales website. These examples of digital stories are a small part of the digital environment, which exploits computer and online technologies’ capacity to be interactive and immersive. As Janet Murray notes, the interactive qualities of digital environments are characterised by their procedural and participatory abilities, while their immersive qualities are characterised by their spatial and encyclopedic dimensions (71–89). These immersive and interactive qualities highlight different ways of reading texts, which entail different embodied and cognitive functions from those that reading print texts requires. As Hayles argues: the advent of electronic textuality presents us with an unparalleled opportunity to reformulate fundamental ideas about texts and, in the process, to see print as well as electronic texts with fresh eyes (89–90). The transition to e-text also highlights how digitality is changing all aspects of everyday life both inside and outside the academy. Online teaching and e-research Another aspect of the commercial arm of publishing that is impacting on academe and other organisations is the digitising and indexing of print content for niche distribution. Kho offers the example of the Mark Logic Corporation, which uses its XML content platform to repurpose content, create new content, and distribute this content through multiple portals. As the promotional website video for Mark Logic explains, academics can use this service to customise their own textbooks for students by including only articles and book chapters that are relevant to their subject. These are then organised, bound, and distributed by Mark Logic for sale to students at a cost that is generally cheaper than most textbooks. A further example of how print and digital materials can form an integrated, customised source for teachers and students is eFictions (Trimmer, Jennings, & Patterson). eFictions was one of the first print and online short story anthologies that teachers of literature could customise to their own needs. Produced as both a print text collection and a website, eFictions offers popular short stories in English by well-known traditional and contemporary writers from the US, Australia, New Zealand, UK, and Europe, with summaries, notes on literary features, author biographies, and, in one instance, a YouTube movie of the story. In using the eFictions website, teachers can build a customised anthology of traditional and innovative stories to suit their teaching preferences. These examples provide useful indicators of how content is constructed, customised, modified, disseminated, and accessed within a distributed network. However, the question remains as to how to measure their impact and outcomes within teaching and learning communities. As Harley suggests in her study on the use and users of digital resources in the humanities and social sciences, several factors warrant attention, such as personal teaching style, philosophy, and specific disciplinary requirements. However, in terms of understanding the benefits of digital resources for teaching and learning, Harley notes that few providers in her sample had developed any plans to evaluate use and users in a systematic way. In addition to the problems raised in Harley’s study, another relates to how researchers can be supported to take full advantage of digital technologies for e-research. The transformation brought about by information and communication technologies extends and broadens the impact of research, by making its outputs more discoverable and usable by other researchers, and its benefits more available to industry, governments, and the wider community. Traditional repositories of knowledge and information, such as libraries, are juggling the space demands of books and computer hardware alongside increasing reader demand for anywhere, anytime, anyplace access to information. Researchers’ expectations about online access to journals, eprints, bibliographic data, and the views of others through wikis, blogs, and associated social and information networking sites such as YouTube compete with the traditional expectations of the institutions that fund libraries for paper-based archives and book repositories. While university libraries are finding it increasingly difficult to purchase all hardcover books relevant to numerous and varied disciplines, a significant proportion of their budgets goes towards digital repositories (e.g., STORS), indexes, and other resources, such as full-text electronic specialised and multidisciplinary journal databases (e.g., Project Muse and Proquest); electronic serials; e-books; and specialised information sources through fast (online) document delivery services. An area that is becoming increasingly significant for those working in the humanities is the digitising of historical and cultural texts. II. Bringing back the dead: The CLDR project The CLDR project is led by researchers and librarians at the Queensland University of Technology, in collaboration with Deakin University, University of Sydney, and members of the AustLit team at The University of Queensland. The CLDR project is a “Research Community” of the electronic bibliographic database AustLit: The Australian Literature Resource, which is working towards the goal of providing a complete bibliographic record of the nation’s literature. AustLit offers users with a single entry point to enhanced scholarly resources on Australian writers, their works, and other aspects of Australian literary culture and activities. AustLit and its Research Communities are supported by grants from the Australian Research Council and financial and in-kind contributions from a consortium of Australian universities, and by other external funding sources such as the National Collaborative Research Infrastructure Strategy. Like other more extensive digitisation projects, such as Project Gutenberg and the Rosetta Project, the CLDR project aims to provide a centralised access point for digital surrogates of early published works of Australian children’s literature, with access pathways to existing resources. The first stage of the CLDR project is to provide access to digitised, full-text, out-of-copyright Australian children’s literature from European settlement to 1945, with selected digitised critical works relevant to the field. Texts comprise a range of genres, including poetry, drama, and narrative for young readers and picture books, songs, and rhymes for infants. Currently, a selection of 75 e-texts and digital scans of original texts from Project Gutenberg and Internet Archive have been linked to the Children’s Literature Research Community. By the end of 2009, the CLDR will have digitised approximately 1000 literary texts and a significant number of critical works. Stage II and subsequent development will involve digitisation of selected texts from 1945 onwards. A precursor to the CLDR project has been undertaken by Deakin University in collaboration with the State Library of Victoria, whereby a digital bibliographic index comprising Victorian School Readers has been completed with plans for full-text digital surrogates of a selection of these texts. These texts provide valuable insights into citizenship, identity, and values formation from the 1930s onwards. At the time of writing, the CLDR is at an early stage of development. An extensive survey of out-of-copyright texts has been completed and the digitisation of these resources is about to commence. The project plans to make rich content searchable, allowing scholars from children’s literature studies and education to benefit from the many advantages of online scholarship. What digital publishing and associated digital archives, electronic texts, hypermedia, and so forth foreground is the fact that writers, readers, publishers, programmers, designers, critics, booksellers, teachers, and copyright laws operate within a context that is highly mediated by technology. In his article on large-scale digitisation projects carried out by Cornell and University of Michigan with the Making of America collection of 19th-century American serials and monographs, Hirtle notes that when special collections’ materials are available via the Web, with appropriate metadata and software, then they can “increase use of the material, contribute to new forms of research, and attract new users to the material” (44). Furthermore, Hirtle contends that despite the poor ergonomics associated with most electronic displays and e-book readers, “people will, when given the opportunity, consult an electronic text over the print original” (46). If this preference is universally accurate, especially for researchers and students, then it follows that not only will the preference for electronic surrogates of original material increase, but preference for other kinds of electronic texts will also increase. It is with this preference for electronic resources in mind that we approached the field of children’s literature in Australia and asked questions about how future generations of researchers would prefer to work. If electronic texts become the reference of choice for primary as well as secondary sources, then it seems sensible to assume that researchers would prefer to sit at the end of the keyboard than to travel considerable distances at considerable cost to access paper-based print texts in distant libraries and archives. We considered the best means for providing access to digitised primary and secondary, full text material, and digital pathways to existing online resources, particularly an extensive indexing and bibliographic database. Prior to the commencement of the CLDR project, AustLit had already indexed an extensive number of children’s literature. Challenges and dilemmas The CLDR project, even in its early stages of development, has encountered a number of challenges and dilemmas that centre on access, copyright, economic capital, and practical aspects of digitisation, and sustainability. These issues have relevance for digital publishing and e-research. A decision is yet to be made as to whether the digital texts in CLDR will be available on open or closed/tolled access. The preference is for open access. As Hayles argues, copyright is more than a legal basis for intellectual property, as it also entails ideas about authorship, creativity, and the work as an “immaterial mental construct” that goes “beyond the paper, binding, or ink” (144). Seeking copyright permission is therefore only part of the issue. Determining how the item will be accessed is a further matter, particularly as future technologies may impact upon how a digital item is used. In the case of e-journals, the issue of copyright payment structures are evolving towards a collective licensing system, pay-per-view, and other combinations of print and electronic subscription (see Hovav and Gray). For research purposes, digitisation of items for CLDR is not simply a scan and deliver process. Rather it is one that needs to ensure that the best quality is provided and that the item is both accessible and usable by researchers, and sustainable for future researchers. Sustainability is an important consideration and provides a challenge for institutions that host projects such as CLDR. Therefore, items need to be scanned to a high quality and this requires an expensive scanner and personnel costs. Files need to be in a variety of formats for preservation purposes and so that they may be manipulated to be useable in different technologies (for example, Archival Tiff, Tiff, Jpeg, PDF, HTML). Hovav and Gray warn that when technology becomes obsolete, then content becomes unreadable unless backward integration is maintained. The CLDR items will be annotatable given AustLit’s NeAt funded project: Aus-e-Lit. The Aus-e-Lit project will extend and enhance the existing AustLit web portal with data integration and search services, empirical reporting services, collaborative annotation services, and compound object authoring, editing, and publishing services. For users to be able to get the most out of a digital item, it needs to be searchable, either through double keying or OCR (optimal character recognition). The value of CLDR’s contribution The value of the CLDR project lies in its goal to provide a comprehensive, searchable body of texts (fictional and critical) to researchers across the humanities and social sciences. Other projects seem to be intent on putting up as many items as possible to be considered as a first resort for online texts. CLDR is more specific and is not interested in simply generating a presence on the Web. Rather, it is research driven both in its design and implementation, and in its focussed outcomes of assisting academics and students primarily in their e-research endeavours. To this end, we have concentrated on the following: an extensive survey of appropriate texts; best models for file location, distribution, and use; and high standards of digitising protocols. These issues that relate to data storage, digitisation, collections, management, and end-users of data are aligned with the “Development of an Australian Research Data Strategy” outlined in An Australian e-Research Strategy and Implementation Framework (2006). CLDR is not designed to simply replicate resources, as it has a distinct focus, audience, and research potential. In addition, it looks at resources that may be forgotten or are no longer available in reproduction by current publishing companies. Thus, the aim of CLDR is to preserve both the time and a period of Australian history and literary culture. It will also provide users with an accessible repository of rare and early texts written for children. III. Future directions It is now commonplace to recognize that the Web’s role as information provider has changed over the past decade. New forms of “collective intelligence” or “distributed cognition” (Oblinger and Lombardi) are emerging within and outside formal research communities. Technology’s capacity to initiate major cultural, social, educational, economic, political and commercial shifts has conditioned us to expect the “next big thing.” We have learnt to adapt swiftly to the many challenges that online technologies have presented, and we have reaped the benefits. As the examples in this discussion have highlighted, the changes in online publishing and digitisation have provided many material, network, pedagogical, and research possibilities: we teach online units providing students with access to e-journals, e-books, and customized archives of digitised materials; we communicate via various online technologies; we attend virtual conferences; and we participate in e-research through a global, digital network. In other words, technology is deeply engrained in our everyday lives. In returning to Frollo’s concern that the book would destroy architecture, Umberto Eco offers a placatory note: “in the history of culture it has never happened that something has simply killed something else. Something has profoundly changed something else” (n. pag.). Eco’s point has relevance to our discussion of digital publishing. The transition from print to digital necessitates a profound change that impacts on the ways we read, write, and research. As we have illustrated with our case study of the CLDR project, the move to creating digitised texts of print literature needs to be considered within a dynamic network of multiple causalities, emergent technological processes, and complex negotiations through which digital texts are created, stored, disseminated, and used. Technological changes in just the past five years have, in many ways, created an expectation in the minds of people that the future is no longer some distant time from the present. Rather, as our title suggests, the future is both present and active. References Aarseth, Espen. “How we became Postdigital: From Cyberstudies to Game Studies.” Critical Cyber-culture Studies. Ed. David Silver and Adrienne Massanari. New York: New York UP, 2006. 37–46. An Australian e-Research Strategy and Implementation Framework: Final Report of the e-Research Coordinating Committee. Commonwealth of Australia, 2006. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Erlbaum, 1991. Eco, Umberto. “The Future of the Book.” 1994. 3 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Gunkel, David. J. “What's the Matter with Books?” Configurations 11.3 (2003): 277–303. Harley, Diane. “Use and Users of Digital Resources: A Focus on Undergraduate Education in the Humanities and Social Sciences.” Research and Occasional Papers Series. Berkeley: University of California. Centre for Studies in Higher Education. 12 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Hayles, N. Katherine. My Mother was a Computer: Digital Subjects and Literary Texts. Chicago: U of Chicago P, 2005. Hirtle, Peter B. “The Impact of Digitization on Special Collections in Libraries.” Libraries & Culture 37.1 (2002): 42–52. Hovav, Anat and Paul Gray. “Managing Academic E-journals.” Communications of the ACM 47.4 (2004): 79–82. Hugo, Victor. The Hunchback of Notre Dame (Notre-Dame de Paris). Ware, Hertfordshire: Wordsworth editions, 1993. Kho, Nancy D. “The Medium Gets the Message: Post-Print Publishing Models.” EContent 30.6 (2007): 42–48. Oblinger, Diana and Marilyn Lombardi. “Common Knowledge: Openness in Higher Education.” Opening up Education: The Collective Advancement of Education Through Open Technology, Open Content and Open Knowledge. Ed. Toru Liyoshi and M. S. Vijay Kumar. Cambridge, MA: MIT Press, 2007. 389–400. Murray, Janet H. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. Cambridge, MA: MIT Press, 2001. Trimmer, Joseph F., Wade Jennings, and Annette Patterson. eFictions. New York: Harcourt, 2001.
APA, Harvard, Vancouver, ISO, and other styles
33

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10, no. 6 (April 1, 2008). http://dx.doi.org/10.5204/mcj.2723.

Full text
Abstract:
“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media? How could practice-based approaches inform this research instead of relying on espoused theories-in-use? What new methodologies could be developed for CJ implementation? What role can the “heroic” individual reporter or editor have in “the swarm”? Do the claims about OhmyNews and other sites stand up to longitudinal observation? Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators? How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/>. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 http://www.innosight.com/documents/Theory%20Building.pdf>. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit>. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 http://www.gladwell.com/1997/1997_03_17_a_cool.htm>. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all>. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 http://www.demos.co.uk/publications/proameconomy>. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm>. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out>. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine>. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 http://blog.futurestreetconsulting.com/?p=39>. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973. Citation reference for this article MLA Style Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10.6/11.1 (2008). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0804/10-burns.php>. APA Style Burns, A. (Apr. 2008) "Select Issues with New Media Theories of Citizen Journalism," M/C Journal, 10(6)/11(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0804/10-burns.php>.
APA, Harvard, Vancouver, ISO, and other styles
34

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 11, no. 1 (June 1, 2008). http://dx.doi.org/10.5204/mcj.30.

Full text
Abstract:
“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media?How could practice-based approaches inform this research instead of relying on espoused theories-in-use?What new methodologies could be developed for CJ implementation?What role can the “heroic” individual reporter or editor have in “the swarm”?Do the claims about OhmyNews and other sites stand up to longitudinal observation?Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators?How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 < http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/ >. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 < http://www.innosight.com/documents/Theory%20Building.pdf >. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 < http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit >. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 < http://www.gladwell.com/1997/1997_03_17_a_cool.htm >. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 < http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all >. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 < http://www.demos.co.uk/publications/proameconomy >. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 < http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm >. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 < http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out >. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 < http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine >. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 < http://blog.futurestreetconsulting.com/?p=39 >. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973.
APA, Harvard, Vancouver, ISO, and other styles
35

Ruggill, Judd, and Ken McAllister. "The Wicked Problem of Collaboration." M/C Journal 9, no. 2 (May 1, 2006). http://dx.doi.org/10.5204/mcj.2606.

Full text
Abstract:
In “Dilemmas in a General Theory of Planning,” urban planners Horst Rittel and Melvin Webber outline what they term “wicked problems.” According to Rittel and Webber, wicked problems are unavoidably “ill-defined,” that is, unlike “problems in the natural sciences, which are definable and separable and may have solutions that are findable…[wicked problems] are never solved. At best they are only re-solved—over and over again” (160). Rittel and Webber were thinking specifically of the challenges involved in making decisions within immensely complex social circumstances—building highways through cities and designing low income housing projects, for example—but public policy-making and urban design are not the only fields rife with wicked problems. Indeed, the nub of Rittel and Webber’s articulation of wicked problems concerns a phenomenon common to many disciplines: interdisciplinary collaboration. As anyone who has collaborated with people outside her area of expertise will acknowledge, interdisciplinary collaboration itself is among the wickedest problems of all. By way of introduction, we direct the Learning Games Initiative (LGI), a transdisciplinary, inter-institutional research group that studies, teaches with, and builds computer games. In the seven years since LGI was inaugurated, we have undertaken many productive and well-received collaborations, including: 1) leading workshops at national and international conferences; 2) presenting numerous academic talks; 3) editing academic journals; 4) writing books, book chapters, journal articles, and other scholarly materials; 5) exhibiting creative and archival work in museums, galleries, and libraries; and 6) building one of the largest academic research archives of computer games, systems, paraphernalia, and print-, video-, and audio-scholarship in the world. We thus have a fair bit of experience with the wicked problem of collaboration. The purpose of this article is to share some of that experience with readers and to describe candidly some of the challenges we have faced—and sometimes overcome—working collaboratively across disciplinary, institutional, and even international boundaries. Collaborative Circle? Michael Farrell, whose illuminating analysis of “collaborative circles” has lent much to scholars’ understandings of group dynamics within creative contexts, succinctly describes how many such groups form: “A collaborative circle is a set of peers in the same discipline who, through open exchange of support, ideas, and criticism develop into an interdependent group with a common vision that guides their creative work” (266). Farrell’s model, while applicable to several of the smaller projects LGI has nurtured over the years, does not capture the idiosyncratic organizational method that has evolved more broadly within our collective. Rather, LGI has always tended to function according to a model more akin to that found in used car dealerships, one where “no reasonable offer will be refused.” LGI is open to anyone willing to think hard and get their hands dirty, which of course has molded the organization and its projects in remarkable ways. Unlike Farrell’s collaborative circles, for example, LGI’s collaborative model actually decentralizes the group’s study and production of culture. Any member from anywhere—not just “peers in the same discipline”—can initiate or join a project provided she or he is willing to trade in the coin of the realm: sweat equity. Much like the programmers of the open source software movement, LGI’s members work only on what excites them, and with other similarly motivated people. The “buy-in,” simply, is interest and a readiness to assume some level of responsibility for the successes and failures of a given project. In addition to decentralizing the group, LGI’s collaborative model has emerged such that it naturally encourages diversity, swelling our ranks with all kinds of interesting folks, from fine artists to clergy members to librarians. In large part this is because our members view “peers” in the most expansive way possible; sure, optical scientists can help us understand how virtual cameras simulate the real properties of lenses and research linguists can help us design more effective language-in-context tools for our games. However, in an organization that always tries to understand the layers of meaning-making that constitute computer games, such technical expertise is only one stratum. For a game about the cultural politics of ancient Greece that LGI has been working on for the past year, our members invited a musical instrument maker, a potter, and a school teacher to join the development team. These new additions—all experts and peers as far as LGI is concerned—were not merely consultants but became part of the development team, often working in areas of the project completely outside their own specialties. While some outsiders have criticized this project—currently known as “Aristotle’s Assassins”—for being too slow in development, the learning taking place as it moves forward is thrilling to those on the inside, where everyone is learning from everyone else. One common consequence of this dynamic is, as Farrell points out, that the work of the individual members is transformed: “Those who are merely good at their discipline become masters, and, working together, very ordinary people make extraordinary advances in their field” (2). Additionally, the diversity that gives LGI its true interdisciplinarity also makes for praxical as well as innovative projects. The varying social and intellectual concerns of the LGI’s membership means that every collaboration is also an exploration of ethics, responsibility, epistemology, and ideology. This is part of what makes LGI so special: there are multiple levels of learning that underpin every project every day. In LGI we are fond of saying that games teach multiple things in multiple ways. So too, in fact, does collaborating on one of LGI’s projects because members are constantly forced to reevaluate their ways of seeing in order to work with one another. This has been particularly rewarding in our international projects, such as our recently initiated project investigating the relationships among the mass media, new media, and cultural resource management practices. This project, which is building collaborative relationships among a team of archaeologists, game designers, media historians, folklorists, and grave repatriation experts from Cambodia, the Philippines, Australia, and the U.S., is flourishing, not because its members are of the same discipline nor because they share the same ideology. Rather, the team is maturing as a collaborative and productive entity because the focus of its work raises an extraordinary number of questions that have yet to be addressed by national and international researchers. In LGI, much of the sweat equity we contribute involves trying to answer questions like these in ways that are meaningful for our international research teams. In our experience, it is in the process of investigating such questions that effective collaborative relationships are cemented and within which investigators end up learning about more than just the subject matter at hand. They also learn about the micro-cultures, histories, and economies that provide the usually invisible rhetorical infrastructures that ground the subject matter and to which each team member is differently attuned. It is precisely because of this sometimes slow, sometimes tense learning/teaching dynamic—a dynamic too often invoked in both academic and industry settings to discourage collaboration—that François Chesnais calls attention to the fact that collaborative projects frequently yield more benefits than the sum of their parts suggests possible. This fact, says Chesnais, should lead institutions to value collaborative projects more highly as “resource-creating, value-creating and surplus-creating potentialities” (22). Such work is always risky, of course, and Jitendra Mohan, a scholar specializing in cross-cultural collaborations within the field of psychology, writes that international collaboration “raises methodological problems in terms of the selection of culturally-coloured items and their historical as well as semantic meaning…” (314). Mohan means this as a warning and it is heeded as such by LGI members; at the same time, however, it is precisely the identification and sorting out of such methodological problems that seems to excite our best collaborations and most innovative work. Given such promise, it is easy to see why LGI is quite happy to adopt the used car dealer’s slogan “no reasonable offer refused.” In fact, in LGI we see our open-door policy for projects as mirroring our primary object of study: games. This is another factor that we believe contributes to the success of our members’ collaborations. Commercial computer game development is a notoriously interdisciplinary and collaborative endeavor. By collaborating in a fashion similar to professional game developers, LGI members are constantly fashioning more complex understandings of the kinds of production practices and social interactions involved in game development; these practices and interactions are crucial to game studies precisely because they shape what games consist of, how they mean, and the ways in which they are consumed. For this reason, we think it foolish to refuse any reasonable offer to help us explore and understand these meaning-making processes. Wicked Problem Backlash Among the striking points that Rittel and Webber make about wicked problems is that solutions to them are usually created with great care and planning, and yet inevitably suffer severe criticism (at least) or utter annihilation (at worst). Far from being indicative of a bad solution, this backlash against a wicked problem’s solution is an integral element of what we call the “wicked problem dialectic.” The backlash against attempts to establish and nurture transdisciplinary collaboration is easy to document at multiple levels. For example, although our used car dealership model has created a rich research environment, it has also made the quotidian work of doing projects difficult. For one thing, organizing something as simple as a project meeting can take Herculean efforts. The wage earners are on a different schedule than the academics, who are on a different schedule from the artists, who are on a different schedule from the librarians. Getting everyone together in the same room at the same time (even virtually) is like herding cats. As co-directors of LGI, we have done our best to provide the membership with both synchronous and asynchronous resources to facilitate communication (e.g., conference-call enabled phones, online forums, chat clients, file-sharing software, and so on), but nothing beats face-to-face meetings, especially when projects grow complex or deadlines impend mercilessly. Nonetheless, our members routinely fight the meeting scheduling battle, despite the various communication options we have made available through our group’s website and in our physical offices. Most recently we have found that an organizational wiki makes the process of collecting and sharing notes, drawings, videos, segments of code, and drafts of writing decidedly easier than it had been, especially when the projects involve people who do not live a short distance (or a cheap phone call) away from each other. Similarly, not every member has the same amount of time to devote to LGI and its projects despite their considerable and demonstrated interest in them. Some folks are simply busier than others, and cannot contribute to projects as much as they might like. This can be a real problem when a project requires a particular skill set, and the owner of those skills is busy doing other things like working at a paying job or spending time with family. LGI’s projects are always done in addition to members’ regular workload, and it is understandable when that workload has to take precedence. Like regular exercise and eating right, the organization’s projects are the first things to go when life’s demands intrude. Different projects handle this challenge in a variety of ways, but the solutions always tend to reflect the general structure of the project itself. In projects that follow what Andrea Lunsford and Lisa Ede refer to as “hierarchical collaborations”—projects that are clearly structured, goal-oriented, and define clear roles for its participants—milestones and deadlines are set at the beginning of the project and are often tied to professional rewards that stand-in for a paycheck: recommendation letters, all-expenses-paid conference trips, guest speaking invitations, and so forth (133). Less organized projects—what Lunsford and Ede call “dialogic collaborations”—deal with time scheduling challenges differently. Inherently, dialogic collaborations such as these tend to be less hampered by time because they are loosely structured, accept and often encourage members to shift roles, and often value the process of working toward the project’s goals as highly as actually attaining them (134). The most common adaptive strategy used in these cases is simply for the most experienced members of the team to keep the project in motion. As long as something is happening, dialogic collaborations can be kept fruitful for a very long time, even when collaborators are only able to contribute once or twice a month. In our experience, as long as each project’s collaborators understand its operative expectations—which can, by the way, be a combination of hierarchical and dialogical modes—their work proceeds smoothly. Finally, there is the matter of expenses. As an institutionally unaffiliated collective, the LGI has no established revenue stream, which means project funding is either grant-based or comes out of the membership’s pockets. As anyone who has ever applied for a grant knows, it is one thing to write a grant, and another thing entirely to get it. Things are especially tough when grant monies are scarce, as they have been (at least on this side of the pond) since the U.S. economy started its downward spiral several years ago. Tapping the membership’s pockets is not really a viable funding option either. Even modest projects can be expensive, and most folks do not have a lot of spare cash to throw around. What this means, ultimately, is that even though our group’s members have carte blanche to do as they will, they must do so in a resource-starved environment. While it is sometimes disappointing that we are not able to fund certain projects despite their artistic and scholarly merit, LGI members learned long ago that such hardships rarely foreclose all opportunities. As Anne O’Meara and Nancy MacKenzie pointed out several years ago, many “seemingly extraneous features” of collaborative projects—not only financial limitations, but also such innocuous phenomena as where collaborators meet, the dance of their work and play patterns, their conflicting responsibilities, geographic separations, and the ways they talk to each other—emerge as influential factors in all collaborations (210). Thus, we understand in LGI that while our intermittent funding has influenced the dimension and direction of our group, it has also led to some outcomes that in hindsight we are glad we were led to. For example, while LGI originally began studying games in order to discover where production-side innovations might be possible, a series of funding shortfalls and serendipitous academic conversations led us to favor scholarly writing, which has now taken precedence over other kinds of projects. At the most practical level, this works out well because writing costs nothing but time, plus there is a rather desperate shortage of good game scholarship. Moreover, we have discovered that as LGI members have refined their scholarship and begun turning out books, chapters, and articles on a consistent basis, both they and the organization accrue publicity and credibility. Add to this the fact that for many of the group’s academics, traditional print-based work is more valued in the tenure and promotion economy than is, say, an educational game, an online teachers’ resource, or a workshop for a local parent-teacher association, and you have a pretty clear research path blazed by what Kathleen Clark and Rhunette Diggs have called “dialectical collaboration,” that is, collaboration marked by “struggle and opposition, where tension can be creative, productive, clarifying, as well as difficult” (10). Conclusion In sketching out our experience directing a highly collaborative digital media research collective, we hope we have given readers a sense of why collaboration is almost always a “wicked problem.” Collaborators negotiate different schedules, work demands, and ways of seeing, as well as resource pinches that hinder the process by which innovative digital media collaborations come to fruition. And yet, it is precisely because collaboration can be so wicked that it is so valuable. In constantly requiring collaborators to assess and reassess their rationales, artistic visions, and project objectives, collaboration makes for reflexive, complex, and innovative projects, which (at least to us) are the most satisfying and useful of all. References Chesnais, François. “Technological Agreements, Networks and Selected Issues in Economic Theory.” In Technological Collaboration: The Dynamics of Cooperation in Industrial Innovation. Rod Coombs, Albert Richards, Vivien Walsh, and Pier Paolo Saviotti, eds. Northampton, MA: Edward Elgar, 1996. 18-33. Clark, Kathleen D., and Rhunette C. Diggs. “Connected or Separated?: Toward a Dialectical View of Interethnic Relationships.” In Building Diverse Communities: Applications of Communication Research. McDonald, Trevy A., Mark P. Orbe, and Trevellya Ford-Ahmed, eds. Cresskill, NJ: Hampton Press, 2002. 3-25. Farrell, Michael P. Collaborative Circles: Friendship Dynamics & Creative Work. Chicago: U of Chicago P, 2001. Lunsford, Andrea, and Lisa Ede. Singular Texts/Plural Authors: Perspectives on Collaborative Writing. Carbondale: Southern Illinois UP, 1990. Mohan, Jitendra. “Cross-Cultural Experience of Collaboration in Personality Research.” Personality across Cultures: Recent Developments and Debates. Jitendra Mohan, ed. Oxford: Oxford UP, 2000. 313-335. O’Meara, Anne, and Nancy R. MacKenzie. “Reflections on Scholarly Collaboration.” In Common Ground: Feminist Collaboration in the Academy. Elizabeth G. Peck and JoAnna Stephens Mink, eds. Albany: State U of New York P, 1998. 209-26. Rittel, Horst W. J., and Melvin M. Weber. “Dilemmas in a General Theory of Planning.” Policy Sciences 4 (1973): 155-69. Citation reference for this article MLA Style Ruggill, Judd, and Ken McAllister. "The Wicked Problem of Collaboration." M/C Journal 9.2 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0605/07-ruggillmcallister.php>. APA Style Ruggill, J., and K. McAllister. (May 2006) "The Wicked Problem of Collaboration," M/C Journal, 9(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0605/07-ruggillmcallister.php>.
APA, Harvard, Vancouver, ISO, and other styles
36

Leung, Linda. "Mobility and Displacement." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2612.

Full text
Abstract:
The paper discusses mobility in the context of displacement. How is the mobile phone appropriated by refugees in immigration detention? What does the mobile phone, and indeed, mobility, signify in an Australian policy landscape of mandatory detention of asylum seekers and formerly prohibited access to mobile phones for detainees inside immigration detention centres? What does this intimate about the perceived dangers of “new” and mobile media? The author’s preliminary research with refugees in Australian immigration detention centres compares policy and practice. Firstly, it interrogates the unwritten policies regulating refugees’ access to media technologies when incarcerated in immigration detention. As there is no written policy on technology access and practices vary across immigration detention centres, the information in this paper has been given by detainees and has not been verified by the management of detention centres. The paper suggests that the utopian promises of mobile media echo those made about cyberspace in the 1990s. Furthermore, the residual effects of such rhetoric have infiltrated government policy in terms of perceiving mobile media as dangerous when adopted by marginalised groups such as refugees. Secondly, the research examines how and why the mobile phone has been adopted by immigration detainees despite their former prohibition. It explores the ways in which refugees practice an imagined mobility through media whilst in detention, and finds that this is critical to sustaining connection with their imagined communities. Why Refugees? In the context of increased forced migration of people due to circumstances such as political instability, war, natural disaster and famine; it is necessary to better understand how refugees mobilise and organise in situations of displacement. As new technologies encourage the capacity for borderlessness, such advantages also have to be contrasted with the potential dangers of spontaneous border crossings. The study of the behaviour and practices of refugees in relation to communication technologies offers an insight into the efficacy of immigration detention policy in filtering movement and interaction, both physical and virtual, between Australia and other countries. Although the study of refugees is a discipline in its own right, there has been minimal examination of how they appropriate technology, particularly that which facilitates and complements their mobility, to maintain connections with their diasporic networks while in situations of displacement. The studies that have been undertaken concentrate on the use of technology by refugees living in the wider community (see Glazebrook, McIver Jr. and Prokosch; Howard and Owens), rather than in the context of detention. In previous research of diasporas within the discipline of Cultural Studies, technology has been regarded as vital to subcultures and minority groups. Technology has been the tool by which such communities respond to their structural conditions (see Cunningham; Hall; Halleck). Such investigations have concentrated on the intersection of class, gender and ethnicity and how they inscribe meanings to specific technologies, which in turn, become intrinsic to the identities of the groups and communities. The research extends the work that has been done within Cultural Studies by similarly focusing on a marginalised group, refugees, and their participation in particular technologies. A review of literature across refugee studies, diaspora studies and technology studies has shown that: The study of technology use by refugees has had minimal investigation The study of diasporas has rarely included refugees The study of communities and communication practices which surround particular technologies has concentrated on groups other than refugees The escalation of issues of asylum and border control in public discourse warrant more knowledge about refugees and their networks of communication beyond the boundaries of detention and Australia The notion of “networks” refers to people, technologies, processes and practices that form the relationships between refugees in institutionalised immigration detention and the outside world. The Australian Immigration Detention Context Between 1992 and 1994, Australian law moved from permitting (but not enforcing) limited detention of asylum seekers, to a blanket policy of mandatory detention (HREOC) which, at one point, had up to 12,000 individuals in detention (Castan Centre for Human Rights Law). The detention context is particularly relevant to Australia, because its policy of mandatory detention means that refugees have restricted contact with the world outside of the detention centre. In 2005, the Migration Amendment (Detention Arrangements) Bill allowed detained families with children to live in community detention, that is, in residential accommodation outside of an immigration detention centre. Although community detention carries with it specific conditions, families are unaccompanied and have more freedom of movement. This paper discusses the author’s preliminary work with refugees in immigration detention, prior to the introduction of community detention. The research sought to investigate how asylum seekers use technology to sustain connections with their virtual communities in situations of displacement. Specifically, it explored how technology is appropriated to mediate communication in the context of institutionalised detention. The key research questions addressed by the research were: what kinds of technologies are available to refugees? How are these used? How are their benefits and limitations perceived? What, if any, kinds of social networks surround these technologies? How are relationships of power surrounding these technologies negotiated? Can technology assist refugees in sustaining connections with their communities of choice and reducing their sense of isolation? Can technology play a role in reducing the well-documented effects of this incarceration by providing mediated social interaction? What are the implications for policy, especially in relation to permitted technologies and surveillance of communication practices? Access to informants was gained by working with a refugee community advocacy group, which has established links with refugees in detention and experience in dealing with the management of detention centres. One such group is ChilOut, which organises visitor programs to immigration detention centres. This affiliation was important in gaining access to, and trust of, detainees who were willing to participate in the research. It presented opportunities to interact with detainees on a social basis. Semi-structured interviews with the research subjects were conducted to ascertain the strategies and resources currently utilised to counter the effects of mandatory detention. In 2005, detainees had access to a range of technology which can be broadly termed “old media”, while access to “new media” – such as the Internet and mobile phones – are prohibited. At the time of printing, detainees reported that mobile phones without cameras were only recently permitted. Detainees have access to pay phones inside the centre. Visitors are allowed to give detainees phone cards so they can use the pay phones without charge or the need for change. In addition to pay phones, detainees are provided with access to a fax and photocopier, which are generally used to liaise with and send relevant documentation to lawyers. There is distrust of using the fax machine at the detention centre because it is in a management office area and the detainees require permission to use it. It means the guards can read the faxes that are sent, as well as those that are received before notifying the detainees that they have received one. Detainees also have television, videos, DVDs and newspapers, so there is the possibility of feeling like part of an imagined community (Anderson) through these media. There are computers available, but no Internet access. Some of the children load computer games on them to play, others have Playstation in their rooms. It is noteworthy that the only technology to which detainees have access and which facilitates real-time person-to-person interaction is the telephone. The phone offers the opportunity for direct contact with the outside world without the visual and other sensory realities of detention. The telephone is able to mask the extent of imprisonment as it does not show the barbed razor wire surrounding the compound. Yet detainees were not permitted to have mobile phones for a long time. Thus, the key question remains: why were they deprived of access to mobile phones while allowed access to pay phones and landlines? What does this suggest about the perceived dangers of mobile media and the resonance of last century’s techno-utopian discourses? Given that detainees were only given access to “old media”, it seems that this tired but resolutely upbeat rhetoric about new technology which celebrates it as inherently liberating actually inflected policies determining the kinds of technologies to which detainees have access. It confirms the pessimistic assertions of media theorists such as Schiller and Mosco, that new technologies further alienate disadvantaged groups. As the Australian government attempts to regulate the physical movement of people across its borders, mantras of the dot.com era such as “everyone is a free agent” (Kumar 77) appear to undermine this agenda. The assumptions of liberty and democracy embedded in this “free agency” are implicit in policies that denied refugees access to “new media” such as the Internet and mobile phones. The “liberating” nature of such technology was regarded as unsafe in the hands of refugees, whose freedom of movement is institutionally contained by the Australian government through mandatory detention. The physical movement of refugees, as well as the agency and freedom with which they can claim asylum in a country, is actively discouraged through immigration detention policy and limitations on access to technology. The promise of self-expression afforded by mobile media seemed antithetical to the prejudicial administration of refugees, which is premised upon a distrust of their claims of identity and asylum. Subsequently, their use of mobile technology was also assumed to be suspect and therefore had to be restricted. Detained refugees serve as a reminder of the parameters of upbeat discourses about new technology. That is, the utopian possibilities of mobile media appear to be conditional such that its “power” can only be entrusted to certain groups. In policy terms, the mobile phone is a rich site of signification. Not only does the technology itself imply a way of being (that is free, mobile, always accessible and always able to access), but it also connotes an ideal type of user, one that is appropriate and deserving of such technology. It seems that refugees are not entitled to their mobility and, therefore, do not have rights to media that is considered to facilitate such mobility, in spite of their detention. Furthermore, there is a suggested dichotomy in the government’s classification of the technologies to which refugees have access. The fact of detention means refugees are surrounded by technology, held captive by it and are inevitably in close proximity to it. It is technology which is seen as antithetical to mobility and therefore could be described as “static”: phones, faxes, photocopiers, television, video – all of which may be characterised as “old media”. The binary opposite of such technology is that which can be regarded as mobile or new or interactive media; that which resonates with the residual effects of 1990s techno-utopian rhetoric; and could be considered as threatening in the hands of those who have physically made unauthorised border crossings. However, prior investigations of “mobile” technologies, demonstrates that such dualisms are flawed as the lowest technologies also have the capacity to facilitate mobility. Examples include Paul Gilroy’s work on the Black Atlantic, which notes that books and records have been vital in carrying oppositional ideologies and philosophies across the black diaspora. Within Asian diasporas, the exchange of video letters and taped Bollywood movies have been interpreted as forms of localised challenges to the centralised power of the broadcast media industries (Ang; Gillespie). These economies of exchange as facilitated by older forms of mobile media have been studied in relation to issues of migration and marginalisation. Given that refugees are also affected by such issues, their mobile media practices are a sobering reminder that mobility is not necessarily hi-tech nor confined to the realms of the affluent, educated and socio-economically advantaged. Rather, mobility can be a tenuous state of being displaced and itinerant, with technology adopted to manage and adapt to its challenges. The Mobile Media Practices of Detained Refugees The initial findings from the fieldwork indicate that for refugees, the mobile phone is not a technology of choice but instead, a technology of necessity and survival. Every technology that is available to them is used to sustain connection to their localized and globalised networks. The restriction to their physical movement of detainees is compensated through use of technology which allows any sort of interaction and communication. Being part of a technologically-mediated community appears to minimise the marginalisation and isolation they experience. Such feelings of dislocation have been well-documented in studies of the impact of incarceration on the mental health of refugees (see Mares and Jureidini; RANZCP; Hodes). It seems that the telephone and fax are the mainstays of their communication networks. However, such technologies are closely monitored, as landline phone calls can be traced or even tapped, and faxes have to be sent from an office manned by guards. An experienced visitor to detention centres commented that “most” detainees had mobile phones and when they were contraband, guards knew about them but generally ignored their use by detainees. Only mobile phones offer the potential for communication to be free from the surveillance by detention centres staff. The ways in which mobile phones are used by detainees is decidedly lo-tech, for example, for communication with family where use of a landline is impractical. One of the detainees said that he speaks to his wife and children on the centre pay phone every few days. However, the call costs are expensive as his family only has a mobile phone, not a landline, at their place of residence. For them to call him is also expensive and awkward, because they have to call the pay phone and if somebody answers, they have then to locate him somewhere within the compound. Thus, the connections between the detainees and their loved ones are very fragile in that they are almost totally dependent on the phone to maintain these relationships. In this instance, the mobile phone offers another means for managing the tenuous nature of these ties. The mobile phone, particularly SMS technology, offers a suitable alternative as the detainee can communicate with his family cheaply and quickly. It compensates for the constraints of the pay phone. The informal interactions afforded by the mobile phone also extend beyond family members of detainees to their supporters and advocates. Likewise, the mobile phone complements the communication practices facilitated through permitted technologies. For example, when detainees are liaising with the Department of Immigration (DIMIA), they will ask advice from the regular visitors to the immigration detention centre who come from an array of organizations such as churches, refugee advocacy groups, law firms and health organizations. Visitors generally offer whatever assistance they can by obtaining necessary forms from the department, searching the Internet, undertaking letter writing campaigns, and lobbying government ministers. Something worked in amongst all the network activity that took place over the course of this week. As promised to the family, I scoured the DIMIA web site for a form for applying under Section 417. While there didn’t seem to be an official form, I used the opportunity to research the section of the Migration Act. Googling turned up a 12 page “guide to section 417 applications” written by a barrister, which I printed out and faxed to them. So as to ensure that the family received the fax, I SMS-ed them to let them know a fax was on its way and how many pages to expect. They responded to me by fax, saying that they had been notified that they too were going to be released into community detention in the coming weeks. (Extract from fieldwork diary) The mobile phone serves the function of anticipating and verifying communications which may potentially be surveilled by staff of detention centres. Where detainees may not trust that they are being given all the letters or faxes that have been sent to them, the mobile phone enables a degree of privacy so that they at least know what to expect from their correspondents. Furthermore, it provides the opportunity for detainees to speak about matters related to their case for asylum that are regarded as too sensitive to risk being discussed in a public place such as on the centre pay phone. Often this involves seeking assistance with their application for asylum. He rang T on the centre pay phone and said that he would like to speak with me, but did not have my number. He didn’t have a pen and paper to jot down my details at the time, so he gave T his mobile number and asked her to pass it onto me, so I could ring him on it. When I rang, he had returned to his room where he could talk freely. He told me about the visit from the Commonwealth Ombudsman, who undertook to look into his case over the next couple of weeks. We talked about what would assist the Ombudsman in reviewing the case. I said I would write a letter or email in the first instance, and if he wanted other letters of support, I could circulate details of his case on the ChilOut newsletter. He said he didn’t want publicity at this stage. I offered to fax him a copy of my email, but he preferred that I give it to him in person as the fax machine in the office was too public and any documents received could be read. Again, the mobile seems to be the most appropriate technology for coordinating and organising privately away from centre surveillance… (Extract from fieldwork diary) Fear of breaches of confidentiality form only part of detainees’ desire for privacy from detention centre staff. There is also a need for private space away from other detainees as their imprisonment necessitates the constant use of communal facilities such as the pay phone. In addition to being used for its capacity for private communication, the mobile phone was also exploited as a broadcast technology by detained refugees. Text messages proved an effective way of providing brief updates to family and friends about the status of their case: 20 September 200510:24:07 Hi Linda. I am fine thank u. not news yet, I think they’ll come to see me soon, if I got news, I’ll let u know. Wish u have a good time. 15 October 200516:31:49 HI Linda, I was interview by Ombudsman yesterday, we talked about one hour and a half, it sound good…Thank u for yr concern 25 December 200520:26:54 Hi Linda. I am still in [detention centre]. No any news from Ombudsman, may be early next year. I am fine here, thanks. Tuesday 17 October 200613:44:41 Hi Linda…I transferd to [community] housing. Its much better here. How a u? takecare ur health, thanks. Thursday 16 November 200618:46:23 HI There is a good news to let u know I got the decision from that I won the FC case. Thus, for detained refugees, the mobile phone has been adopted for simple, lo-tech use. None of the respondents indicated a desire for a camera function on their mobile phones. However, one detainee did suggest that she would like to use a webcam to see and hear her child in China, whom she has not seen in eight years. While she did use the Internet for this purpose when she was on the “outside”, now she can only rely on weekly telephone conversations made from inside the detention centre. Conclusion What happens when technology is placed in the hands of those for whom it was never meant? It makes explicit what is often implied in studies of adoption of new technology, that the “utopian promise” is confined to a narrow socio-economic demographic: the advantaged, the affluent and the educated. Those who fall outside these perimeters are perceived as undeserving and untrustworthy of such technology. This is exemplified in the Australian government’s policy to deny refugees access to “new” and mobile media whilst being compulsorily detained. The decision to withhold mobile technology from mobile communities who are not so materially privileged is not only ironic but unwarranted in light of the empirical data. This has since been acknowledged by allowing detainees use of mobile phones. The mobile phone practices of detained refugees show that it is being used as a complementary and alternative technology, that is, to compensate for the inadequacies of the communication media allowed by detention centres. The mobile phone is exploited for the functions that permitted technologies do not offer: firstly, the ability to communicate with friends and family more immediately and effectively; secondly, the capacity to communicate privately with less probability of surveillance; thirdly, the opportunity to broadcast content one to many. In such communications, use of the mobile phone is simple and lo-tech: it is deployed for straightforward (but improved) interaction with detainees’ imagined communities which would otherwise be possible anyway through the “old” media technologies provided in detention. In practice, there was no evidence of the use of the hi-tech functions of mobile phones; nor was there any indication, as implied by policy, of the possible dangers that may ensue if such features of mobile media were available to detained refugees. Potentially, the research can impact on immigration detention policy, particularly in terms of reviewing the conditions under which technology is made available to refugees in institutionalised detention contexts. However, further research is required, especially a comparison of the former prohibited use of mobile media in immigration detention centres with the permitted use of these in community immigration detention. References Anderson, Benedict. Imagined Communities. London: Verso, 1993. Ang, Ien. Living Room Wars: Rethinking Media Audiences for a Postmodern World. London: Routledge, 1996. Castan Centre for Human Rights Law. 2003. “Detention, Children and Asylum Seekers: A Comparative Study.” Submission to the National Inquiry into Children in Immigration Detention. 26 July 2004. http://www.hreoc.gov.au/human_rights/children_detention/ submissions/castan.html>. Cunningham, Stuart. “Popular Media as Public ‘Sphericules’ for Diasporic Communities.” International Journal of Cultural Studies 4.2 (2001): 131-147. Gillespie, Marie. Television, Ethnicity and Cultural Change. London: Routledge, 1995. Gilroy, Paul. There Ain’t no Black in the Union Jack. London: Hutchison, 1987. Glazebrook, Diana. “Becoming Mobile after Detention.” Social Analysis: International Journal of Cultural and Social Practice 48.3 (2004). Hall, Stuart. “Aspirations and Attitude… Reflections on Black Britain in the 90s.” New Formations: Frontlines, Backyards. London: Lawrence and Wishart, 1998. Halleck, Dee. “Watch Out Dick Tracy! Popular Video in the Wake of Exxon Valdez.” Technoculture. Eds. Constance Penley and Andrew Ross. Minneapolis: U of Minnesota P, 1991. Hodes, Matthew. “Three Key Issues for Young Refugees’ Mental Health.” Transcultural Psychiatry 39.2 (2002): 196-213. Howard, Ellen, and Christine Owens. “Using the Internet to Communicate with Immigrant/Refugee Communities about Health.” Poster presentation at JCDL ‘02, Portland, Oregon, 13-17 July 2002. Human Rights and Equal Opportunity Commission (HREOC). “A Last Resort?” Report on National Inquiry into Children in Immigration Detention. 26 July 2004. http://www.hreoc.gov.au/human_rights/children_detention/ submissions/castan.html>. Kumar, Amitava. “Temporary Access: The Indian H-1B Worker in the US.” Technicolor: Race, Technology and Everyday Life. Eds. Alondra Nelson and Thuy Linh Tu. New York: NYU P, 2001. Mares, Sarah, and Jon Jureidini. “Children and Families Referred from a Remote Immigration Detention Centre.” Forgotten Rights – Responding to the Crisis of Asylum Seeker Health Care: A National Summit. 12 Nov. 2003. McIver, William, and Arthur Prokosch. “Towards a Critical Approach to Examining the Digital Divide”. IEEE, 2002. Mosco, Vincent. Pushbutton Fantasies: Critical Perspectives in Videotex and Information Technology. Norwood: Ablex, 1982. Royal Australian and New Zealand College of Psychiatrists. “RANZCP Airs Deep Concern at the Mandatory Detention of Child Asylum Seekers.” Media release, 11 Nov. 2003. Schiller, Herbert. Information Inequality: The Deepening Social Crisis in America. London: Routledge, 1996. Citation reference for this article MLA Style Leung, Linda. "Mobility and Displacement: Refugees' Mobile Media Practices in Immigration Detention." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/10-leung.php>. APA Style Leung, L. (Mar. 2007) "Mobility and Displacement: Refugees' Mobile Media Practices in Immigration Detention," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/10-leung.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Brien, Donna Lee. "“Porky Times”: A Brief Gastrobiography of New York’s The Spotted Pig." M/C Journal 13, no. 5 (October 18, 2010). http://dx.doi.org/10.5204/mcj.290.

Full text
Abstract:
Introduction With a deluge of mouthwatering pre-publicity, the opening of The Spotted Pig, the USA’s first self-identified British-styled gastropub, in Manhattan in February 2004 was much anticipated. The late Australian chef, food writer and restauranteur Mietta O’Donnell has noted how “taking over a building or business which has a long established reputation can be a mixed blessing” because of the way that memories “can enrich the experience of being in a place or they can just make people nostalgic”. Bistro Le Zoo, the previous eatery on the site, had been very popular when it opened almost a decade earlier, and its closure was mourned by some diners (Young; Kaminsky “Feeding Time”; Steinhauer & McGinty). This regret did not, however, appear to affect The Spotted Pig’s success. As esteemed New York Times reviewer Frank Bruni noted in his 2006 review: “Almost immediately after it opened […] the throngs started to descend, and they have never stopped”. The following year, The Spotted Pig was awarded a Michelin star—the first year that Michelin ranked New York—and has kept this star in the subsequent annual rankings. Writing Restaurant Biography Detailed studies have been published of almost every type of contemporary organisation including public institutions such as schools, hospitals, museums and universities, as well as non-profit organisations such as charities and professional associations. These are often written to mark a major milestone, or some significant change, development or the demise of the organisation under consideration (Brien). Detailed studies have also recently been published of businesses as diverse as general stores (Woody), art galleries (Fossi), fashion labels (Koda et al.), record stores (Southern & Branson), airlines (Byrnes; Jones), confectionary companies (Chinn) and builders (Garden). In terms of attracting mainstream readerships, however, few such studies seem able to capture popular reader interest as those about eating establishments including restaurants and cafés. This form of restaurant life history is, moreover, not restricted to ‘quality’ establishments. Fast food restaurant chains have attracted their share of studies (see, for example Love; Jakle & Sculle), ranging from business-economic analyses (Liu), socio-cultural political analyses (Watson), and memoirs (Kroc & Anderson), to criticism around their conduct and effects (Striffler). Eric Schlosser’s Fast Food Nation: The Dark Side of the All-American Meal is the most well-known published critique of the fast food industry and its effects with, famously, the Rolling Stone article on which it was based generating more reader mail than any other piece run in the 1990s. The book itself (researched narrative creative nonfiction), moreover, made a fascinating transition to the screen, transformed into a fictionalised drama (co-written by Schlosser) that narrates the content of the book from the point of view of a series of fictional/composite characters involved in the industry, rather than in a documentary format. Akin to the range of studies of fast food restaurants, there are also a variety of studies of eateries in US motels, caravan parks, diners and service station restaurants (see, for example, Baeder). Although there has been little study of this sub-genre of food and drink publishing, their popularity can be explained, at least in part, because such volumes cater to the significant readership for writing about food related topics of all kinds, with food writing recently identified as mainstream literary fare in the USA and UK (Hughes) and an entire “publishing subculture” in Australia (Dunstan & Chaitman). Although no exact tally exists, an informed estimate by the founder of the Gourmand World Cookbook Awards and president of the Paris Cookbook Fair, Edouard Cointreau, has more than 26,000 volumes on food and wine related topics currently published around the world annually (ctd. in Andriani “Gourmand Awards”). The readership for publications about restaurants can also perhaps be attributed to the wide range of information that can be included a single study. My study of a selection of these texts from the UK, USA and Australia indicates that this can include narratives of place and architecture dealing with the restaurant’s location, locale and design; narratives of directly food-related subject matter such as menus, recipes and dining trends; and narratives of people, in the stories of its proprietors, staff and patrons. Detailed studies of contemporary individual establishments commonly take the form of authorised narratives either written by the owners, chefs or other staff with the help of a food journalist, historian or other professional writer, or produced largely by that writer with the assistance of the premise’s staff. These studies are often extensively illustrated with photographs and, sometimes, drawings or reproductions of other artworks, and almost always include recipes. Two examples of these from my own collection include a centennial history of a famous New Orleans eatery that survived Hurricane Katrina, Galatoire’s Cookbook. Written by employees—the chief operating officer/general manager (Melvin Rodrigue) and publicist (Jyl Benson)—this incorporates reminiscences from both other staff and patrons. The second is another study of a New Orleans’ restaurant, this one by the late broadcaster and celebrity local historian Mel Leavitt. The Court of Two Sisters Cookbook: With a History of the French Quarter and the Restaurant, compiled with the assistance of the Two Sisters’ proprietor, Joseph Fein Joseph III, was first published in 1992 and has been so enduringly popular that it is in its eighth printing. These texts, in common with many others of this type, trace a triumph-over-adversity company history that incorporates a series of mildly scintillating anecdotes, lists of famous chefs and diners, and signature recipes. Although obviously focused on an external readership, they can also be characterised as an instance of what David M. Boje calls an organisation’s “story performance” (106) as the process of creating these narratives mobilises an organisation’s (in these cases, a commercial enterprise’s) internal information processing and narrative building activities. Studies of contemporary restaurants are much more rarely written without any involvement from the eatery’s personnel. When these are, the results tend to have much in common with more critical studies such as Fast Food Nation, as well as so-called architectural ‘building biographies’ which attempt to narrate the historical and social forces that “explain the shapes and uses” (Ellis, Chao & Parrish 70) of the physical structures we create. Examples of this would include Harding’s study of the importance of the Boeuf sur le Toit in Parisian life in the 1920s and Middlebrook’s social history of London’s Strand Corner House. Such work agrees with Kopytoff’s assertion—following Appadurai’s proposal that objects possess their own ‘biographies’ which need to be researched and expressed—that such inquiry can reveal not only information about the objects under consideration, but also about readers as we examine our “cultural […] aesthetic, historical, and even political” responses to these narratives (67). The life story of a restaurant will necessarily be entangled with those of the figures who have been involved in its establishment and development, as well as the narratives they create around the business. This following brief study of The Spotted Pig, however, written without the assistance of the establishment’s personnel, aims to outline a life story for this eatery in order to reflect upon the pig’s place in contemporary dining practice in New York as raw foodstuff, fashionable comestible, product, brand, symbol and marketing tool, as well as, at times, purely as an animal identity. The Spotted Pig Widely profiled before it even opened, The Spotted Pig is reportedly one of the city’s “most popular” restaurants (Michelin 349). It is profiled in all the city guidebooks I could locate in print and online, featuring in some of these as a key stop on recommended itineraries (see, for instance, Otis 39). A number of these proclaim it to be the USA’s first ‘gastropub’—the term first used in 1991 in the UK to describe a casual hotel/bar with good food and reasonable prices (Farley). The Spotted Pig is thus styled on a shabby-chic version of a traditional British hotel, featuring a cluttered-but-well arranged use of pig-themed objects and illustrations that is described by latest Michelin Green Guide of New York City as “a country-cute décor that still manages to be hip” (Michelin 349). From the three-dimensional carved pig hanging above the entrance in a homage to the shingles of traditional British hotels, to the use of its image on the menu, website and souvenir tee-shirts, the pig as motif proceeds its use as a foodstuff menu item. So much so, that the restaurant is often (affectionately) referred to by patrons and reviewers simply as ‘The Pig’. The restaurant has become so well known in New York in the relatively brief time it has been operating that it has not only featured in a number of novels and memoirs, but, moreover, little or no explanation has been deemed necessary as the signifier of “The Spotted Pig” appears to convey everything that needs to be said about an eatery of quality and fashion. In the thriller Lethal Experiment: A Donovan Creed Novel, when John Locke’s hero has to leave the restaurant and becomes involved in a series of dangerous escapades, he wants nothing more but to get back to his dinner (107, 115). The restaurant is also mentioned a number of times in Sex and the City author Candace Bushnell’s Lipstick Jungle in relation to a (fictional) new movie of the same name. The joke in the book is that the character doesn’t know of the restaurant (26). In David Goodwillie’s American Subversive, the story of a journalist-turned-blogger and a homegrown terrorist set in New York, the narrator refers to “Scarlett Johansson, for instance, and the hostess at the Spotted Pig” (203-4) as the epitome of attractiveness. The Spotted Pig is also mentioned in Suzanne Guillette’s memoir, Much to Your Chagrin, when the narrator is on a dinner date but fears running into her ex-boyfriend: ‘Jack lives somewhere in this vicinity […] Vaguely, you recall him telling you he was not too far from the Spotted Pig on Greenwich—now, was it Greenwich Avenue or Greenwich Street?’ (361). The author presumes readers know the right answer in order to build tension in this scene. Although this success is usually credited to the joint efforts of backer, music executive turned restaurateur Ken Friedman, his partner, well-known chef, restaurateur, author and television personality Mario Batali, and their UK-born and trained chef, April Bloomfield (see, for instance, Batali), a significant part has been built on Bloomfield’s pork cookery. The very idea of a “spotted pig” itself raises a central tenet of Bloomfield’s pork/food philosophy which is sustainable and organic. That is, not the mass produced, industrially farmed pig which produces a leaner meat, but the fatty, tastier varieties of pig such as the heritage six-spotted Berkshire which is “darker, more heavily marbled with fat, juicier and richer-tasting than most pork” (Fabricant). Bloomfield has, indeed, made pig’s ears—long a Chinese restaurant staple in the city and a key ingredient of Southern US soul food as well as some traditional Japanese and Spanish dishes—fashionable fare in the city, and her current incarnation, a crispy pig’s ear salad with lemon caper dressing (TSP 2010) is much acclaimed by reviewers. This approach to ingredients—using the ‘whole beast’, local whenever possible, and the concentration on pork—has been underlined and enhanced by a continuing relationship with UK chef Fergus Henderson. In his series of London restaurants under the banner of “St. John”, Henderson is famed for the approach to pork cookery outlined in his two books Nose to Tail Eating: A Kind of British Cooking, published in 1999 (re-published both in the UK and the US as The Whole Beast: Nose to Tail Eating), and Beyond Nose to Tail: A Kind of British Cooking: Part II (coauthored with Justin Piers Gellatly in 2007). Henderson has indeed been identified as starting a trend in dining and food publishing, focusing on sustainably using as food the entirety of any animal killed for this purpose, but which mostly focuses on using all parts of pigs. In publishing, this includes Hugh Fearnley-Whittingstall’s The River Cottage Meat Book, Peter Kaminsky’s Pig Perfect, subtitled Encounters with Some Remarkable Swine and Some Great Ways to Cook Them, John Barlow’s Everything but the Squeal: Eating the Whole Hog in Northern Spain and Jennifer McLagan’s Fat: An Appreciation of a Misunderstood Ingredient, with Recipes (2008). In restaurants, it certainly includes The Spotted Pig. So pervasive has embrace of whole beast pork consumption been in New York that, by 2007, Bruni could write that these are: “porky times, fatty times, which is to say very good times indeed. Any new logo for the city could justifiably place the Big Apple in the mouth of a spit-roasted pig” (Bruni). This demand set the stage perfectly for, in October 2007, Henderson to travel to New York to cook pork-rich menus at The Spotted Pig in tandem with Bloomfield (Royer). He followed this again in 2008 and, by 2009, this annual event had become known as “FergusStock” and was covered by local as well as UK media, and a range of US food weblogs. By 2009, it had grown to become a dinner at the Spotted Pig with half the dishes on the menu by Henderson and half by Bloomfield, and a dinner the next night at David Chang’s acclaimed Michelin-starred Momofuku Noodle Bar, which is famed for its Cantonese-style steamed pork belly buns. A third dinner (and then breakfast/brunch) followed at Friedman/Bloomfield’s Breslin Bar and Dining Room (discussed below) (Rose). The Spotted Pig dinners have become famed for Henderson’s pig’s head and pork trotter dishes with the chef himself recognising that although his wasn’t “the most obvious food to cook for America”, it was the case that “at St John, if a couple share a pig’s head, they tend to be American” (qtd. in Rose). In 2009, the pigs’ head were presented in pies which Henderson has described as “puff pastry casing, with layers of chopped, cooked pig’s head and potato, so all the lovely, bubbly pig’s head juices go into the potato” (qtd. in Rose). Bloomfield was aged only 28 when, in 2003, with a recommendation from Jamie Oliver, she interviewed for, and won, the position of executive chef of The Spotted Pig (Fabricant; Q&A). Following this introduction to the US, her reputation as a chef has grown based on the strength of her pork expertise. Among a host of awards, she was named one of US Food & Wine magazine’s ten annual Best New Chefs in 2007. In 2009, she was a featured solo session titled “Pig, Pig, Pig” at the fourth Annual International Chefs Congress, a prestigious New York City based event where “the world’s most influential and innovative chefs, pastry chefs, mixologists, and sommeliers present the latest techniques and culinary concepts to their peers” (Starchefs.com). Bloomfield demonstrated breaking down a whole suckling St. Canut milk raised piglet, after which she butterflied, rolled and slow-poached the belly, and fried the ears. As well as such demonstrations of expertise, she is also often called upon to provide expert comment on pork-related news stories, with The Spotted Pig regularly the subject of that food news. For example, when a rare, heritage Hungarian pig was profiled as a “new” New York pork source in 2009, this story arose because Bloomfield had served a Mangalitsa/Berkshire crossbreed pig belly and trotter dish with Agen prunes (Sanders) at The Spotted Pig. Bloomfield was quoted as the authority on the breed’s flavour and heritage authenticity: “it took me back to my grandmother’s kitchen on a Sunday afternoon, windows steaming from the roasting pork in the oven […] This pork has that same authentic taste” (qtd. in Sanders). Bloomfield has also used this expert profile to support a series of pork-related causes. These include the Thanksgiving Farm in the Catskill area, which produces free range pork for its resident special needs children and adults, and helps them gain meaningful work-related skills in working with these pigs. Bloomfield not only cooks for the project’s fundraisers, but also purchases any excess pigs for The Spotted Pig (Estrine 103). This strong focus on pork is not, however, exclusive. The Spotted Pig is also one of a number of American restaurants involved in the Meatless Monday campaign, whereby at least one vegetarian option is included on menus in order to draw attention to the benefits of a plant-based diet. When, in 2008, Bloomfield beat the Iron Chef in the sixth season of the US version of the eponymous television program, the central ingredient was nothing to do with pork—it was olives. Diversifying from this focus on ‘pig’ can, however, be dangerous. Friedman and Bloomfield’s next enterprise after The Spotted Pig was The John Dory seafood restaurant at the corner of 10th Avenue and 16th Street. This opened in November 2008 to reviews that its food was “uncomplicated and nearly perfect” (Andrews 22), won Bloomfield Time Out New York’s 2009 “Best New Hand at Seafood” award, but was not a success. The John Dory was a more formal, but smaller, restaurant that was more expensive at a time when the financial crisis was just biting, and was closed the following August. Friedman blamed the layout, size and neighbourhood (Stein) and its reservation system, which limited walk-in diners (ctd. in Vallis), but did not mention its non-pork, seafood orientation. When, almost immediately, another Friedman/Bloomfield project was announced, the Breslin Bar & Dining Room (which opened in October 2009 in the Ace Hotel at 20 West 29th Street and Broadway), the enterprise was closely modeled on the The Spotted Pig. In preparation, its senior management—Bloomfield, Friedman and sous-chefs, Nate Smith and Peter Cho (who was to become the Breslin’s head chef)—undertook a tasting tour of the UK that included Henderson’s St. John Bread & Wine Bar (Leventhal). Following this, the Breslin’s menu highlighted a series of pork dishes such as terrines, sausages, ham and potted styles (Rosenberg & McCarthy), with even Bloomfield’s pork scratchings (crispy pork rinds) bar snacks garnering glowing reviews (see, for example, Severson; Ghorbani). Reviewers, moreover, waxed lyrically about the menu’s pig-based dishes, the New York Times reviewer identifying this focus as catering to New York diners’ “fetish for pork fat” (Sifton). This representative review details not only “an entree of gently smoked pork belly that’s been roasted to tender goo, for instance, over a drift of buttery mashed potatoes, with cabbage and bacon on the side” but also a pig’s foot “in gravy made of reduced braising liquid, thick with pillowy shallots and green flecks of deconstructed brussels sprouts” (Sifton). Sifton concluded with the proclamation that this style of pork was “very good: meat that is fat; fat that is meat”. Concluding remarks Bloomfield has listed Michael Ruhlman’s Charcuterie as among her favourite food books. Publishers Weekly reviewer called Ruhlman “a food poet, and the pig is his muse” (Q&A). In August 2009, it was reported that Bloomfield had always wanted to write a cookbook (Marx) and, in July 2010, HarperCollins imprint Ecco publisher and foodbook editor Dan Halpern announced that he was planning a book with her, tentatively titled, A Girl and Her Pig (Andriani “Ecco Expands”). As a “cookbook with memoir running throughout” (Maurer), this will discuss the influence of the pig on her life as well as how to cook pork. This text will obviously also add to the data known about The Spotted Pig, but until then, this brief gastrobiography has attempted to outline some of the human, and in this case, animal, stories that lie behind all businesses. References Andrews, Colman. “Its Up To You, New York, New York.” Gourmet Apr. (2009): 18-22, 111. Andriani, Lynn. “Ecco Expands Cookbook Program: HC Imprint Signs Up Seven New Titles.” Publishers Weekly 12 Jul. (2010) 3 Sep. 2010 http://www.publishersweekly.com/pw/by-topic/book-news/cooking/article/43803-ecco-expands-cookbook-program.html Andriani, Lynn. “Gourmand Awards Receive Record Number of Cookbook Entries.” Publishers Weekly 27 Sep. 2010 http://www.publishersweekly.com/pw/by-topic/book-news/cooking/article/44573-gourmand-awards-receive-record-number-of-cookbook-entries.html Appadurai, Arjun. The Social Life of Things: Commodities in Cultural Perspectives. Cambridge (UK): Cambridge University Press, 2003. First pub. 1986. Baeder, John. Gas, Food, and Lodging. New York: Abbeville Press, 1982. Barlow, John. Everything But the Squeal: Eating the Whole Hog in Northern Spain. New York: Farrar, Straus and Giroux, 2008. Batali, Mario. “The Spotted Pig.” Mario Batali 2010. 3 Sep. 2010 http://www.mariobatali.com/restaurants_spottedpig.cfm Boje, David M. “The Storytelling Organization: A Study of Story Performance in an Office-Supply Firm.” Administrative Science Quarterly 36.1 (1991): 106-126. Brien, Donna Lee. “Writing to Understand Ourselves: An Organisational History of the Australian Association of Writing Programs 1996–2010.” TEXT: Journal of Writing and Writing Courses Apr. 2010 http://www.textjournal.com.au/april10/brien.htm Bruni, Frank. “Fat, Glorious Fat, Moves to the Center of the Plate.” New York Times 13 Jun. 2007. 3 Sep. 2010 http://www.nytimes.com/2007/06/13/dining/13glut.html Bruni, Frank. “Stuffed Pork.” New York Times 25 Jan. 2006. 4 Sep. 2010 http://events.nytimes.com/2006/01/25/dining/reviews/25rest.html Bushnell, Candace. Lipstick Jungle. New York: Hyperion Books, 2008. Byrnes, Paul. Qantas by George!: The Remarkable Story of George Roberts. Sydney: Watermark, 2000. Chinn, Carl. The Cadbury Story: A Short History. Studley, Warwickshire: Brewin Books, 1998. Dunstan, David and Chaitman, Annette. “Food and Drink: The Appearance of a Publishing Subculture.” Ed. David Carter and Anne Galligan. Making Books: Contemporary Australian Publishing. St Lucia: U of Queensland P, 2007: 333-351. Ellis, W. Russell, Tonia Chao and Janet Parrish. “Levi’s Place: A Building Biography.” Places 2.1 (1985): 57-70. Estrine, Darryl. Harvest to Heat: Cooking with America’s Best Chefs, Farmers, and Artisans. Newton CT: The Taunton Press, 2010 Fabricant, Florence. “Food stuff: Off the Menu.” New York Times 26 Nov. 2003. 3 Sep. 2010 http://www.nytimes.com/2003/11/26/dining/food-stuff-off-the-menu.html?ref=april_bloomfield Fabricant, Florence. “Food Stuff: Fit for an Emperor, Now Raised in America.” New York Times 23 Jun. 2004. 2 Sep. 2010 http://www.nytimes.com/2004/06/23/dining/food-stuff-fit-for-an-emperor-now-raised-in-america.html Farley, David. “In N.Y., An Appetite for Gastropubs.” The Washington Post 24 May 2009. 1 Sep. 2010 http://www.washingtonpost.com/wp-dyn/content/article/2009/05/22/AR2009052201105.html Fearnley-Whittingstall, Hugh. The River Cottage Meat Book. London: Hodder & Stoughton, 2004. Food & Wine Magazine. “Food & Wine Magazine Names 19th Annual Best New Chefs.” Food & Wine 4 Apr. 2007. 3 Sep. 2010 http://www.foodandwine.com/articles/2007-best-new-chefs Fossi, Gloria. Uffizi Gallery: Art, History, Collections. 4th ed. Florence Italy: Giunti Editore, 2001. Garden, Don. Builders to the Nation: The A.V. Jennings Story. Carlton: Melbourne U P, 1992. Ghorbani, Liza. “Boîte: In NoMad, a Bar With a Pub Vibe.” New York Times 26 Mar. 2010. 3 Sep. 2010 http://www.nytimes.com/2010/03/28/fashion/28Boite.html Goodwillie, David. American Subversive. New York: Scribner, 2010. Guillette, Suzanne. Much to Your Chagrin: A Memoir of Embarrassment. New York, Atria Books, 2009. Henderson, Fergus. Nose to Tail Eating: A Kind of British Cooking. London: Pan Macmillan, 1999 Henderson, Fergus and Justin Piers Gellatly. Beyond Nose to Tail: A Kind of British Cooking: Part I1. London: Bloomsbury Publishing, 2007. Hughes, Kathryn. “Food Writing Moves from Kitchen to bookshelf.” The Guardian 19 Jun. 2010. 1 Sep. 2010 http://www.guardian.co.uk/books/2010/jun/19/anthony-bourdain-food-writing Jakle, John A. and Keith A. Sculle. Fast Food: Roadside Restaurants in the Automobile Age. Baltimore: Johns Hopkins U P, 1999. Jones, Lois. EasyJet: The Story of Britain's Biggest Low-cost Airline. London: Aurum, 2005. Kaminsky, Peter. “Feeding Time at Le Zoo.” New York Magazine 12 Jun. 1995: 65. Kaminsky, Peter. Pig Perfect: Encounters with Some Remarkable Swine and Some Great Ways To Cook Them. New York: Hyperion 2005. Koda, Harold, Andrew Bolton and Rhonda K. Garelick. Chanel. New York: Metropolitan Museum of Art, 2005. Kopytoff, Igor. “The Cultural Biography of Things: Commoditization as Process.” The Social Life of things: Commodities in Cultural Perspectives. Ed. Arjun Appadurai. Cambridge (UK): Cambridge U P, 2003. 64-94. (First pub. 1986). Kroc, Ray and Robert Anderson. Grinding It Out: The Making of McDonald’s, Chicago: H. Regnery, 1977 Leavitt, Mel. The Court of Two Sisters Cookbook: With a History of the French Quarter and the Restaurant. Gretna, LA: Pelican Publishing, 2005. Pub. 1992, 1994, 1996, 1998, 2000, 2001, 2003. Leventhal, Ben. “April Bloomfield & Co. Take U.K. Field Trip to Prep for Ace Debut.” Grub Street 14 Apr. 2009. 3 Sep. 2010 http://newyork.grubstreet.com/2009/04/april_bloomfield_co_take_uk_field_trip_to_prep_for_ace_debut.html Fast Food Nation. R. Linklater (Dir.). Fox Searchlight Pictures, 2006. Liu, Warren K. KFC in China: Secret Recipe for Success. Singapore & Hoboken, NJ: John Wiley (Asia), 2008. Locke, John. Lethal Experiment: A Donovan Creed Novel. Bloomington: iUniverse, 2009. Love, John F. McDonald’s: Behind the Arches. Toronto & New York: Bantam, 1986. Marx, Rebecca. “Beyond the Breslin: April Bloomfield is Thinking Tea, Bakeries, Cookbook.” 28 Aug. 2009. 3 Sep. 2010 http://blogs.villagevoice.com/forkintheroad/archives/2009/08/beyond_the_bres.php Maurer, Daniel. “Meatball Shop, April Bloomfield Plan Cookbooks.” Grub Street 12 Jul. 2010. 3 Sep. 2010 http://newyork.grubstreet.com/2010/07/meatball_shop_april_bloomfield.html McLagan, Jennifer. Fat: An Appreciation of a Misunderstood Ingredient, with Recipes. Berkeley: Ten Speed Press, 2008. Michelin. Michelin Green Guide New York City. Michelin Travel Publications, 2010. O’Donnell, Mietta. “Burying and Celebrating Ghosts.” Herald Sun 1 Dec. 1998. 3 Sep. 2010 http://www.miettas.com.au/restaurants/rest_96-00/buryingghosts.html Otis, Ginger Adams. New York Encounter. Melbourne: Lonely Planet, 2007. “Q and A: April Bloomfield.” New York Times 18 Apr. 2008. 3 Sep. 2010 http://dinersjournal.blogs.nytimes.com/2008/04/18/q-and-a-april-bloomfield Rodrigue, Melvin and Jyl Benson. Galatoire’s Cookbook: Recipes and Family History from the Time-Honored New Orleans Restaurant. New York: Clarkson Potter, 2005. Rose, Hilary. “Fergus Henderson in New York.” The Times (London) Online, 5 Dec. 2009. 23 Aug. 2010 http://www.timesonline.co.uk/tol/life_and_style/food_and_drink/recipes/article6937550.ece Rosenberg, Sarah & Tom McCarthy. “Platelist: The Breslin’s April Bloomfield.” ABC News/Nightline 4 Dec. 2009. 23 Aug. 2010 http://abcnews.go.com/Nightline/april-bloomfield-spotted-pig-interview/story?id=9242079 Royer, Blake. “Table for Two: Fergus Henderson at The Spotted Pig.” The Paupered Chef 11 Oct. 2007. 23 Aug. 2010 http://thepauperedchef.com/2007/10/table-for-two-f.html Ruhlman, Michael and Brian Polcyn. Charcuterie: The Craft of Salting, Smoking, and Curing. New York: W. Norton, 2005. Sanders, Michael S. “An Old Breed of Hungarian Pig Is Back in Favor.” New York Times 26 Mar. 2009. 23 Aug. 2010 http://www.nytimes.com/2009/04/01/dining/01pigs.html?ref=april_bloomfield Schlosser, Eric. “Fast Food Nation: The True History of the America’s Diet.” Rolling Stone Magazine 794 3 Sep. 1998: 58-72. Schlosser, Eric. Fast Food Nation: The Dark Side of the All-American Meal. Boston: Houghton Mifflin, 2001. Severson, Kim. “From the Pig Directly to the Fish.” New York Times 2 Sep. 2008. 23 Aug. 2010 http://www.nytimes.com/2008/09/03/dining/03bloom.html Severson, Kim. “For the Big Game? Why, Pigskins.” New York Times 3 Feb. 2010. 23 Aug. 2010 http://query.nytimes.com/gst/fullpage.html?res=9502E2DB143DF930A35751C0A9669D8B63&ref=april_bloomfield Sifton, Sam. “The Breslin Bar and Dining Room.” New York Times 12 Jan. 2010. 3 Sep. 2010 http://events.nytimes.com/2010/01/13/dining/reviews/13rest.htm Southern, Terry & Richard Branson. Virgin: A History of Virgin Records. London: A. Publishing, 1996. Starchefs.com. 4th Annual StarChefs.com International Chefs Congress. 2009. 1 Sep. 2010 http://www.starchefs.com/cook/icc-2009 Stein, Joshua David. “Exit Interview: Ken Friedman on the Demise of the John Dory.” Grub Street 15 Sep. 2009. 1 Sep. 2010 http://newyork.grubstreet.com/2009/09/exit_interview_ken_friedman_on.html Steinhauer, Jennifer & Jo Craven McGinty. “Yesterday’s Special: Good, Cheap Dining.” New York Times 26 Jun. 2005. 1 Sep. 2010 http://www.nytimes.com/2005/06/26/nyregion/26restaurant.html Striffler, Steve. Chicken: The Dangerous Transformation of America’s Favorite Food. New Haven: Yale University Press, 2005. The Spotted Pig (TSP) 2010 The Spotted Pig website http://www.thespottedpig.com Time Out New York. “Eat Out Awards 2009. Best New Hand at Seafood: April Bloomfield, the John Dory”. Time Out New York 706, 9-15 Apr. 2009. 10 Sep. 2010 http://newyork.timeout.com/articles/eat-out-awards/73170/eat-out-awards-2009-best-new-hand-at-seafood-a-april-bloomfield-the-john-dory Vallis, Alexandra. “Ken Friedman on the Virtues of No Reservations.” Grub Street 27 Aug. 2009. 10 Sep. 2010 http://newyork.grubstreet.com/2009/08/ken_friedman_on_the_virtues_of.html Watson, James L. Ed. Golden Arches East: McDonald’s in East Asia. Stanford: Stanford U P, 1997.Woody, Londa L. All in a Day's Work: Historic General Stores of Macon and Surrounding North Carolina Counties. Boone, North Carolina: Parkway Publishers, 2001. Young, Daniel. “Bon Appetit! It’s Feeding Time at Le Zoo.” New York Daily News 28 May 1995. 2 Sep. 2010 http://www.nydailynews.com/archives/lifestyle/1995/05/28/1995-05-28_bon_appetit__it_s_feeding_ti.html
APA, Harvard, Vancouver, ISO, and other styles
38

Young, Sherman. "Beyond the Flickering Screen: Re-situating e-books." M/C Journal 11, no. 4 (August 26, 2008). http://dx.doi.org/10.5204/mcj.61.

Full text
Abstract:
The move from analog distribution to online digital delivery is common in the contemporary mediascape. Music is in the midst of an ipod driven paradigm shift (Levy), television and movie delivery is being reconfigured (Johnson), and newspaper and magazines are confronting the reality of the world wide web and what it means for business models and ideas of journalism (Beecher). In the midst of this change, the book publishing industry remains defiant. While embracing digital production technologies, the vast majority of book content is still delivered in material form, printed and shipped the old-fashioned way—despite the efforts of many technology companies over the last decade. Even the latest efforts from corporate giants such as Sony and Amazon (who appear to have solved many of the technical hurdles of electronic reading devices) have had little visible impact. The idea of electronic books, or e-books, remains the domain of geeky early adopters (“Have”). The reasons for this are manifold, but, arguably, a broader uptake of e-books has not occurred because cultural change is much more difficult than technological change and book readers have yet to be persuaded to change their cultural habits. Electronic reading devices have been around for as long as there have been computers with screens, but serious attempts to replicate the portability, readability, and convenience of a printed book have only been with us for a decade or so. The late 1990s saw the release of a number of e-book devices. In quick succession, the likes of the Rocket e-Book, the SoftBook and the Franklin eBookman all failed to catch on. Despite this lack of market penetration, software companies began to explore the possibilities—Microsoft’s Reader software competed with a similar product from Adobe, some publishers became content providers, and a niche market of consumers began reading e-books on personal digital assistants (PDAs). That niche was sufficient for e-reading communities and shopfronts to appear, with a reasonable range of titles becoming available for purchase to feed demand that was very much driven by early adopters. But the e-book market was and remains small. For most people, books are still regarded as printed paper objects, purchased from a bookstore, borrowed from a library, or bought online from companies like Amazon.com. More recently, the introduction of e-ink technologies (EPDs) (DeJean), which allow for screens with far more book-like resolution and contrast, has provided the impetus for a new generation of e-book devices. In combination with an expanded range of titles (and deals with major publishing houses to include current best-sellers), there has been renewed interest in the idea of e-books. Those who have used the current generation of e-ink devices are generally positive about the experience. Except for some sluggishness in “turning” pages, the screens appear crisp, clear and are not as tiring to read as older displays. There are a number of devices that have embraced the new screen technologies (mobileread) but most attention has been paid to three devices in particular—mainly because their manufacturers have tried to create an ecosystem that provides content for their reading devices in much the same way that Apple’s itunes store provides content for ipods. The Sony Portable Reader (Sonystyle) was the first electronic ink device to be produced by a mainstream consumers electronics company. Sony ties the Reader to its Connect store, which allows the purchase of book titles via a computer; titles are then downloaded to the Reader in the same way that an mp3 player is loaded with music. Sony’s most prominent competition in the marketplace is Amazon’s Kindle, which does not require users to have a computer. Instead, its key feature is a constant wireless connection to Amazon’s growing library of Kindle titles. This works in conjunction with US cellphone provider Sprint to allow the purchase of books via wireless downloads wherever the Sprint network exists. The system, which Amazon calls “whispernet,” is invisible to readers and the cost is incorporated into the price of books, so Kindle users never see a bill from Sprint (“Frequently”). Both the Sony Reader and the Amazon Kindle are available only in limited markets; Kindle’s reliance on a cellphone network means that its adoption internationally is dependent on Amazon establishing a relationship with a cellphone provider in each country of release. And because both devices are linked to e-bookstores, territorial rights issues with book publishers (who trade publishing rights for particular global territories in a colonial-era mode of operation that seems to ignore the reality of global information mobility (Thompson 74–77)) contribute to the restricted availability of both the Sony and Amazon products. The other mainstream device is the iRex Iliad, which is not constrained to a particular online bookstore and thus is available internationally. Its bookstore ecosystems are local relationships—with Dymocks in Australia, Borders in the UK, and other booksellers across Europe (iRex). All three devices use EPDs and share similar specifications for the actual reading of e-books. Some might argue that the lack of a search function in the Sony and the ability to write on pages in the Iliad are quite substantive differences, but overall the devices are distinguished by their availability and the accessibility of book titles. Those who have used the devices extensively are generally positive about the experience. Amazon’s Customer Reviews are full of positive comments, and the sense from many commentators is that the systems are a viable replacement for old-fashioned printed books (Marr). Despite the good reviews—which suggest that the technology is actually now good enough to compete with printed books—the e-book devices have failed to catch on. Amazon has been hesitant to state actual sales figures, leaving it to so-called analysts to guess with the most optimistic suggesting that only 30 to 50,000 have sold since launch in late 2007 (Sridharan). By comparison, a mid-list book title (in the US) would expect to sell a similar number of copies. The sales data for the Sony Portable Reader (which has been on the market for nearly two years) and the iRex iliad are also elusive (Slocum), suggesting that they have not meaningfully changed the landscape. Tellingly, despite the new devices, the e-book industry is still tiny. Although it is growing, the latest American data show that the e-book market has wholesale revenues of around $10 million per quarter (or around $40 million per year), which is dwarfed by the $35 billion in revenues regularly earned annually in the US printed book industry ("Book"). It’s clear that despite the technological advances, e-books have yet to cross the chasm from early adopter to mainstream usage (see IPDF). The reason for this is complex; there are issues of marketing and distribution that need to be considered, as well as continuing arguments about screen technologies, appropriate publishing models, and digital rights management. It is beyond the scope of this article to do justice to those issues. Suffice to say, the book industry is affected by the same debates over content that plague other media industries (Vershbow). But, arguably, the key reason for the minimal market impact is straightforward—technological change is relatively easy, but cultural change is much more difficult. The current generation of e-book devices might be technically very close to being a viable replacement for print on paper (and the next generation of devices will no doubt be even better), but there are bigger cultural hurdles to be overcome. For most people, the social practice of reading books (du Gay et al 10) is inextricably tied with printed objects and a print culture that is not yet commonly associated with “technology” (perhaps because books, as machines for reading (Young 160), have become an invisible technology (Norman 246)). E. Annie Proulx’s dismissive suggestion that “nobody is going to sit down and read a novel on a twitchy little screen. Ever” (1994) is commonly echoed when book buyers consider the digital alternative. Those thoughts only scratch the surface of a deeply embedded cultural practice. The centuries since Gutenberg’s printing press and the vast social and cultural changes that followed positioned print culture as the dominant cultural mode until relatively recently (Eisenstein; Ong). The emerging electronic media forms of the twentieth century displaced that dominance with many arguing that the print age was moved aside by first radio and television and now computers and the Internet (McLuhan; Postman). Indeed, there is a subtext in that line of thought, one that situates electronic media forms (particularly screen-based ones) as the antithesis of print and book culture. Current e-book reading devices attempt to minimise the need for cultural change by trying to replicate a print culture within an e-print culture. For the most part, they are designed to appeal to book readers as a replacement for printed books. But it will take more than a perfect electronic facsimile of print on paper to persuade readers to disengage with a print culture that incorporates bookshops, bookclubs, writing in the margins, touching and smelling the pages and covers, admiring the typesetting, showing off their bookshelves, and visibly identifying with their collections. The frequently made technical arguments (about flashing screens and reading in the bath (Randolph)) do not address the broader apprehension about a cultural experience that many readers do not wish to leave behind. It is in that context that booklovers appear particularly resistant to any shift from print to a screen-based format. One only has to engage in a discussion about e-books (or lurk on an online forum where one is happening) to appreciate how deeply embedded print culture is (Hepworth)—book readers have a historical attachment to the printed object and it is this embedded cultural resistance that is the biggest barrier for e-books to overcome. Although e-book devices in no way resemble television, print culture is still deeply suspicious of any screen-based media and arguments are often made that the book as a physical object is critical because “different types of media function differently, and even if the content is similar the form matters quite a lot” (Weber). Of course, many in the newspaper industry would argue that long-standing cultural habits can change very rapidly and the migration of eyeballs from newsprint to the Internet is a cautionary tale (see Auckland). That specific format shift saw cultural change driven by increased convenience and a perception of decreased cost. For those already connected to the Internet, reading newspapers online represented zero marginal cost, and the range of online offerings dwarfed that of the local newsagency. The advantage of immediacy and multimedia elements, and the possibility of immediate feedback, appeared sufficient to drive many away from print towards online newspapers.For a similar shift in the e-book realm, there must be similar incentives for readers. At the moment, the only advantages on offer are weightlessness (which only appeals to frequent travellers) and convenience via constant access to a heavenly library of titles (Young 150). Amazon’s Kindle bookshop can be accessed 24/7 from anywhere there is a Sprint network coverage (Nelson). However, even this advantage is not so clear-cut—there is a meagre range of available electronic titles compared to printed offerings. For example, Amazon claims 130,000 titles are currently available for Kindle and Sony has 50,000 for its Reader, figures that are dwarfed by Amazon’s own printed book range. Importantly, there is little apparent cost advantage to e-books. The price of electronic reading devices is significant, amounting to a few hundred dollars to which must be added the cost of e-books. The actual cost of those titles is also not as attractive as it might be. In an age where much digital content often appears to be free, consumers demand a significant price advantage for purchasing online. Although some e-book titles are priced more affordably than their printed counterparts, the cost of many seems strangely high given the lack of a physical object to print and ship. For example, Amazon Kindle titles might be cheaper than the print version, but the actual difference (after discounting) is not an order of magnitude, but of degree. For example, Randy Pausch’s bestselling The Last Lecture is available for $12.07 as a paperback or $9.99 as a Kindle edition (“Last”). For casual readers, the numbers make no sense—when the price of the reading device is included, the actual cost is prohibitive for those who only buy a few titles a year. At the moment, e-books only make sense for heavy readers for whom the additional cost of the reading device will be amortised over a large number of books in a reasonably short time. (A recent article in the Wall Street Journal suggested that the break-even point for the Kindle was the purchase of 61 books (Arends).) Unfortunately for the e-book industry, not is only is that particular market relatively small, it is the one least likely to shift from the embedded habits of print culture. Arguably, should e-books eventually offer a significant cost benefit for consumers, uptake would be more dramatic. However, in his study of cellphone cultures, Gerard Goggin argues against purely fiscal motivations, suggesting that cultural change is driven by other factors—in his example, new ways of communicating, connecting, and engaging (205–211). The few market segments where electronic books have succeeded are informative. For example, the market for printed encyclopedias has essentially disappeared. Most have reinvented themselves as CD-ROMs or DVD-ROMs and are sold for a fraction of the price. Although cost is undoubtedly a factor in their market success, added features such as multimedia, searchability, and immediacy via associated websites are compelling reasons driving the purchase of electronic encyclopedias over the printed versions. The contrast with the aforementioned e-book devices is apparent with encyclopedias moving away from their historical role in print culture. Electronic encyclopedias don’t try to replicate the older print forms. Rather they represent a dramatic shift of book content into an interactive audio-visual domain. They have experimented with new formats and reconfigured content for the new media forms—the publishers in question simply left print culture behind and embraced a newly emerging computer or multimedia culture. This step into another realm of social practices also happened in the academic realm, which is now deeply embedded in computer-based delivery of research and pedagogy. Not only are scholarly journals moving online (Thompson 320–325), but so too are scholarly books. For example, at the Macquarie University Library, there has been a dramatic increase in the number of electronic books in the collection. The library purchased 895 e-books in 2005 and 68,000 in 2007. During the same period, the number of printed books purchased remained relatively stable with about 16,000 bought annually (Macquarie University Library). The reasons for the dramatic increase in e-book purchases are manifold and not primarily driven by cost considerations. Not only does the library have limited space for physical storage, but Macquarie (like most other Universities) emphasises its e-learning environment. In that context, a single e-book allows multiple, geographically dispersed, simultaneous access, which better suits the flexibility demanded of the current generation of students. Significantly, these e-books require no electronic reading device beyond a standard computer with an internet connection. Users simply search for their required reading online and read it via their web browser—the library is operating in a pedagogical culture that assumes that staff and students have ready access to the necessary resources and are happy to read large amounts of text on a screen. Again, gestures towards print culture are minimal, and the e-books in question exist in a completely different distributed electronic environment. Another interesting example is that of mobile phone novels, or “keitai” fiction, popular in Japan. These novels typically consist of a few hundred pages, each of which contains about 500 Japanese characters. They are downloaded to (and read on) cellphones for about ten dollars apiece and can sell in the millions of copies (Katayama). There are many reasons why the keitai novel has achieved such popularity compared to the e-book approaches pursued in the West. The relatively low cost of wireless data in Japan, and the ubiquity of the cellphone are probably factors. But the presence of keitai culture—a set of cultural practices surrounding the mobile phone—suggests that the mobile novel springs not from a print culture, but from somewhere else. Indeed, keitai novels are written (often on the phones themselves) in a manner that lends itself to the constraints of highly portable devices with small screens, and provides new modes of engagement and communication. Their editors attribute the success of keitai novels to how well they fit into the lifestyle of their target demographic, and how they act as community nodes around which readers and writers interact (Hani). Although some will instinctively suggest that long-form narratives are doomed with such an approach, it is worthwhile remembering that, a decade ago, few considered reading long articles using a web browser and the appropriate response to computer-based media was to rewrite material to suit the screen (Nielsen). However, without really noticing the change, the Web became mainstream and users began reading everything on their computers, including much longer pieces of text. Apart from the examples cited, the wider book trade has largely approached e-books by trying to replicate print culture, albeit with an electronic reading device. Until there is a significant cost and convenience benefit for readers, this approach is unlikely to be widely successful. As indicated above, those segments of the market where e-books have succeeded are those whose social practices are driven by different cultural motivations. It may well be that the full-frontal approach attempted to date is doomed to failure, and e-books would achieve more widespread adoption if the book trade took a different approach. The Amazon Kindle has not yet persuaded bookloving readers to abandon print for screen in sufficient numbers to mark a seachange. Indeed, it is unlikely that any device positioned specifically as a book replacement will succeed. Instead of seeking to make an e-book culture a replacement for print culture, effectively placing the reading of books in a silo separated from other day-to-day activities, it might be better to situate e-books within a mobility culture, as part of the burgeoning range of social activities revolving around a connected, convergent mobile device. Reading should be understood as an activity that doesn’t begin with a particular device, but is done with whatever device is at hand. In much the same way that other media producers make content available for a number of platforms, book publishers should explore the potential of the new mobile devices. Over 45 million smartphones were sold globally in the first three months of 2008 (“Gartner”)—somewhat more than the estimated shipments of e-book reading devices. As well as allowing a range of communications possibilities, these convergent devices are emerging as key elements in the new digital mediascape—one that allows users access to a broad range of media products via a single pocket-sized device. Each of those smartphones makes a perfectly adequate e-book reading device, and it might be useful to pursue a strategy that embeds book reading as one of the key possibilities of this growing mobility culture. The casual gaming market serves as an interesting example. While hardcore gamers cling to their games PCs and consoles, a burgeoning alternative games market has emerged, with a different demographic purchasing less technically challenging games for more informal gaming encounters. This market has slowly shifted to convergent mobile devices, exemplified by Sega’s success in selling 300,000 copies of Super Monkey Ball within 20 days of its release for Apple’s iphone (“Super”). Casual gamers do not necessarily go on to become hardcore games, but they are gamers nonetheless—and today’s casual games (like the aforementioned Super Monkey Ball) are yesterday’s hardcore games of choice. It might be the same for reading. The availability of e-books on mobile platforms may not result in more people embracing longer-form literature. But it will increase the number of people actually reading, and, just as casual gaming has attracted a female demographic (Wallace 8), the instant availability of appropriate reading material might sway some of those men who appear to be reluctant readers (McEwan). Rather than focus on printed books, and book-like reading devices, the industry should re-position e-books as an easily accessible content choice in a digitally converged media environment. This is more a cultural shift than a technological one—for publishers and readers alike. Situating e-books in such a way may alienate a segment of the bookloving community, but such readers are unlikely to respond to anything other than print on paper. Indeed, it may encourage a whole new demographic—unafraid of the flickering screen—to engage with the manifold attractions of “books.” References Arends, Brett. “Can Amazon’s Kindle Save You Money?” The Wall St Journal 24 June 2008. 25 June 2008 ‹http://online.wsj.com/article/SB121431458215899767.html? mod=rss_whats_news_technology>. Auckland, Steve. “The Future of Newspapers.” The Independent 13 Nov. 2008. 24 June 2008 ‹http://news.independent.co.uk/media/article1963543.ece>. Beecher, Eric. “War of Words.” The Monthly, June 2007: 22–26. 25 June 2008 . “Book Industry Trends 2006 Shows Publishers’ Net Revenues at $34.59 Billion for 2005.” Book Industry Study Group. 22 May 2006 ‹http://www.bisg.org/news/press.php?pressid=35>. DeJean, David, “The Future of e-paper: The Kindle is Only the Beginning.” Computerworld 6 June 2008. 12 June 2008 ‹http://www.computerworld.com/action/article .do?command=viewArticleBasic&articleId=9091118>. du Gay, Paul, Stuart Hall, Linda Janes, Hugh Mackay, and Keith Negus. Doing Cultural Studies: The Story of the Sony Walkman. Thousand Oaks: Sage, 1997. Eisenstein, Elizabeth. The Printing Press as an Agent of Change. Cambridge: Cambridge UP, 1997. “Frequently Asked Questions about Amazon Kindle.” Amazon.com. 12 June 2008 ‹http://www.amazon.com/gp/help/customer/display.html?nodeId=200127480&#whispernet>. “Gartner Says Worldwide Smartphone Sales Grew 29 Percent in First Quarter 2008.” Gartner. 6 June 2008. 20 June 2008 ‹http://www.gartner.com/it/page.jsp?id=688116>. Goggin, Gerard. Cell Phone Cultures. London: Routledge, 2006. Hani, Yoko. “Cellphone Bards Make Bestseller Lists.” Japan Times Online Sep. 2007. 20 June 2008 ‹http://search.japantimes.co.jp/cgi-bin/fl20070923x4.html>. “Have you Changed your mind on Ebook Readers?” Slashdot. 25 June 2008 ‹http://ask.slashdot.org/article.pl?sid=08/05/08/2317250>. Hepworth, David. “The Future of Reading or the Sinclair C5.” The Word 17 June 2008. 20 June 2008 ‹http://www.wordmagazine.co.uk/content/future-reading-or-sinclair-c5>. IPDF (International Digital Publishing Forum) Industry Statistics. 24 June 2008 ‹http://www.openebook.org/doc_library/industrystats.htm>. iRex Technologies Press. 12 June 2008 ‹http://www.irextechnologies.com/about/press>. Johnson, Bobbie. “Vince Cerf, AKA the Godfather of the Net, Predicts the End of TV as We Know It.” The Guardian 27 Aug. 2008. 24 June 2008 ‹http://www.guardian.co.uk/technology/2007/aug/27/news.google>. Katayama, Lisa. “Big Books Hit Japan’s Tiny Phones.” Wired Jan. 2007. 24 June 2008 ‹http://www.wired.com/culture/lifestyle/news/2007/01/72329>. “The Last Lecture.” Amazon.com. 24 June 2008 ‹http://www.amazon.com/gp/product/1401323251/ref=amb_link_3359852_2? pf_rd_m=ATVPDKIKX0DER&pf_rd_s=right-1&pf_rd_r=07NDSWAK6D4HT181CNXD &pf_rd_t=101&pf_rd_p=385880801&pf_rd_i=549028>.Levy, Steven. The Perfect Thing. London:Ebury Press, 2006. Macquarie University Library Annual Report 2007. 24 June 2008 ‹http://senate.mq.edu.au/ltagenda/0308/library_report%202007.doc>. Marr, Andrew. “Curling Up with a Good EBook.” The Guardian 11 May 2007. 23 May 2007 ‹http://technology.guardian.co.uk/news/story/0,,2077278,00.html>. McEwan, Ian. “Hello, Would you Like a Free Book?” The Guardian 20 Sep. 2005. 28 June 2008 ‹http://www.guardian.co.uk/books/2005/sep/20/fiction.features11>. McLuhan, Marshall. The Gutenberg Galaxy. Toronto: U of Toronto P, 1962. Mobileread. E-book Reader Matrix, Mobileread Wiki. 30 May 2008 ‹http://wiki.mobileread.com/wiki/E-book_Reader_Matrix>. Nelson, Sara. “Warming to Kindle.” Publishers Weekly 10 Dec. 2007. 31 Jan. 2008 ‹http://www.publishersweekly.com/article/CA6510861.htm.html>. Nielsen, Jakob. “Concise, Scannable and Objective, How to Write for the Web.” 1997. ‹20 June 2008 ‹http://www.useit.com/papers/webwriting/writing.html>. Norman, Don. The Invisible Computer: Why Good Products Can Fail. Cambridge, MA: MIT P, 1998. Ong, Walter. Orality & Literacy: The Technologizing of the Word. New York: Methuen, 1988. Postman, Neil. Amusing Ourselves to Death. New York: Penguin, 1986. Proulx, E. Annie. “Books on Top.” The New York Times 26 May 1994. 28 June 2008 ‹http://www.nytimes.com/books/99/05/23/specials/proulx-top.html>. Randolph, Eleanor. “Reading into the Future.” The New York Times 18 June 2008. 19 June 2008 ‹http://www.nytimes.com/2008/06/18/opinion/18wed3.html?>. Slocum, Mac. “The Pitfalls of Publishing’s E-Reader Guessing Game.” O’Reilly TOC. June 2006. 24 June 2008 ‹http://toc.oreilly.com/2008/06/the-pitfalls-of-publishings-er.html>. Sridharan, Vasanth. “Goldman: Amazon Sold up to 50,000 Kindles in Q1.” Silicon Alley Insider 19 May 2008. 25 June 2008 ‹http://www.alleyinsider.com/2008/5/how_many_kindles_sold_last_quarter_>. “Super Monkey Ball iPhone's Super Sales.” Edge OnLine. 24 Aug. 2008 ‹http://www.edge-online.com/news/super-monkey-ball-iphones-super-sales>. Thompson, John B. Books in the Digital Age. London: Polity, 2005. Vershbow, Ben. “Self Destructing Books.” if:book. May 2005. 4 Oct. 2006 ‹http://www.futureofthebook.org/blog/archives/2005/05/selfdestructing_books.html>. Wallace, Margaret, and Brian Robbins. 2006 Casual Games White Paper. IDGA. 24 Aug. 2008 ‹http://www.igda.org/casual/IGDA_CasualGames_Whitepaper_2006.pdf>. Weber, Jonathan. “Why Books Resist the Rise of Novel Technologies.” The Times Online 23 May 2006. 25 June 2008 ‹http://entertainment.timesonline.co.uk/tol/arts_and_entertainment/books/article724510.ece> Young, Sherman. The Book is Dead, Long Live the Book. Sydney: UNSW P, 2007.
APA, Harvard, Vancouver, ISO, and other styles
39

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
40

DeJong, Scott, and Alexandre Bustamante de Monti Souza. "Playing Conspiracy." M/C Journal 25, no. 1 (March 17, 2022). http://dx.doi.org/10.5204/mcj.2869.

Full text
Abstract:
Introduction Scholars, journalists, conspiracists, and public-facing groups have employed a variety of analogies to discuss the role that misleading content (conspiracy theory, disinformation, malinformation, and misinformation), plays in our everyday lives. Terms like the “disinformation war” (Hwang) or the “Infodemic” (United Nations) attempt to summarise the issues of misleading content to aide public understanding. This project studies the effectiveness of these analogies in conveying the movement of online conspiracy theory in social media networks by simulating them in a game. Building from growing comparisons likening conspiracy theories to game systems (Berkowitz; Kaminska), we used game design as a research tool to test these analogies against theory. This article focusses on the design process, rather than implementation, to explore where the analogies succeed and fail in replication. Background and Literature Review Conspiracy Theories and Games Online conspiracy theories reside in the milieu of misinformation (unintentionally incorrect), disinformation (intentionally incorrect), and malinformation (intentionally harmful) (Wardle and Derakhshan 45). They are puzzled together through the vast amount of information available online (Hannah 1) creating a “hunt” for truth (Berkowitz) that refracts information through deeply personal narratives that create paradoxical interpretations (Hochschild xi). Modern social media networks offer curated but fragmented content distribution where information discovery involves content finding users through biased sources (Toff and Nielsen 639). This puzzling together of theories gives conspiracy theorists agency in ‘finding the story’, giving them agency in a process with underlining goals (Kaminska). A contemporary example is QAnon, where the narrative of a “secret global cabal”, large-scale pedophile rings, and overstepping government power is pieced together through Q-drops or cryptic clues that users decipher (Bloom and Moskalenko 5). This puzzle paints a seemingly hidden reality for players to uncover (Berkowitz) and offers gripping engagement which connects “disparate data” into a visualised conspiracy (Hannah 3). Despite their harmful impacts, conspiracy theories are playful (Sobo). They can be likened to playful acts of make-belief (Sobo), reality-adjacent narratives that create puzzles for exploration (Berkowitz), and community building through playful discovery (Bloom and Moskalenko 169). Not only do conspiracies “game the algorithm” to promote content, but they put players into in a self-made digital puzzle (Bloom and Moskalenko 17, 18). This array of human and nonhuman actors allows for truth-spinning that can push people towards conspiracy through social bonds (Moskalenko). Mainstream media and academic institutions are seen as biased and flawed information sources, prompting these users to “do their own research” within these spaces (Ballantyne and Dunning). However, users are in fragmented worldviews, not binaries of right and wrong, which leaves journalism and fact-checkers in a digital world that requires complex intervention (De Maeyer 22). Analogies Analogies are one method of intervention. They offer explanation for the impact conspiracy has had on society, such as the polarisation of families (Andrews). Both conspiracists and public-facing groups have commonly used an analogy of war. The recent pandemic has also introduced analogies of virality (Hwang; Tardáguila et al.). A war analogy places truth on a battleground against lies and fiction. “Doing your own research” is a combat maneuver for conspiracy proliferation through community engagement (Ballantyne and Dunning). Similarly, those fighting digital conspiracies have embraced the analogy to explain the challenges and repercussions of content. War suggests hardened battlelines, the need for public mobilisation, and a victory where truth prevails, or defeat where fallacy reigns (Shackelford). Comparatively, a viral analogy, or “Infodemic” (United Nations), suggests misleading content as moving through a network like an infectious system; spreading through paths of least resistance or effective contamination (Scales et al. 678; Graham et al. 22). Battlelines are replaced with paths or invasion, where the goal is to infect the system or construct a rapid response vaccine that can stymie the ever-growing disease (Tardáguila et al.). In both cases, victorious battles or curative vaccinations frame conspiracy and disinformation as temporary problems. The idea of the rise and falls of a conspiracy’s prominence as link to current events emulates Byung-Chung Han’s notion of the digital swarm, or fragmented communities that coalesce, bubble up into volatile noise, and then dissipate without addressing the “dominant power relations” (Han 12). For Han, swarms arise in digital networks with intensive support before disappearing, holding an influential but ephemeral life. Recently, scholarship has applied a media ecology lens to recognise the interconnection of actors that contribute to these swarms. The digital-as-ecosystem approach suggests a network that needs to be actively managed (Milner and Phillips 8). Tangherlini et al.’s work on conspiracy pipelines highlights the various actors that move information through them to make the digital ecosystem healthy or unhealthy (Tangherlini et al.). Seeing the Internet, and the movement of information on it, as an ecology posits a consideration of processes that are visible (i.e., conspiracy theorists) and invisible (i.e., algorithms etc.) and is inclusive of human and non-human actors (Milner and Phillips). With these analogies as frames, we answer Sobo’s call for a playful lens towards conspiracy alongside De Maeyer’s request for serious interventions by using serious play. If we can recognise both conspiracy and its formation as game-like and understand these analogies as explanatory narratives, we can use simulation game design to ask: how are these systems of conspiracy propagation being framed? What gaps in understanding arise when we frame conspiracy theory through the analogies used to describe it? Method Research-Creation and Simulation Gaming Our use of game design methods reframed analogies through “gaming literacy”, which considers the knowledge put into design and positions the game as a set of practices relating to the everyday (Zimmerman 24). This process requires constant reflection. In both the play of the game and the construction of its parts we employed Khaled’s critical design framework (10-11). From March to December 2021 we kept reflective logs, notes from bi-weekly team meetings, playtest observations, and archives of our visual design to consistently review and reassess our progression. We asked how the visuals, mechanics, and narratives point to the affordances and drawbacks of these analogies. Visual and Mechanical Design Before designing the details of the analogies, we had to visualise their environment – networked social media. We took inspiration from existing visual representations of the Internet and social media under the hypothesis that employing a familiar conceptual model could improve the intelligibility of the game (figs. 1 and 2). In usability design, this is referred to as "Jakob's law" (Nielsen), in which, by following familiar patterns, the user can focus better on content, or in our case, play. Fig. 1: “My Twitter Social Ego Networks” by David Sousa-Rodrigues. A visual representation of Sousa-Rodrigues’s social media network. <https://www.flickr.com/photos/11452351@N00/2048034334>. We focussed on the networked publics (Itō) that coalesce around information and content disclosure. We prioritised data practices that influence community construction through content (Bloom and Moskalenko 57), and the larger conspiracy pipelines of fragmented data (Tangherlini et al. 30). Fig. 2: "The Internet Map" by Ruslan Enikeev. A visual, 2D, interactive representation of the Internet. <http://internet-map.net/>. Our query focusses on how play reciprocated, or failed to reciprocate, these analogies. Sharp et al.’s suggestion that obvious and simple models are intuitively understood allowed us to employ simplification in design in the hopes of parsing down complex social media systems. Fig. 3 highlights this initial attempt where social media platforms became “networks” that formed proximity to specific groups or “nodes”. Fig. 3: Early version of the game board, with a representation of nodes and networks as simplified visualisations for social networks. This simplification process guided the scaling of design as we tried to make the seemingly boundless online networks accessible. Colourful tokens represented users, placed on the nodes (fig. 4). Tokens represented portions of the user base, allowing players to see the proliferation of conspiracy through the network. Unfortunately, this simplification ignores the individual acts of users and their ability to bypass these pipelines as well as the discovery-driven collegiality within these communities (Bloom and Moskalenko 57). To help offset this, we designed an overarching scenario and included “flavour text” on cards (fig. 5) which offered narrative vignettes that grounded player actions in dynamic story. Fig. 4: The first version for the printed playtest for the board, with the representation of “networks” formed by a clustering of "nodes". The movement of conspiracy was indicated by colour-coded tokens. Fig. 5: Playing cards. They reference a particular action which typically adds or removes token. They also reference a theory and offer text to narrativise the action. Design demonstrates that information transmission is not entirely static. In the most recent version (fig. 6), this meant having the connections between nodes become subverted through player actions. Game mechanics, such as playing cards (fig. 5), make these pipelines interactive and visible by allowing players to place and move content throughout the space in response to each other’s actions. Fig. 6: The most updated version of the board, now named "Lizards and Lies". Red regions are initial starting points for conspiracy to enter mainstream social media (purple). Design adaptations focussed on making conspiracy theory dynamic. Player choice (i.e. where to add conspiracy) had to consider a continuously changing board created by other actors to reflect the adaptive nature of conspiracy theories. In this way, analogies came alive or died through the actions of players within a visually responsive system. This meant that each game had different swarms of conspiracy, where player decisions “wrote” a narrative through play. By selecting how and where conspiracy might be placed or removed, players created a narrative distinct to their game. For example, a conspiracy theorist player (one playable character) might explain their placing of conspiracy theory within the Chrpr/Twitter network as a community response to fact-checking (second playable character) in the neighbouring Shreddit/Reddit community. Results War Analogy Initial design took inspiration from wargaming to consider battlelines, various combatants, and a simulated conflict. Two player characters were made. Conspiracy theorists were posited against fact-checkers, where nodes and networks functioned as battlelines of intervention. The war narrative was immediately challenged by the end-state. Either conspiracy overtook networks or the fact checkers completely stymied conspiracy’s ability to exist. Both end-states seemed wrong for players. Battle consistently felt futile as conspiracists could always add more content, and fact-checkers could always remove something. Simply put, war fell flat. While the game could depict communities and spaces of combat, it struggled to represent how fragmented conspiracy theories are. In play, conspiracy theory became stagnant, the flow of information felt compelled, and the actors entered uneven dynamics. Utopia was never achieved, and war always raged on. Even when players did overtake a network, the victory condition (needing to control the most networks) made this task, which would normally be compelling, feel lacklustre. To address this, we made changes. We altered the win condition to offer points at the end of each turn depending on what the player did (i.e., spreading conspiracy into networks). We expanded the number of networks and connections between them (fig. 3 and fig. 6) to include more fluid and fragmented pipelines of conspiracy dissemination. We included round-end events which shifted the state of the game based on other actors, and we pushed players to focus on their own actions more than those of the others on the board. These changes naturally shifted the battleground from hardened battle lines to a fragmented amorphous spread of disinformation; it moved war to virality. Viral Analogy As we transitioned towards the viral, we prioritised the reflexive, ephemeral movements of conspiracy proliferating through networks. We focussed less on adding and removing content and shifted to the movement of actors through the space. Some communities became more susceptible to conspiracy content, fact-checkers relied on flagging systems, and conspiracy theories followed a natural, but unexpected pipeline of content dissemination. These changes allowed players to feel like individual actors with specific goals rather than competing forces. Fact-checkers relied on mitigation and response while conspiracists evaluated the susceptibility of specific communities to conspiracy content. This change illuminated a core issue with fact-checking; it is entirely responsive, endless, and too slow to stop content from having an impact. While conspiracists could play one card to add content, fact-checkers had to flag content, move their token, and use a player card to eliminate content – all of which exacerbated this issue. In this manner, the viral approach rearticulated how systems themselves afford the spread of conspiracy, where truly effective means to stop the spread relied on additional system actors, such as training algorithms to help remove and flag content. While a more effective simulation, the viral analogy struggled in its presentation of conspiracy theory within social media. Play had a tipping point, where given enough resources, those stopping the spread of conspiracy could “vaccinate” it and clean the board. To alter this, our design began to consider actions and reactions, creating a push and pull of play focussed on balancing or offsetting the system. This transition naturally made us consider a media ecology analogy. Media Ecology Replacing utopic end-states with a need to maintain network health reframed the nature of engagement within this simulation. An ecological model recognises that harmful content will exist in a system and aims not at elimination, but at maintaining a sustainable balance. It is responsive. It considers the various human and non-human actors at play and focusses on varied actor goals. As our game shifted to an ecological model, homogenous actors of conspiracists or fact-checkers were expanded. We transitioned a two-player game into a four-player variant, testing options like literacy educators, content recommending algorithms, and ‘edgelords'. Rather than defeating or saving social media, play becomes focussed on actors in the system. Play and design demonstrated how actions would shape play decisions. Characters were seen as network actors rather than enemies, changing interaction. Those spreading conspiracy began to focus less on “viral paths”, or lines of battle, and instead on where or how they could impact system health. In some cases, conspiracists would build one network of support, in others they created pockets around the board from which they could run campaigns. Those stopping the spread came to see their job as management. Rather than try and eliminate all conspiracy, they determined which sites to engage with, what content held the greatest threat, and which tools would be most effective. Media ecology play focussed less on outsmarting opponents and instead on managing an actor’s, and other players’, goals within an evolving system. Challenging Swarms and a Turn to Digital Ecology Using games to evaluate analogies illuminates clear gaps in their use, and the value of a media ecology lens. A key issue across the two main analogies (war and virality) was a utopic endstate. The idea that conspiracy can be beaten back, or vaccinated, fails to consider the endless amount of conspiracy possible to be made, or the impossibility of vaccinating the entire system. As our transitionary design process shows, the notion of winners and losers misplaces the intent of various actors groups where conspiracy is better framed as community-building rather than “controlling” a space (Bloom and Moskalenko 57). In design, while Han’s notion of the swarm was helpful, it struggled to play out in our simulations because fragments of conspiracy always remained on the board. This lingering content suggests that fact-checking does not actually remove ideological support. Swarms could quickly regrow around lingering support presenting them not as ephemeral as Han argued. As design transitioned towards ecology, these “fragments” were seen as part of a system of actors. Gameplay shows a deep interplay between the removal of content and its spread, arguing that removing conspiracy is a band-aid solution to a larger problem. Our own simplification of analogy into a game is not without limitations. Importantly, the impact of user specific acts for interpreting a movement (Toff and Nielsen 640), and the underlying set of networks that create “dark platforms” (Zeng and Schäfer 122) were lost in the game’s translation. Despite this, our work provides directions for scholarship and those engaging with the public on these issues to consider. Reframing our lens to understand online conspiracy as an aspect of digital ecological health, asks us to move away from utopic solutions and instead focus on distinct actors as they relate to the larger system. Conclusion Employing serious play as a lens to our framing of digital conspiracy, this project emphasises a turn towards media ecology models. Game design functioned as a tool to consider the actors, behaviours, and interactions of a system. Our methodological approach for visualising war and viral analogies demonstrates how playful responses can prompt questions and considerations of theory. Playing in this way, offers new insights for how we think about and grapple with the various actors associated with conspiracy theory and scholarship should continue to embrace ecological models to weigh the assemblage of actors. References Andrews, Travis. “QAnon Is Tearing Families Apart.” Washington Post, 2020. <https://www.washingtonpost.com/technology/2020/09/14/qanon-families-support-group/>. Ballantyne, Nathan, and David Dunning. “Skeptics Say, ‘Do Your Own Research.’ It’s Not That Simple.” The New York Times, 3 Jan. 2022. <https://www.nytimes.com/2022/01/03/opinion/dyor-do-your-own-research.html>. Berkowitz, Reed. “QAnon Resembles the Games I Design. But for Believers, There Is No Winning.” Washington Post, 2021. <https://www.washingtonpost.com/outlook/qanon-game-plays-believers/2021/05/10/31d8ea46-928b-11eb-a74e-1f4cf89fd948_story.html>. Bloom, Mia, and Sophia Moskalenko. Pastels and Pedophiles: Inside the Mind of QAnon. Stanford University Press, 2021. De Maeyer, Juliette. “Taking Conspiracy Culture Seriously: Journalism Needs to Face Its Epistemological Trouble.” Journalism 20.1 (2019): 21–23. <https://doi.org/10.1177/1464884918807037>. Graham, Timothy, et al. Like a Virus: The Coordinated Spread of Coronavirus Disinformation. The Australia Institute, 2020. <https://apo.org.au/node/305864>. Han, Byung-Chul. In the Swarm: Digital Prospects. Trans. Erik Butler. MIT Press, 2017. Hannah, Matthew N. “A Conspiracy of Data: QAnon, Social Media, and Information Visualization.” Social Media + Society, 7.3 (2021). <https://doi.org/10.1177/20563051211036064>. Hochschild, Arlie Russell. Strangers in Their Own Land: Anger and Mourning on the American Right. The New Press, 2016. Hwang, Tim. “Deconstructing the Disinformation War.” MediaWell, Social Science Research Council 1 June 2020. <https://mediawell.ssrc.org/expert-reflections/deconstructing-the-disinformation-war/>. Itō, Mizuko. “Introduction.” Networked Publics. Ed. Kazys Varnelis. MIT Press, 2008. Kaminska, Izabella. “The ‘Game Theory’ in the Qanon Conspiracy Theory.” Financial Times 16 Oct. 2020. <https://www.ft.com/content/74f9d20f-9ff9-4fad-808f-c7e4245a1725>. Khaled, Rilla. “Questions over Answers: Reflective Game Design.” Playful Disruption of Digital Media. Ed. Daniel Cermak-Sassenrath. Singapore: Springer, 2018. 3–27. <https://doi.org/10.1007/978-981-10-1891-6_1>. Milner, Ryan M., and Whitney Phillips. You Are Here. MIT Press, 2020. <https://you-are-here.pubpub.org/>. Moskalenko, Sophia. “Evolution of QAnon & Radicalization by Conspiracy Theories.” The Journal of Intelligence, Conflict, and Warfare 4.2 (2021): 109–14. <https://doi.org/10.21810/jicw.v4i2.3756>. Nielsen, Jakob. “End of Web Design.” Nielsen Norman Group, 2000. <https://www.nngroup.com/articles/end-of-web-design/>. Scales, David, et al. “The Covid-19 Infodemic — Applying the Epidemiologic Model to Counter Misinformation.” New England Journal of Medicine 385.8 (2021): 678–81. <https://doi.org/10.1056/NEJMp2103798>. Shackelford, Scott. “The Battle against Disinformation Is Global.” The Conversation 2020. <http://theconversation.com/the-battle-against-disinformation-is-global-129212>. Sharp, Helen, et al. Interaction Design: Beyond Human-Computer Interaction. 5th ed. Wiley, 2019. Sobo, Elisa Janine. “Playing with Conspiracy Theories.” Anthropology News 31 July 2019. <https://www.anthropology-news.org/articles/playing-with-conspiracy-theories/>. Tangherlini, Timothy R., et al. “An Automated Pipeline for the Discovery of Conspiracy and Conspiracy Theory Narrative Frameworks: Bridgegate, Pizzagate and Storytelling on the Web.” PLoS ONE 15.6 (2020). <https://doi.org/10.1371/journal.pone.0233879>. Tardáguila, Cristina, et al. “Taking an Ecological Approach to Misinformation.” Poynter 5 Dec. 2019. <https://www.poynter.org/fact-checking/2019/taking-an-ecological-approach-to-misinformation/>. Toff, Benjamin, and Rasmus Kleis Nielsen. “‘I Just Google It’: Folk Theories of Distributed Discovery.” Journal of Communication 68.3 (2018): 636–57. <https://doi.org/10.1093/joc/jqy009>. United Nations. “UN Tackles ‘Infodemic’ of Misinformation and Cybercrime in COVID-19 Crisis.” 2020. <https://www.un.org/en/un-coronavirus-communications-team/un-tackling-%E2%80%98infodemic%E2%80%99-misinformation-and-cybercrime-covid-19>. Wardle, Claire, and Hossein Derakhshan. “Thinking about ‘Information Disorder’: Formats of Misinformation, Disinformation, and Mal-Information.” Journalism, ‘Fake News’ & Disinformation. Eds. Cherilyn Ireton and Julie Posetti. Paris: Unesco, 2018. 43–54. Zeng, Jing, and Mike S. Schäfer. “Conceptualizing ‘Dark Platforms’. Covid-19-Related Conspiracy Theories on 8kun and Gab.” Digital Journalism 9.9 (2021): 1321–43. <https://doi.org/10.1080/21670811.2021.1938165>. Zimmerman, Eric. “Gaming Literacy: Game Design as a Model for Literacy in the Twenty-First Century.” The Video Game Theory Reader 2. 2008. 9.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography