Academic literature on the topic 'Co-existing schema versions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Co-existing schema versions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Co-existing schema versions"

1

Cardellach, Estel, Yang Nan, Weiqiang Li, Ramon Padullés, Serni Ribó, and Antonio Rius. "Variational Retrievals of High Winds Using Uncalibrated CyGNSS Observables." Remote Sensing 12, no. 23 (November 30, 2020): 3930. http://dx.doi.org/10.3390/rs12233930.

Full text
Abstract:
This study presents a new retrieval approach for obtaining wind speeds from CyGNSS level-1 observables. Unlike other existing approaches, (1) this one is a variational technique that is based on a physical forward model, (2) it uses uncalibrated bin raw counts observables, (3) the geophysical information content comes from only one pixel of the broader delay-Doppler map, finest achievable resolution in level-1 products over the sea, and (4) calibrates them against track-wise polynomial adjustments to a background numerical weather prediction model. Through comparisons with the background model, other spaceborne sensors (SMAP, SMOS, ASCAT-A/B), and CyGNSS wind retrievals by other organizations, the study shows that this approach has skills to infer wind speeds, including hurricane force winds. For example, the Pearson’s correlation coefficient between these CyGNSS retrievals and ERA5 is 0.884, 0.832 with NOAA CyGNSS results, and 0.831 with respect to SMAP co-located measurements. Furthermore, the variational retrieval algorithm is a simplified version of the more general equations that are used in data assimilation, and the calibration scheme could also be integrated in the assimilation process. Therefore, this approach is also a good tool for analyzing the potential performance of ingesting uncalibrated level-1 single-pixel observables into NWP.
APA, Harvard, Vancouver, ISO, and other styles
2

Harjes, Janno, Dagmar Triebel, Anton Link, Tanja Weibulat, Frank Oliver Glöckner, and Gerhard Rambold. "FAIR data in meta-omics research: Using the MOD-CO schema to describe structural and operational elements of workflows from field to publication." Biodiversity Information Science and Standards 3 (July 2, 2019). http://dx.doi.org/10.3897/biss.3.37596.

Full text
Abstract:
Nucleic acid and protein sequencing-based analyses are increasingly applied to determine origin, identity and traits of environmental (biological) objects and organisms. In this context, the need for corresponding data structures has become evident. As existing schemas and community standards in the domains of biodiversity and molecular biological research are comparatively limited with regard to the number of generic and specific elements, previous schemas for describing the physical and digital objects need to be replaced or expanded by new elements for covering the requirements from meta-omics techniques and operational details. On the one hand, schemas and standards are hitherto mostly focussed on elements, descriptors, or concepts that are relevant for data exchange and publication, on the other hand, detailed operational aspects regarding origin context and laboratory processing, as well as data management details, like the documentation of physical and digital object identifiers, are rather neglected. The conceptual schema for Meta-omics Data and Collection Objects (MOD-CO; https://www.mod-co.net/) has been set up recently Rambold et al. 2019. It includes design elements (descriptors or concepts), describing structural and operational details along the work- and dataflow from gathering environmental samples to the various transformation, transaction, and measurement steps in the laboratory up to sample and data publication and archiving. The concepts are named according to a multipartite naming structure, describing internal hierarchies and are arranged in concept (sub-)collections. By supporting various kinds of data record relationships, the schema allows for the concatenation of individual records of the operational segments along a workflow (Fig. 1). Thus, it may serve as a logical and structural backbone for laboratory information management systems. The concept structure in version 1.0 comprises 653 descriptors (concepts) and 1,810 predefined descriptor states, organised in 37 concept (sub-)collections. The published version 1.0 is available as various schema representations of identical content (https://www.mod-co.net/wiki/Schema_Representations). A normative XSD (= XML Schema Definition) for the schema version 1.0 is available under http://schema.mod-o.net/MOD-CO_1.0.xsd. The MOD-CO concepts might be integrated as descriptor/element structures in the relational database DiversityDescriptions (DWB-DD) an open-source and freely available software of the Diversity Workbench (DWB; https://diversityworkbench.net/Portal/DiversityDescriptions; https://diversityworkbench.net). Currently, DWB-DD is installed at the Data Center of the Bavarian Natural History Collections (SNSB) to build an instance of its own for storing and maintaining MOD-CO-structured meta-omics research data packages and enrich them with ‘metadata’ elements from the community standards Ecological Markup Language (EML), Minimum Information about any (x) Sequence (MIxS), Darwin Core (DwC) and Access to Biological Collection Data (ABCD). These activities are achieved in the context of ongoing FAIR ('Findable, Accessible, Interoperable and Reuseable') biodiversity research data publishing via the German Federation for Biological Data (GFBio) network (https://www.gfbio.org/). Version 1.1 of the schema with extended collections of structural and operational design concepts is scheduled for 2020.
APA, Harvard, Vancouver, ISO, and other styles
3

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
APA, Harvard, Vancouver, ISO, and other styles
4

Ting, Tin-yuet. "Digital Narrating for Contentious Politics: Social Media Content Curation at Movement Protests." M/C Journal 18, no. 4 (August 7, 2015). http://dx.doi.org/10.5204/mcj.995.

Full text
Abstract:
IntroductionThe popularity of social networking sites (SNSs) bears witness to thriving movement protests worldwide. The development of new hardware technologies such as mobile devices and digital cameras, in particular, has fast enhanced visual communications among users that help document and broadcast contemporary social movements. Using social media with these technologies thus presents new opportunities for grassroots social movement organisations (SMOs) and activist groups to become narrators of their activist lives, and to promote solidarity and recognition for advancing varied civic and political agendas. With the case of a student activist group that led and organised a 10-day occupation protest in Hong Kong, this article examines the idea of new media-savvy SMOs as political curators that employ SNS platforms to (co-)create digital narratives at large-scale movement protests. Invoking the concepts of curation and choreography, it highlights how these processes can work together to encourage contentious engagement and collaboration in contemporary social movements.The New Media-Savvy SMO as Political CuratorWhereas traditional social movement studies stressed the importance of pre-existing social networks and organisational structures for collective action, developments in new information and communication technologies (ICTs) challenge the common theories of how people are drawn into and participate in social movements. In recent years, a spate of research has particularly emphasised the ability of individuals and small groups to self-organise on the Internet (e.g. Rheingold). Lately, observing the use of SNSs such as Facebook and Twitter in contemporary social movements, work in this area has focused on how SNSs enable movement diffusion through personal networks and individuals’ online activities even without either the aid or the oversight of an organisation (e.g. Shirky).However, horizontal activism self-organised by atomised new media users seems insufficient as an explanation of how many recent protest movements achieved their high tides. While the flourishing literature shows writers have correctly centred their study on the changing dynamics in control over information and the growing importance of individual users’ contributions, it fails to account for the crucial role that SMOs continue to play. In fact, recent studies consistently observe the continuing importance of SMOs in mobilising and coordinating collective actions in online environments (Bimber, Flanagin, and Stohl, Collective). Whereas new ICTs have provided activist groups with the instrument to deal with their contentious activities with less cueing and leadership from conventional institutionalised structures, SMOs have created their own new media resources. Nowadays, a significant percentage of protest participants have received their information from online platforms that are run by or affiliated with these organisations. The critical questions remain about the kinds of communication methods they utilise to activate and integrate independent activists’ networks and participation, especially in emerging social media environments.Unfortunately, existing research tends to overlook the discursive potentials and cultural dimensions in online activism while emphasising the cost-effectiveness and organisational function of new ICTs. In particular, social movement and new media scholars merely attended to the ways in which digital media enable widescale, relatively un-coordinated contributions to repositories of resources for networks of activists and interest groups, as SNS applications stress the importance of user participation, openness, and network effects in the processes of content production and sharing. However, the mere existence or even “surplus” (Shirky 27) of “second-order communal goods” (Bimber, Flanagin, and Stohl, “Reconceptualizing” 372)—a collection of resources created collectively but without a bounded community, through video-posting, tagging, and circulation practices engaged in by individuals—does not accidentally result in critical publics that come to take part in political activism. Rather, social movements are, above all, the space for manifesting ideas, choices, and a collective will, in which people produce their own history through their cultural creations and social struggles (Touraine). As such, the alteration of meaning, the struggle to define the situation, and the discursive practices carried out within a social movement are all major aspects of social movements and change (Melucci).Indeed, SMOs and marginalised communities worldwide have increasingly learnt the ability to become narrators of their activist and community lives, and to express solidarity and recognition afforded through technology adoption. The recent proliferation of social media applications and mobile digital technologies has allowed activist groups to create and distribute their own stories regarding concrete actions, ongoing campaigns, and thematic issues of protest movements on more multimedia platforms. In order to advance political ideas and collective action frames, they may bring together a variety of online content in such a way that the collated materials offer a commentary on a subject area by articulating and negotiating new media artefacts, while also inviting responses. Therefore, not only are the new media channels for activist communication comparatively inexpensive, but they also provide for a richer array of content and the possibility of greater control by SMOs over its (re-)creation, maintenance, and distribution for potential digital narrating. To understand how digital narrating takes place in contemporary protest movements with SNSs, we now turn to two analytic concepts—curation and choreography.Social Media Content Curation and Choreography Curation, as a new media practice, involves finding, categorising, and organising relevant online content on specific issues. For instance, museums and libraries may have curators to select and feature digital items for collection and display, improving the types of information accessible to a public audience. In protest movements, SMOs and political actors may also curate peer-produced content on SNS platforms so as to filter and amplify useful information for mobilising collective action. In fact, this process by SMOs and political actors is particularly important, as it helps sort and draw timely attention to these information sources, especially at times when users are faced with a large amount of noise created by millions of producers (Bennett, Segerberg, and Walker). More importantly, not only does content curating entail the selection and preservation of online materials that may facilitate collective action, but it may also involve the (re-)presentation of selected content by telling stories not being told or by telling existing stories in a different way (Fotopoulou and Couldry). In contrast to professional collecting, it is a much more deliberate process, one which clearly articulates and puts forwards (opportunities for) new meanings or new understanding of a subject (Franks). For example, when new media content is re-posted or shared in its original form but in a new context, digital narrating occurs as it may result in a new or additional layer of meaning (Baym and Shah). Therefore, more than merely expending information resources available to activists, the power of curation can be understood primarily as discursive, as users may pick up particular versions of reality in interpreting social issues and protest movements (Bekkers, Moody, and Edwards).Moreover, nowadays, social media curating is not restricted to text but also includes image and video streaming, as the development of mobile devices and digital cameras has facilitated and enhanced instant communication and information retrieval almost regardless of location. The practice of content curating with SNSs may also involve the process of choreographing with various social media modules, such as posting a series of edited pictures under an overarching schema and organising user-generated photos into an album that suggests a particular theme. Rather than simply using a single visual item designed to tell a story, the idea of choreographing is thus concerned with how curated items are seen and experienced from the users’ perspectives as it “allows curators not just to expose elements of a story but to tell a structured tale with the traditional elements of beginning, middle and end” (Franks 288).In practice, the implementation of choreography can be envisioned to bring together the practice of content curating and that of enhancing and connecting contentious engagement at protest movements. For example, when SMOs make use of images and video to help frame an issue in a more advanced way by sharing a picture with a comment added on Facebook, they may at once, whether consciously or unconsciously, suggest possible endorsement to the selected content and/or the source—may it be that of an individual user or a formal organisation—while drawing attention to the image and circulating it beyond the original network for which it was posted (Bennett, Segerberg, and Walker). As such, by posting pictures with captions and sharing user-generated photos that do not belong to the SMO but are produced by other users, curating and choreographing with social media content can create a temporary space for practicing mutual recognition and extending the relationship between the SMO and the larger public. Combined, they may therefore “entail the creation of norms and boundaries in particular user communities and their platforms” (Bennett, Segerberg, and Walker 239).This article examines the ways in which a new media-savvy SMO employed SNS platforms to (co-)create digital narratives, with the case of the 2012 Anti-National Education Movement in Hong Kong. By highlighting how social media content curating and choreographing may work together to encourage engagement and collaboration at large-scale protests, we can better understand how emerging SNS-enabled affordances can be translated into concrete contentious activities, as well as the discursive aspects and cultural expressions of using new media platforms and digital technologies in contemporary protest movements.Digital Narrating for Grassroots Mobilisation Since 2010, the Hong Kong Special Administrative Region government has undertaken “national education” curriculum reform. However, the worry about mainland-Chinese style national education in schools brought people out to defend values that were held dear in Hong Kong. Scholarism, a new media-savvy SMO founded by about 20 secondary school students in May 2011, became the first pressure group formed against the “Moral and National Education” curriculum and became the leading activist group. On 30 August 2012, about 50 members and supporters of Scholarism started occupying the public area in front of the government’s headquarters, while three of its members went on a hunger strike. At the same time, Scholarism made active use of Facebook to undertake grassroots mobilisation, prompting both online activism and offline participation. On 7 September, over 120,000 people went to Occupy Headquarters. The next day, the Chief Executive, C. Y. Leung, succumbed to the pressure and declared that the curriculum would not be imposed in Hong Kong schools. In order to initiate a grassroots mobilisation, upon the beginning of Occupy Headquarters, Scholarism carried out the new media practice of telling the story of the student hunger strikers on Facebook to create a “moral shock” (Jasper 106) among the general public. On the first day of the occupation protest, 30 August, a poster on the hunger strike was released by Scholarism on its Facebook page. Instead of providing detailed information about the protest movement, this poster was characterised by the pictures of the three student hunger strikers. The headline message simply stated “We have started the hunger strike.” This poster was very popular among Facebook users; it accumulated more than 16,000 likes.By appealing to the hardships and sufferings of the three student hunger strikers, more photos were uploaded to narrate the course of the hunger strike and the occupation protest. In particular, pictures with captions added were posted on Facebook every couple of hours to report on the student hunger strikers’ latest situation. Although the mobilising power of these edited pictures did not come from their political ideology or rational argumentation, they sought to appeal to the “martyr-hood” of the student activists. Soon thereafter, as the social media updates of the student hunger strikers spread, feelings of shock and anger grew rapidly. Most of the comments that were posted under the updates and photos of the student hunger strikers on Scholarism’s Facebook page protested against the government’s brutality.In addition, as the movement grew, Scholarism extended the self-reporting activities on Facebook from members to non-members. For instance, it frequently (self-)reported on the amount of people joining the movement days and nights. This was especially so on 7 September, when Scholarism uploaded multiple photos and text messages to report on the physical movement of the 120,000 people. As a movement strategy, the display of images of protests and rallies on the Internet can help demonstrate the legitimacy, unity, numbers, and commitment of people supporting the movement goals (Carty and Onyett). Curating and choreographing with protest images on Facebook therefore facilitated the symbolic interactions and emotional exchanges among activists for maintaining movement solidarity and consolidating activist identity.To demonstrate the public support for its organisation and the movement, Scholarism extensively reported on its own, as well as other, protest activities and efforts on Facebook against the introduction of the “Moral and National Education” curriculum, creating unprecedented parallel public records of these events. In fact, throughout the entire movement protest, Scholarism took tight photo records of protest activities, systematically organised them into albums, and uploaded them onto Facebook every day between 30 August and 8 September.Content Co-Creation for Counter-Hegemonic ExpressionsFrom a (neo-)Gramscian perspective, counter-hegemony is often embedded and embodied in music, novels, drama, movies, and so on (Boggs). An example of counter-hegemony in the traditional media is a documentary that questions the government’s involvement in a war (Cohen). Therefore, popular culture in the media may help foster counter-hegemony on the terrain of civil society in preparation for political change (Pratt). For Chinese communities in East Asia, pop music, for example, had played a significant role in organising patriotic feelings in mass protest events, such as the Tiananmen demonstrations of 1989 and the many subsequent protests in Hong Kong, Taiwan, and elsewhere against the violence of the Beijing government (Chow 153). During the occupation protest, Facebook was turned into an open and flexible discursive space, in which cutting-edge counter-hegemonic narratives were produced, distributed, and expressed. Scholarism and many individual activists adopted the social media platform to (co-)create activists’ discourses and knowledge in order to challenge the dominant political and cultural codes (Melucci). An example is a poster created by Scholarism, posted on its Facebook page on 4 September. The title message of this poster is: “This is not the government headquarters. This is our CIVIC SQUARE. Come and occupy!” This message represents a discursive intervention that seeks to “illuminate the limits of normative discourses of knowledge and power” (Lane 138). It did so by replacing the original, official name and meaning of the government headquarters as well as its authority with the counter-hegemonic idea of “civic square,” a term developed and coined by Scholarism during the occupation protest to represent the public space in front of the headquarters.Moreover, the Facebook page of Scholarism was by no means the only source of content out of which counter-hegemonic knowledge and discourses were produced. Conversely, most of the new media artefacts observed on the Facebook page of Scholarism were originally created by and posted on, and therefore re-posted and shared from, the Facebook pages of other individual or group users. They are in forms of text, picture, video, and the like that sought to undermine the legitimacy of the Hong Kong government, ridicule the rationale of the “Moral and National Education” curriculum, and discredit figures in the opposition.An example is a cartoon made by an individual user and re-posted on the Facebook page of Scholarism on 2 September, the day before schools restarted in Hong Kong after the summer break. This cartoon features a schoolboy in his school uniform, who is going to school with a bunch of identical locks tied to his head. The title message is: “School begins, keep your brain safe.” This cartoon was created to ridicule the rationale of the introduction of the “Moral and National Education” by “making visible the underlying and hidden relations of power on which the smooth operation of government repression depends” (Lane 136).Another new media artefact re-posted on the Facebook page of Scholarism was originally created by a well-known Hong Kong cartoon painter of a major local newspaper. This cartoon sought to humanise the student activists and to condemn the brutality of the Hong Kong government. It paints an imagined situation in which a public conversation between the Secretary for Education, Hak-kim Eddie Ng, and the three students on the hunger strike takes place. In this cartoon, Ng is cast as the wholesaler of the “Moral and National Education” curriculum. Holding a bottle of liquid in his hand, he says to the students: “This is the tears of the chief executive from last night. Kids, should you all go home now?”Thus, counter-hegemonic expressions did not flow unidirectionally from Scholarism to the society at large. The special role of Scholarism was indeed to curate and choreograph new media artefacts by employing social media modules such as re-posting and sharing user-generated content. In so doing, it facilitated the mobilisation of the occupation protest and instant collaboration, as it connected scattered activities, turned them into a collective, and branded it with a common identity, conviction, and/or purpose.ConclusionThis article has briefly looked at the case of a new media-savvy SMO in Hong Kong as an example of how activist groups can become political curators at large-scale protest events. In particular, it highlights the concepts of curation and choreography in explaining how emerging SNS-enabled affordances can be translated into concrete contentious activities. This article argues that, rather than simply producing and disseminating content on SNS platforms, SMOs today have learnt to actively construct stories about protest movements with social media modules such as (re-)posting edited pictures and sharing user-generated photos in order to mobilise effective political interventions and sustain a vibrant participatory culture.ReferencesBaym, Geoffrey, and Chirag Shah. “Circulating Struggle: The On-Line Flow of Environmental Advocacy Clips from the Daily Show and the Colbert Report.” Information Communication & Society 14.7 (2011): 1017–38. Bekkers, Victor, Rebecca Moody, and Arthur Edwards. “Micro-Mobilization, Social Media and Coping Strategies: Some Dutch Experiences.” Policy and Internet 3.4 (2011): 1–29. Bennett, W. Lance, Alexandra Segerberg, and Shawn Walker. “Organization in the Crowd: Peer Production in Large-Scale Networked Protests.” Information, Communication & Society 17.2 (2014): 232–60. Bimber, Bruce, Andrew J. Flanagin, and Cynthia Stohl. “Reconceptualizing Collective Action in the Contemporary Media Environment.” Communication Theory 15.4 (2005): 365–88. ———. Collective Action in Organizations. New York: Cambridge UP, 2012.Boggs, Carl. The Two Revolutions: Antonio Gramsci and the Dilemmas of Western Marxism. Boston, MA: South End P, 1984. Carty, Victoria, and Jake Onyett. “Protest, Cyberactivism and New Social Movements: The Reemergence of the Peace Movement Post 9/11.” Social Movement Studies 5.3 (2006): 229–49. Chow, Ray. “Between Colonizers: Hong Kong’s Postcolonial Self-Writing in the 1990s.” Diaspora 2.2 (1992): 151–70. Cohen, Theodore. Global Political Economy. New York: Longman, 2003. Fotopoulou, Aristea, and Nick Couldry. “Telling the Story of the Stories: Online Content Curation and Digital Engagement.” Information, Communication & Society 18.2 (2015): 235–49. Franks, Rachel. “Establishing an Emotional Connection: The Librarian as (Digital) Storyteller.” The Australian Library Journal 62.4 (2013): 285–94. Jasper, James M. The Art of Moral Protest: Culture, Biography, and Creativity in Social Movement. Chicago: U of Chicago P, 1997. Lane, Jill. “Digital Zapatistas.” The Drama Review 47.2 (2003): 129–44. Melucci, Alberto. Challenging Codes: Collective Action in the Information Age. Cambridge: Cambridge UP, 1996.Pratt, Nicola. “Bringing Politics Back in: Examining the Link between Globalization and Democratization.” Review of International Political Economy 11.2 (2004): 311–36. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge, MA: Basic Books, 2003. Shirky, Clay. Cognitive Surplus: Creativity and Generosity in a Connected Age. London: Allen Lane, 2010. Touraine, Alain. Return of the Actor: Social Theory in Postindustrial Society. Minneapolis: U of Minnesota P, 1988.
APA, Harvard, Vancouver, ISO, and other styles
5

Fedorova, Ksenia. "Mechanisms of Augmentation in Proprioceptive Media Art." M/C Journal 16, no. 6 (November 7, 2013). http://dx.doi.org/10.5204/mcj.744.

Full text
Abstract:
Introduction In this article, I explore the phenomenon of augmentation by questioning its representational nature and analyzing aesthetic modes of our interrelationship with the environment. How can senses be augmented and how do they serve as mechanisms of enhancing the feeling of presence? Media art practices offer particularly valuable scenarios of activating such mechanisms, as the employment of digital technology allows them to operate on a more subtle level of perception. Given that these practices are continuously evolving, this analysis cannot claim to be a comprehensive one, but rather aims to introduce aspects of the specific relations between augmentation, sense of proprioception, technology, and art. Proprioception is one of the least detectable and trackable human senses because it involves our intuitive sense of positionality, which suggests a subtle equilibrium between a center (our individual bodies) and the periphery (our immediate environments). Yet, as any sense, proprioception implies a communicational chain, a network of signals traveling and exchanging information within the body-mind complex. The technological augmentation of this dynamic process produces an interference in our understanding of the structure and elements, the information sent/received. One way to understand the operations of the senses is to think about them as images that the mind creates for itself. Artistic intervention (usually) builds upon exactly this logic: representation of images generated in mind, supplementing or even supplanting the existing collection of inner images with new, created ones. Yet, in case of proprioception the only means to interfere with and augment these inner images is on bodily level. Hence, the question of communication through images (or representations) should be extended towards a more complex theory of embodied perception. Drawing on phenomenology, cognitive science, and techno-cultural studies, I focus on the potential of biofeedback technologies to challenge and transform our self-perception by conditioning new pathways of apprehension (sometimes by creating mechanisms of direct stimulation of neural activity). I am particularly interested in how the awareness of the self (grounded in the felt relationality of our body parts) is most significantly activated at the moments of disturbance of balance, in situations of perplexity and disorientation. Projects by Marco Donnarumma, Sean Montgomery, and other artists working with biofeedback aesthetically validate and instantiate current research about neuro-plasticity, with technologically mediated sensory augmentation as one catalyst of this process. Augmentation as Representation: Proprioception and Proprioceptive Media Representation has been one of the key ways to comprehend reality. But representation also constitutes a spatial relation of distancing and separation: the spectator encounters an object placed in front of him, external to him. Thus, representation is associated more with an analytical, rather than synthetic, methodology because it implies detachment and division into parts. Both methods involve relation, yet in the case of representation there is a more distinct element of distance between the representing subject and represented object. Representation is always a form of augmentation: it extends our abilities to see the "other", otherwise invisible sides and qualities of the objects of reality. Representation is key to both science and art, yet in case of the latter, what is represented is not a (claimed) "objective" scheme of reality, but rather images of the imaginary, inner reality (even figurative painting always presents a particular optical and psychological perspective, to say nothing about forms of abstract art). There are certain kinds of art (visual arts, music, dance, etc.) that deal with different senses and thus, build their specific representational structures. Proprioception is one of the senses that occupies relatively marginal position in artistic production (which is exactly because of the specificity of its representational nature and because it does not create a sense of an external object. The term "proprioception" comes from Latin propius, or "one's own", "individual", and capio, cepi – "to receive", "to perceive". It implies a sense of one's self felt as a relational unity of parts of the body most vividly discovered in movement and in effort employed in it. The loss of proprioception usually means loss of bodily orientation and a feeling of one's body (Sacks 43-54). On the other hand, in case of additional stimulation and training of this sense (not only via classical cyber-devices, like cyber-helmets, gloves, etc. that set a different optics, but also techniques of different kinds of altered states of mind, e.g. through psychotropics, but also through architecture of virtual space and acoustics) a sense of disorientation that appears at first changes towards some analogue of reactions of enthusiasm, excitement discovery, and emotion of approaching new horizons. What changes is not only perception of external reality, but a sense of one's self: the self is felt as fluid, flexible, with penetrable borders. Proprioception implies initial co-existence of the inner and outer space on the basis of originary difference and individuality/specificity of the occupied position. Yet, because they are related, the "external" and "other" already feels as "one's own", and this is exactly what causes the sense of presence. Among the many possible connections that the body, in its sense of proprioception, is always already ready for, only a certain amount gets activated. The result of proprioception is a special kind of meta-stable internal image. This image may not coincide with the optical, auditory, or haptic image. According to Brian Massumi, proprioception translates the exertions and ease of the body's encounters with objects into a muscular memory of relationality. This is the cumulative memory of skill, habit, posture. At the same time as proprioception folds tactility in, it draws out the subject's reactions to the qualities of the objects it perceives through all five senses, bringing them into the motor realm of externalizable response. (59) This internal image is not mediated by anything, though it depends directly on the relations between the parts. It cannot be grasped because it is by definition fluid and dynamic. The position in one point is replaced here by a position-in-movement (point-in-movement). "Movement is not indexed by position. Rather, the position is born in movement, from the relation of movement towards itself" (Massumi 179). Philosopher of "extended mind" Andy Clark notes that we should distinguish between a real body schema (non-conscious configuration) and a body image (conscious construct) (Clark). It is the former that is important to understand, and yet is the most challenging. Due to its fluidity and self-referentiality, proprioception is not presentable to consciousness (the unstable internal image that it creates resides in consciousness but cannot be grasped and thus re-presented). A feeling/sense, it is not bound by sensible forms that would serve as means of objectification and externalization. As Barbara Montero observes, while the objects of vision and hearing, i.e. the most popular senses involved in the arts, are beyond one's body, sense of proprioception relates directly to the bodily sensation, it does not represent any external objects, but the sensory itself (231). These characteristics of proprioception help to reframe the question of augmentation as mediation: in the case of proprioception, the medium of sensation is the very relational structure of the body itself, irrespective of the "exteroceptive" (tactile) or "interoceptive" (visceral) dimensions of sensibility. The body is understood, then, as the "body without image,” and its proprioceptive effect can then be described as "the sensibility proper to the muscles and ligaments" (Massumi 58). Proprioception in (Media) Art One of the most convincing ways of externalization and (re)presentation of the data of proprioception is through re-production of its structure and its artificial enhancement with the help of technology. This can be achieved in at least two ways: by setting up situations and environments that emphasize self-perspective and awareness of perception, and by presenting measurements of bio-data and inviting into dialogue with them. The first strategy may be connected to disorientation and shifted perspective that are created in immersive virtual environments that make the role of otherwise un-trackable, fluid sense of proprioception actually felt and cognized. These effects are closely related to the nuances of perception of space, for instance, to spatial illusion. Practice of spatial illusion in the arts traces its history as far back as Roman frescos, trompe l’oeil, as well as phantasmagorias, like magic lantern. Geometrically, the system of the 360º image is still the most effective in producing a sense of full immersion—either in spaces from panoramas, Stereopticon, Cinéorama to CAVE (Computer Augmented Virtual Environments), or in devices for an individual spectator’s usage, like a stereoscope, Sensorama and more recent Head Mounted Displays (HMD). All these devices provide a sense of hermetic enclosure and bodily engagement with its scenes (realistic or often fantastical). Their images are frameless and thus immeasurable (lack of the sense of proportion provokes feeling of disorientation), image apparatus and the image itself converge here into an almost inseparable total unity: field of vision is filled, and the medium becomes invisible (Grau 198-202; 248-255). Yet, the constructed image is even more frameless and more peculiarly ‘mental’ in environments created on the basis of objectless or "immaterial" media, like light or sound; or in installations prioritizing haptic sensation and in responsive architectures, i.e. environments that transform physically in reaction to their inhabitants. The examples may include works by Olafur Eliasson that are centered around the issues of conscious perception and employ various optical and other apparata (mirrors, curved surfaces, coloured glass, water systems) to shift the habitual perspective and make one conscious of the subtle changes in the environment depending on one's position in space (there have been instances of spectators in Eliasson's installations falling down after trying to lean against an apparent wall that turned out to be a mere optical construct.). Figure 1: Olafur Eliasson, Take Your Time, 2008. © Olafur Eliasson Studio. In his classic H2OExpo project for Delta Expo in 1997, the Dutch architect Lars Spuybroek experimented with the perception of instability. There is no horizontal surface in the pavilion; floors, composed of interconnected elliptical volumes, transform into walls and walls into ceilings, promoting a sense of fluidity and making people respond by falling, leaning, tilting and "experiencing the vector of one’s own weight, and becoming sensitized to the effects of gravity" (Schwartzman 63). Along the way, specially installed sensors detect the behaviour of the ‘walker’ and send signals to the system to contribute further to the agenda of imbalance and confusion by changing light, image projection, and sound.Figure 2: Lars Spuybroek, H2OExpo, 1994-1997. © NOX/ Lars Spuybroek. Philip Beesley’s Hylozoic Ground (2010) is also a responsive environment filled by a dense organic network of delicate illuminated acrylic tendrils that can extend out to touch the visitor, triggering an uncanny mixture of delight and discomfort. The motif of pulsating movement was inspired by fluctuations in coral reefs and recreated via the system of precise sensors and microprocessors. This reference to an unfamiliar and unpredictable natural environment, which often makes us feel cautious and ultra-attentive, is a reminder of our innate ability of proprioception (a deeply ingrained survival instinct) and its potential for a more nuanced, intimate, emphatic and bodily rooted communication. Figure 3: Philip Beesley, Hylozoic Ground, 2010. © Philip Beesley Architect Inc. Works of this kind stimulate awareness of both the environment and one's own response to it. Inviting participants to actively engage with the space, they evoke reactions of self-reflexivity, i.e. the self becomes the object of its own exploration and (potentially) transformation. Another strategy of revealing the processes of the "body without image" is through representing various kinds of bio-data, bodily affective reactions to certain stimuli. Biosignal monitoring technologies most often employed include EEG (Electroencephalogram), EMG (Electromyogram), GSR (Galvanic Skin Response), ECG (Electrocardiogram), HRV (Heart Rate Variability) and others. Previously available only in medical settings and research labs, many types of sensors (bio and environmental) now become increasingly available (bio-enabled products ranging from cardio watches—an instance of the "quantified self" trend—to brain wave-controlled video games). As the representatives of the DIY makers community put it: "By monitoring some phenomena (biofeedback) you can train yourself to modulate them, possibly improving your emotional state. Biosensing lets you interact more naturally with digital systems, creating cyborg-like extensions of your body that overcome disabilities or provide new abilities. You can also share your bio-signals, if you choose, to participate in new forms of communication" (Montgomery). What is it about these technologies besides understanding more accurately the unconscious and invisible signals? The critical question in relation to biofeedback data is about the adequacy of the transference of the initial signal, about the "new" brought by the medium, as well as the ontological status of the resulting representation. These data are reflections of something real, yet themselves have a different weight, also providing the ground for all sorts of simulative methods and creation of mixed realities. External representations, unlike internal, are often attributed a prosthetic nature that is treated as extensions of existing skills. Besides serving their direct purpose (for instance, maps give detailed picture of a distant location), these extensions provide certain psychological effects, such as disorientation, displacement, a shift in a sense of self and enhancement of the sense of presence. Artistic experiments with bio-data started in the 1960s most famously with employing the method of sonification. Among the pioneers were the composers Alvin Lucier, Richard Teitelbaum, David Rosenblum, Erkki Kurenemi, Pierre Henry, and others. Today's versions of biophysical performance may include not only acoustic, but also visual interpretation, as well as subtle narrative scenarios. An example can be Marco Donnarumma's Hypo Chrysos, a piece that translates visceral strain in sound and moving images. The title refers to the type of a punishing trial in one of the circles of hell in Dante's Divine Comedy: the eternal task of carrying heavy rocks is imitated by the artist-performer, while the audience can feel the bodily tension enhanced by sound and imagery. The state of the inner body is, thus, amplified, or augmented. The sense of proprioception experienced by the performer is translated into media perceivable by others. In this externalized form it can also be shared, i.e. released into a space of inter-subjectivity, where it receives other, collective qualities and is not perceived negatively, in terms of pressure. Figure 4: Marco Donnarumma, Hypo Chrysos, 2011. © Marco Donnarumma. Another example can be an installation Telephone Rewired by the artist-neuroscientist Sean Montgomery. Brainwave signals are measured from each visitor upon the entrance to the installation site. These individual data then become part of the collective archive of the brainwaves of all the participants. In the second room, the viewer is engulfed by pulsing light and sound that mimic endogenous brain waveforms of the previous viewers. As in the experience of Donnarumma's performance, this process encourages tuning in to the inner state of the other and finding resonating states in one's own body. It becomes a tool for self-exploration, self-knowledge, and self-control, as well as for developing skills of collective being, of shared body-mind topologies. Synchronization of mental and bodily states of multiple people serves here a broader and deeper goal of training collaborative and empathic abilities. An immersive experience, it triggers deep embodied neural circuits, reaching towards the most authentic reactions not mediated by conscious procedures and judgment. Figure 5: Sean Montgomery, Telephone Rewired, 2013. © Sean Montgomery. Conclusion The potential of biofeedback as a strategy for art projects is a rich area that artists have only begun to explore. The layer of the imaginary and the fictional (which makes art special and different from, for instance, science) can add a critical dimension to understanding the processes of augmentation and mediation. As the described examples demonstrate, art is an investigative journey that can be engaging, surprising, and awakening towards the more subtle and acute forms of thinking and feeling. This astuteness and percipience are especially needed as media and technologies penetrate and affect our very abilities to apprehend reality. We need new tools to make independent and individual judgment. The sense of proprioception establishes a productive challenge not only for science, but also for the arts, inviting a search for new mechanisms of representing the un-presentable and making shareable and communicable what is, by definition, individual, fluid, and ungraspable. Collaborative cognition emerging from the augmentation of proprioception that is enabled by biofeedback technologies holds distinct promise for exploration of not only subjective, but also inter-subjective states and aesthetic strategies of inducing them. References Beesley, Philip. Hylozoic Ground. 2010. Venice Biennale, Venice. Clark, Andy, and David J. Chalmers. “The Extended Mind.” Analysis 58.1 (1998):7-19. Donnarumma, Marco. Hypo Chrysos: Action Art for Vexed Body and Biophysical Media. 2011. Xth Sense Biosensing Wearable Technology. MADATAC Festival, Madrid. Eliasson, Olafur. Take Your Time, 2008. P.S.1 Contemporary Art Centre; Museum of Modern Art, New York. Grau, Oliver. Virtual Art: From Illusion to Immersion. Cambridge, Mass.: MIT Press, 2003. Massumi, Brian. Parables of the Virtual: Movement, Affect, Sensation. Durham: Duke University Press, 2002. Montero, Barbara. "Proprioception as an Aesthetic Sense." Journal of Aesthetics and Art Criticism 64.2 (2006): 231-242. Montgomery, Sean, and Ira Laefsky. "Biosensing: Track Your Body's Signals and Brain Waves and Use Them to Control Things." Make 26. 1 Oct. 2013 ‹http://www.make-digital.com/make/vol26?pg=104#pg104›. Sacks, Oliver. "The Disembodied Lady". The Man Who Mistook His Wife for a Hat and Other Clinical Tales. Philippines: Summit Books, 1985. Schwartzman, Madeline, See Yourself Sensing. Redefining Human Perception. London: Black Dog Publishing, 2011. Spuybroek, Lars. Waterland. 1994-1997. H2O Expo, Zeeland, NL.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Peter. "Community without Flesh." M/C Journal 2, no. 3 (May 1, 1999). http://dx.doi.org/10.5204/mcj.1750.

Full text
Abstract:
On Wednesday 21 April the Minister for Communications, Information Technology and the Arts introduced a piece of legislation into the Australian Senate to regulate the way Australians use the Internet. This legislation is presented within Australia's existing system of content regulation, a scheme that the Minister describes is not censorship, but merely regulation (Alston 55). Underlying Senator Alston's rhetoric about the protection of children from snuff film makers, paedophiles, drug pushers and other criminals, this long anticipated bill is aimed at reducing the amount of pornographic materials available via computer networks, a censorship regime in an age when regulation and classification are the words we prefer to use when society draws the line under material we want to see, but dare not allow ourselves access to. Regardless of any noble aspirations expressed by free-speech organisations such as Electronic Frontiers Australia relating to the defence of personal liberty and freedom of expression, this legislation is about porn. Under the Bill, Australia would proscribe our citizens from accessing: explicit depictions of sexual acts between consenting adults; mild non-violent fetishes; depictions of sexual violence, coercion or non-consent of any kind; depictions of child sexual abuse, bestiality, sexual acts accompanied by offensive fetishes, or exploitative incest fantasies; unduly detailed and/or relished acts of extreme violence or cruelty; explicit or unjustifiable depictions of sexual violence against non-consenting persons; and detailed instruction or encouragement in matters of crime or violence or the abuse of proscribed drugs. (OFLC) The Australian public, as a whole, favour the availability of sexually explicit materials in some form, with OFLC data indicating a relatively high degree of public support for X rated videos, the "high end" of the porn market (Paterson et al.). In Australia strict regulation of X rated materials in conventional media has resulted in a larger illegal market for these materials than the legalised sex industries of the ACT and Northern Territory (while 1.2 million X rated videos are legally sold out of the territories, 2 million are sold illegally in other jurisdictions, according to Patten). In Australia, censorship of media content has traditionally been based on the principles of the protection of society from moral harm and individual degradation, with specific emphasis on the protection of innocents from material they are not old enough for, or mentally capable of dealing with (Joint Select Committee on Video Material). Even when governments distanced themselves from direct personal censorship (such as Don Chipp's approach to the censorship of films and books in the late 1960s and early 1970s) and shifted the rationale behind censorship from prohibition to classification, the publicly stated aims of these decisions have been the support of existing community standards, rather than the imposition of strict legalistic moral values upon an unwilling society. In the debates surrounding censorship, and especially the level of censorship applied (rather than censorship as a whole), the question "what is the community we are talking about here?" has been a recurring theme. The standards that are applied to the regulation of media content, both online and off, are often the focus of community debate (a pluralistic community that obviously lacks "standards" by definition of the word). In essence the problem of maintaining a single set of moral and ethical values for the treatment of media content is a true political dilemma: a problem that lacks any form of solution acceptable to all participants. Since the introduction of the Internet as a "mass" medium (or more appropriately, a "popular" one), government indecision about how best to treat this new technology has precluded any form or content regulation other than the ad hoc use of existing non-technologically specific law to deal with areas of criminal or legally sanctionable intent (such as the use of copyright law, or the powers under the Crimes Act relating to the improper use of telecommunications services). However, indecision in political life is often associated with political weakness, and in the face of pressure to act decisively (motivated again by "community concern"), the Federal government has decided to extend the role of the Australian Broadcasting Authority to regulate and impose a censorship regime on Australian access of morally harmful materials. It is important to note the government's intention to censor access, rather than content of the Internet. While material hosted in Australia (ignoring, of course, the "cyberspace" definitions of non-territorial existence of information stored in networks) will be censored (removed from Australia computers), the government, lacking extraterritorial powers to compel the owners of machines located offshore, intends to introduce of some form of refused access list to materials located in other nations. What is interesting to consider in this context is the way that slight shifts of definitional paradigm alter the way this legislation can be considered. If information flows (upon which late capitalism is becoming more dependent) were to be located within the context of international law governing the flow of waterways, does the decision to prevent travel of morally dubious material through Australia's informational waterways impinge upon the riparian rights of other nations (the doctrine of fair usage without impeding flow; Godana 50)? Similarly, if we take Smith's extended definition of community within electronic transactional spaces (the maintenance of members' commitment to the group, monitoring and sanctioning behaviour and the production and distribution of resources), then the current Bill proposes the regulation of the activities of one community by another (granted, a larger community that incorporates the former). Seen in this context, this legislation is the direct intervention in an established social order by a larger and less homogeneous group. It may be trite to quote the Prime Minister's view of community in this context, where he states ...It is free individuals, strong communities and the rule of law which are the best defence against the intrusive power of the state and against those who think they know what is best for everyone else. (Howard 21) possibly because the paradigm in which this new legislation is situated does not classify those Australians online (who number up to 3 million) as a community in their own right. In a way the Internet users of Australia have never identified themselves as a community, nor been asked to act in a communitarian manner. While discussions about the value of community models when applied to the Internet are still divided, there are those who argue that their use of networked services can be seen in this light (Worthington). What this new legislation does, however, is preclude the establishment of public communities in order to meet the desires of government for some limits to be placed on Internet content. The Bill does allow for the development of "restricted access systems" that would allow pluralistic communities to develop and engage in a limited amount of self-regulation. These systems include privately accessible Intranets, or sites that restrict access through passwords or some other form of age verification technique. Thus, ignoring the minimum standards that will be required for these communities to qualify for some measure of self-regulatory freedom, what is unspoken here is that specific subsections of the Internet population may exist, provided they keep well away from the public gaze. A ghetto without physical walls. Under the Bill, a co-regulatory approach is endorsed by the government, favouring the establishment of industry codes of practice by ISPs and (or) the establishment of a single code of practice by the content hosting industry (content developers are relegated to yet undetermined complementary state legislation). However, this section of the Bill, in mandating a range of minimum requirements for these codes of practice, and denying plurality to the content providers, places an administrative imperative above any communitarian spirit. That is, that the Internet should have no more than one community, it should be an entity bound by a single guiding set of principles and be therefore easier to administer by Australian censors. This administrative imperative re-encapsulates the dilemma faced by governments dealing with the Internet: that at heart, the broadcast and print press paradigms of existing censorship regimes face massive administrative problems when presented with a communications technology that allows for wholesale publication of materials by individuals. Whereas the limited numbers of broadcasters and publishers have allowed the development of Australia's system of classification of materials (on a sliding scale from G to RC classifications or the equivalent print press version), the new legislation introduced into the Senate uses the classification scheme simply as a censorship mechanism: Internet content is either "ok" or "not ok". From a public administration perspective, this allows government to drastically reduce the amount of work required by regulators and eases the burden of compliance costs by ISPs, by directing clear and unambiguous statements about the acceptability of existing materials placed online. However, as we have seen in other areas of social policy (such as the rationalisation of Social Security services or Health), administrative expedience is often antipathetic to small communities that have special needs, or cultural sensitivities outside of mainstream society. While it is not appropriate to argue that public administration creates negative social impacts through expedience, what can be presented is that, where expedience is a core aim of legislation, poor administration may result. For many Australian purveyors of pornography, my comments will be entirely unhelpful as they endeavour to find effective ways to spoof offshore hosts or bone up (no pun intended) on tunnelling techniques. Given the easy way in which material can be reconstituted and relocated on the Internet, it seems likely that some form of regulatory avoidance will occur by users determined not to have their content removed or blocked. For those regulators given the unenviable task of censoring Internet access it may be worthwhile quoting from Sexing the Cherry, in which Jeanette Winterson describes the town: whose inhabitants are so cunning that to escape the insistence of creditors they knock down their houses in a single night and rebuild them elsewhere. So the number of buildings in the city is always constant but they are never in the same place from one day to the next. (43) Thus, while Winterson saw this game as a "most fulfilling pastime", it is likely to present real administrative headaches to ABA regulators when attempting to enforce the Bill's anti-avoidance clauses. The Australian government, in adapting existing regulatory paradigms to the Internet, has overlooked the informal communities who live, work and play within the virtual world of cyberspace. In attempting to meet a perceived social need for regulation with political and administrative expedience, it has ignored the potentially cohesive role of government in developing self-regulating communities who need little government intervention to produce socially beneficial outcomes. In proscribing activity externally to the realm in which these communities reside, what we may see is a new type of community, one whose desire for a feast of flesh leads them to evade the activities of regulators who operate in the "meat" world. What this may show us is that in a virtual environment, the regulators' net is no match for a world wide web. References Alston, Richard. "Regulation is Not Censorship." The Australian 13 April 1999: 55. Paterson, K., et. al. Classification Issues: Film, Video and Television. Sydney: The Office of Film and Literature Classification, 1993. Patten, F. Personal interview. 9 Feb. 1999. Godana, B.A. Africa's Shared Water Resources: Legal and Institutional Aspects of the Nile, Niger and Senegal River Systems. London: Frances Pinter, 1985. Howard, John. The Australia I Believe In: The Values, Directions and Policy Priorities of a Coalition Government Outlined in 1995. Canberra: Liberal Party, 1995. Joint Select Committee On Video Material. Report of the Joint Select Committee On Video Material. Canberra: APGS, 1988. Office of Film and Literature Classification. Cinema & Video Ratings Guide. 1999. 1 May 1999 <http://www.oflc.gov.au/classinfo.php>. Smith, Marc A. "Voices from the WELL: The Logic of the Virtual Commons." 1998. 2 Mar. 1999 <http://www.sscnet.ucla.edu/soc/csoc/papers/voices/Voices.htm>. Winterson, Jeanette. Sexing the Cherry. New York: Vintage Books. 1991. Worthington, T. Testimony before the Senate Select Committee on Information Technologies. Unpublished, 1999. Citation reference for this article MLA style: Peter Chen. "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/bill.php>. Chicago style: Peter Chen, "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]). APA style: Author. (1999) Community without flesh: first thoughts on the new broadcasting services amendment (online services) bill 1999. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Naomi. "Between, Behind, and Out of Sight." M/C Journal 24, no. 2 (April 26, 2021). http://dx.doi.org/10.5204/mcj.2764.

Full text
Abstract:
Introduction I am on the phone with a journalist discussing my research into anti-vaccination. As the conversation winds up, they ask a question I have come to expect: "how big do you think this is?" My answer is usually some version of the following: that we have no way of knowing. I and my fellow researchers can only see the information that is public or in the sunlight. How anti-vaccination information spreads through private networks is dark to us. It is private and necessarily so. This means that we cannot track how these conversations spread in the private or parochial spaces of Facebook, nor can we consider how they might extend into other modes of mediated communication. Modern communication is a complex and multiplatform accomplishment. Consider this: I am texting with my friend, I send her a selfie, in the same moment I hear a notification, she has DMed me a relevant Instagram post via that app. I move to Instagram and share another post in response; we continue our text message conversation there. Later in the day, I message her on Facebook Messenger while participating in a mutual WhatsApp group chat. The next day we Skype, and while we talk, we send links back and forth, which in hindsight are as clear as hieroglyphics before the Rosetta stone. I comment on her Twitter post, and we publicly converse back and forth briefly while other people like our posts. None of these instances are discrete conversational events, even though they occur on different platforms. They are iterations on the same themes, and the archival properties of social media and private messaging apps mean that neither of you forgets where you left off. The conversation slides not only between platforms and contexts but in and out of visibility. Digitally mediated conversation hums in the background of daily life (boring meetings, long commutes and bad dates) and expands our understanding of the temporal and sequential limits of conversation. In this article, I will explore digitally-mediated cross-platform conversation as a problem in two parts, and how we can understand it as part of the 'dark social'. Specifically, I want to draw attention to how 'dark' online spaces are part of our everyday communicative practices and are not necessarily synonymous with the illicit, illegal, or deviant. I argue that the private conversations we have online are also part of the dark social web, insofar as they are hidden from the public eye. When I think of dark social spaces, I think of what lies beneath the surface of murky waters, what hides behind in backstage areas, and the moments between platforms. In contrast, 'light' (or public) social spaces are often perceived as siloed. The boundaries between these platforms are artificially clean and do not appear to leak into other spaces. This article explores the dark and shadowed spaces of online conversation and considers how we might approach them as researchers. Conversations occur in the backchannels of social media platforms, in private messaging functions that are necessarily invisible to the researcher's gaze. These spaces are distinct from the social media activity analysed by Marwick and boyd. Their research examining teens' privacy strategies on social media highlights how social media posts that multiple audiences may view often hold encoded meanings. Social media posts are a distinct and separate category of activity from meditated conversations that occur one to one, or in smaller group chat settings. Second is the disjunction between social media platforms. Users spread their activity across any number of social media platforms, according to social and personal logics. However, these movements are difficult to capture; it is difficult to see in the dark. Platforms are not hermeneutically sealed off from each other, or the broader web. I argue that understanding how conversation moves between platforms and in the backstage spaces of platforms are two parts of the same dark social puzzle. Conversation Online Digital media have changed how we maintain our social connections across time and space. Social media environments offer new possibilities for communication and engagement as well as new avenues for control. Calls and texts can be ignored, and our phones are often used as shields. Busying ourselves with them can help us avoid unwanted face-to-face conversations. There are a number of critiques regarding the pressure of always-on contact, and a growing body of research that examines how users negotiate these demands. By examining group messaging, Mannell highlights how the boundaries of these chats are porous and flexible and mark a distinct communicative break from previous forms of mobile messaging, which were largely didactic. The advent of group chats has also led to an increasing complication of conversation boundaries. One group chat may have several strands of conversation sporadically re-engaged with over time. Manell's examination of group chats empirically illustrates the complexity of digitally-mediated conversations as they move across private, parochial, and public spaces in a way that is not necessarily temporally linear. Further research highlights the networked nature of digitally mediated interpersonal communication and how conversations sprawl across multiple platforms (Burchell). Couldry (16, 17) describes this complex web as the media manifold. This concept encompasses the networked platforms that comprise it and refers to its embeddedness in daily life. As we no longer “log on” to the internet to send and receive email, the manifold is both everywhere and nowhere; so too are our conversations. Gershon has described the ways we navigate the communicative affordances of these platforms as “media ideologies" which are the "beliefs, attitudes, and strategies about the media they [individuals] use" (391). Media ideologies also contain implicit assumptions about which platforms are best for delivering which kinds of messages. Similarly, Burchell argues that the relational ordering of available media technologies is "highly idiosyncratic" (418). Burchell contends that this idiosyncratic ordering is interdependent and relational, and that norms about what to do when are both assumed by individuals and learnt in their engagement with others (418). The influence of others allows us to adjust our practices, or as Burchell argues, "to attune and regulate one's own conduct … and facilitate engagement despite the diverse media practices of others" (418). In this model, individuals are constantly learning and renegotiating norms of conversation on a case by case, platform by platform basis. However, I argue that it is more illuminating to consider how we have collectively developed an implicit and unconscious set of norms and signals that govern our (collective) conduct, as digitally mediated conversation has become embedded in our daily lives. This is not to say that everyone has the same conversational skill level, but rather that we have developed a common toolbox for understanding the ebb and flow of digitally mediated conversations across platforms. However, these norms are implicit, and we only have a partial understanding of how they are socially achieved in digitally-mediated conversation. What Lies Beneath Most of what we do online is assumed not to be publicly visible. While companies like Facebook trace us across the web and peer into every nook and cranny of our private use patterns, researchers have remained focussed on what lies above in the light, not below, in the dark. This has meant an overwhelming focus on single platform studies that rely on the massification of data as a default measure for analysing sentiment and behaviour online. Sociologically, we know that what occurs in dark social spaces, or backstage, is just as important to social life as what happens in front of an audience (Goffman). Goffman's research uses the metaphor of the theatre to analyse how social life is accomplished as a performance. He highlights that (darkened) backstage spaces are those where we can relax, drop our front, and reveal parts of our (social) self that may be unpalatable to a broader audience. Simply, the public data accessible to researchers on social media are “trace data”, or “trace conversation”, from the places where conversations briefly leave (public) footprints and can be tracked and traced before vanishing again. Alternatively, we can visualise internet researchers as swabbing door handles for trace evidence, attempting to assemble a narrative out of a left-behind thread or a stray fingerprint. These public utterances, often scraped through API access, are only small parts of the richness of online conversation. Conversations weave across multiple platforms, yet single platforms are focussed on, bracketing off their leaky edges in favour of certainty. We know the social rules of platforms, but less about the rules between platforms, and in their darker spaces. Conversations briefly emerge into the light, only to disappear again. Without understanding how conversation is achieved and how it expands and contracts and weaves in and out of the present, we are only ever guessing about the social dynamics of mediated conversation as they shift between light, dark, and shadow spaces. Small things can cast large shadows; something that looms large may be deceptively small. Online they could be sociality distorted by disinformation campaigns or swarms of social bots. Capturing the Unseen: An Ethnomethodological Approach Not all data are measurable, computable, and controllable. There is uncertainty beyond what computational logics can achieve. Nooks and crannies of sociality exist beyond the purview of computable data. This suggests that we can apply pre-digital social research methods to capture these “below the surface” conversations and understand their logics. Sociologists have long understood that conversation is a social accomplishment. In the 1960s, sociologist Harvey Sacks developed conversation analysis as an ethnomethodological technique that seeks to understand how social life is accomplished in day-to-day conversation and micro-interactions. Conversation analysis is a detailed and systematic account of how naturally-occurring talk is socially ordered, and has been applied across a number of social contexts, including news interviews, judicial settings, suicide prevention hotlines, therapy sessions, as well as regular phone conversations (Kitzinger and Frith). Conversation analysis focusses on fine-grained detail, all of the little patterns of speech that make up a conversation; for example, the pauses, interruptions, self-corrections, false starts, and over-speaking. Often these too are hidden features of conversation, understood implicitly, but hovering on the edges of our social knowledge. One of the most interesting uses of conversational analysis is to understand refusal, that is, how we say 'no' as a social action. This body of research turns common-sense social knowledge – that saying no is socially difficult – into a systemic schema of social action. For instance, acceptance is easy to achieve; saying yes typically happens quickly and without hesitation. Acceptances are not qualified; a straightforward 'yes' is sufficient (Kitzinger and Frith). However, refusals are much more socially complex. Refusal is usually accomplished by apologies, compliments, and other palliative strategies that seek to cushion the blow of refusals. They are delayed and indirect conversational routes, indicating their status as a dispreferred social action, necessitating their accompaniment by excuses or explanations (Kitzinger and Frith). Research by Kitzinger and Frith, examining how women refuse sexual advances, illustrates that we all have a stock of common-sense knowledge about how refusals are typically achieved, which persists across various social contexts, including in our intimate relationships. Conversation analysis shows us how conversation is achieved and how we understand each other. To date, conversation analysis techniques have been applied to spoken conversation but not yet extended into text-based mediated conversation. I argue that we could apply insights from conversation analysis to understand the rules that govern digitally mediated conversation, how conversation moves in the spaces between platforms, and the rules that govern its emergence into public visibility. What rules shape the success of mediated communication? How can we understand it as a social achievement? When conversation analysis walks into the dark room it can be like turning on the light. How can we apply conversation analysis, usually concerned with the hidden aspects of plainly visible talk, to conversation in dark social spaces, across platforms and in private back channels? There is evidence that the norms of refusal, as highlighted by conversation analysis, are persistent across platforms, including in people's private digitally-mediated conversations. One of the ways in which we can identify these norms in action is by examining technology resistance. Relational communication via mobile device is pervasive (Hall and Baym). The concentration of digitally-mediated communication into smartphones means that conversational norms are constantly renegotiated, alongside expectations of relationship maintenance in voluntary social relationships like friendship (Hall and Baym). Mannell also explains that technology resistance can include lying by text message when explaining non-availability. These small, habitual, and often automatic lies are categorised as “butler lies” and are a polite way of achieving refusal in digitally mediated conversations that are analogous to how refusal is accomplished in face-to-face conversation. Refusals, rejections, and, by extension, unavailability appear to be accompanied by the palliative actions that help us achieve refusal in face-to-face conversation. Mannell identifies strategies such as “feeling ill” to explain non-availability without hurting others' feelings. Insights from conversation analysis suggest that on balance, it is likely that all parties involved in both the furnishing and acceptance of a butler lie understand that these are polite fabrications, much like the refusals in verbal conversation. Because of their invisibility, it is easy to assume that conversations in the dark social are chaotic and disorganised. However, there are tantalising hints that the reverse is true. Instead of arguing that individuals construct conversational norms on a case by case, platform by platform basis, I suggest that we now have a stock of common-sense social knowledge that we also apply to cross-platform mediated communication. In the spaces where gaps in this knowledge exist, Szabla and Blommaert argue that actors use existing norms of interactions and can navigate a range of interaction events even in online environments where we would expect to see a degree of context collapse and interactional disorganisation. Techniques of Detection How do we see in the dark? Some nascent research suggests a way forward that will help us understand the rhythms of cross-platform mediated conversation. Apps have been used to track participants' messaging and calling activities (Birnholtz, Davison, and Li). This research found a number of patterns that signal a user's attention or inattention, including response times and linguistic clues. Similarly, not-for-profit newsroom The Markup built a Facebook inspector called the citizen browser, a "standalone desktop application that was distributed to a panel of more than 1000 paid participants" (Mattu et al.). The application works by being connected to a participant's Facebook account and periodically capturing data from their Facebook feeds. The data is automatically deidentified but is still linked to the demographic information that participants provide about themselves, such as gender, race, location, and age. Applications like these point to how researchers might reliably collect interaction data from Facebook to glimpse into the hidden networks and interactions that drive conversation. User-focussed data collection methods also help us, as researchers, to sever our reliance on API access. API-reliant research is dependent on the largesse of social media companies for continued access and encourages research on the macro at the micro's expense. After all, social media and other digital platforms are partly constituted by the social acts of their users. Without speech acts that constitute mediated conversation, liking, sharing GIFs, and links, as well as the gaps and silences, digital platforms cease to exist. Digital platforms are not just archives of “big data”, but rather they are collections of speech and records of how our common-sense knowledge about how to communicate has stretched and expanded beyond face-to-face contexts. A Problem of Bots Ethnomethodological approaches have been critiqued as focussing too much on the small details of conversation, on nit-picking small details, and thus, as unable to comment on macro social issues of oppression and inequality (Kitzinger and Frith 311). However, understanding digitally-mediated conversation through the lens of talk-as-human-interaction may help us untangle our most pressing social problems across digital platforms. Extensive research examines platforms such as Twitter for “inauthentic” behaviour, primarily identifying which accounts are bots. Bots accounts are programmed Twitter accounts (for example) that automatically tweet information on political or contentious issues, while mimicking genuine engagement. Bots can reply to direct messages too; they converse with us as they are programmed to act as “humanly” as possible. Despite this, there are patterns of behaviour and engagement that distinguish programmed bot accounts, and a number of platforms are dedicated to their detection. However, bots are becoming increasingly sophisticated and better able to mimic “real” human engagement online. But there is as yet no systematic framework regarding what “real” digitally mediated conversation looks like. An ethnomethodological approach to understanding this would better equip platforms to understand inauthentic activity. As Yang and colleagues succinctly state, "a supervised machine learning tool is only as good as the data used for its training … even the most advanced [bot detection] algorithms will fail with outdated training datasets" (8). On the flipside, organisations are using chat bots to deliver cognitive behavioural therapy and assist people in moments of psychological distress. But the bots do not feel human; they reply instantly to any message sent. Some require responses in the form of emojis. The basis of therapy is talk. Understanding more accurately how naturally-occurring talk functions in online spaces could create more sensitive and genuinely therapeutic tools. Conclusion It is easy to forget that social media have largely mainstreamed over the last decade; in this decade, crucial social norms about how we converse online have developed. These norms allow us to navigate our conversations, with intimate friends and strangers alike across platforms, both in and out of public view, in ways that are often temporally non-sequential. Dark social spaces are a matter of intense marketing interest. Advertising firm Disruptive Advertising identified the very spaces that are the focus of this article as “dark social”: messaging apps, direct messaging, and native mobile apps facilitate user activity that is "not as easily controlled nor tracked". Dark social traffic continues to grow, yet our understanding of why, how, and for whom trails behind. To make sense of our social world, which is increasingly indistinguishable from online activity, we need to examine the spaces between and behind platforms, and how they co-mingle. Where are the spaces where the affordances of multiple platforms and technologies scrape against each other in uncomfortable ways? How do users achieve intelligible conversation not just because of affordances, but despite them? Focussing on micro-sociological encounters and conversations may also help us understand what could build a healthy online ecosystem. How are consensus and agreement achieved online? What are the persistent speech acts (or text acts) that signal when consensus is achieved? To begin where I started, to understand the scope and power of anti-vaccination sentiment, we need to understand how it is shared and discussed in dark social spaces, in messaging applications, and other backchannel spaces. Taking an ethnomethodological approach to these conversational interactions could also help us determine how misinformation is refused, accepted, and negotiated in mediated conversation. Focussing on “dark conversation” will help us more richly understand our social world and add much needed insight into some of our pressing social problems. References Burchell, Kenzie. "Everyday Communication Management and Perceptions of Use: How Media Users Limit and Shape Their Social World." Convergence 23.4 (2017): 409–24. Couldry, Nick. Media, Society, World: Social Theory and Digital Media Practice. Polity, 2012. Goffman, Erving. The Presentation of Self in Everyday Life. Penguin, 1990. Gershon, Ilana. The Breakup 2.0: Disconnecting over New Media. Cornell University Press, 2010. Hall, Jeffrey A., and Nancy K. Baym. "Calling and Texting (Too Much): Mobile Maintenance Expectations, (Over)dependence, Entrapment, and Friendship Satisfaction." New Media & Society 14.2 (2012): 316–31. Hall, Margaret, et al. "Editorial of the Special Issue on Following User Pathways: Key Contributions and Future Directions in Cross-Platform Social Media Research." International Journal of Human–Computer Interaction 34.10 (2018): 895–912. Kitzinger, Celia, and Hannah Frith. "Just Say No? The Use of Conversation Analysis in Developing a Feminist Perspective on Sexual Refusal." Discourse & Society 10.3 (1999): 293–316. Ling, Rich. "Soft Coercion: Reciprocal Expectations of Availability in the Use of Mobile Communication." First Monday, 2016. Mannell, Kate. "A Typology of Mobile Messaging's Disconnective Affordances." Mobile Media & Communication 7.1 (2019): 76–93. ———. "Plural and Porous: Reconceptualising the Boundaries of Mobile Messaging Group Chats." Journal of Computer-Mediated Communication 25.4 (2020): 274–90. Marwick, Alice E., and danah boyd. "Networked Privacy: How Teenagers Negotiate Context in Social Media." New Media & Society 16.7 (2014): 1051–67. Mattu, Surya, Leon Yin, Angie Waller, and Jon Keegan. "How We Built a Facebook Inspector." The Markup 5 Jan. 2021. 9 Mar. 2021 <https://themarkup.org/citizen-browser/2021/01/05/how-we-built-a-facebook-inspector>. Sacks, Harvey. Lectures on Conversation: Volumes I and II. Ed. Gail Jefferson. Blackwell, 1995. Szabla, Malgorzata, and Jan Blommaert. "Does Context Really Collapse in Social Media Interaction?" Applied Linguistics Review 11.2 (2020): 251–79.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Co-existing schema versions"

1

Herrmann, Kai, Hannes Voigt, Thorsten Seyschab, and Wolfgang Lehner. "InVerDa - co-existing Schema Versions Made Foolproof." IEEE, 2016. https://tud.qucosa.de/id/qucosa%3A75285.

Full text
Abstract:
In modern software landscapes multiple applications usually share one database as their single point of truth. All these applications will evolve over time by their very nature. Often former versions need to stay available, so database developers find themselves maintaining co-existing schema version of multiple applications in multiple versions. This is highly error-prone and accounts for significant costs in software projects, as developers realize the translation of data accesses between schema versions with hand-written delta code. In this demo, we showcase INVERDA, a tool for integrated, robust, and easy to use database versioning. We rethink the way of specifying the evolution to new schema versions. Using the richer semantics of a descriptive database evolution language, we generate all required artifacts automatically and make database versioning foolproof.
APA, Harvard, Vancouver, ISO, and other styles
2

Herrmann, Kai, Hannes Voigt, Andreas Behrend, Jonas Rausch, and Wolfgang Lehner. "Living in Parallel Realities: Co-Existing Schema Versions with a Bidirectional Database Evolution Language." ACM, 2017. https://tud.qucosa.de/id/qucosa%3A75213.

Full text
Abstract:
We introduce end-to-end support of co-existing schema versions within one database. While it is state of the art to run multiple versions of a continuously developed application concurrently, it is hard to do the same for databases. In order to keep multiple co-existing schema versions alive|which are all accessing the same data set|developers usually employ handwritten delta code (e.g. views and triggers in SQL). This delta code is hard to write and hard to maintain: if a database administrator decides to adapt the physical table schema, all handwritten delta code needs to be adapted as well, which is expensive and error-prone in practice. In this paper, we present InVerDa: developers use the simple bidirectional database evolution language BiDEL, which carries enough information to generate all delta code automatically. Without additional e_ort, new schema versions become immediately accessible and data changes in any version are visible in all schema versions at the same time. InVerDa also allows for easily changing the physical table design without a_ecting the availability of co-existing schema versions. This greatly increases robustness (orders of magnitude less lines of code) and allows for signi_cant performance optimization. A main contribution is the formal evaluation that each schema version acts like a common full-edged database schema independently of the chosen physical table design.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Co-existing schema versions"

1

Herrmann, Kai, Hannes Voigt, Thorsten Seyschab, and Wolfgang Lehner. "InVerDa - co-existing schema versions made foolproof." In 2016 IEEE 32nd International Conference on Data Engineering (ICDE). IEEE, 2016. http://dx.doi.org/10.1109/icde.2016.7498345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography