Journal articles on the topic 'Electronic records Australia Management Computer programs'

To see the other types of publications on this topic, follow the link: Electronic records Australia Management Computer programs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 32 journal articles for your research on the topic 'Electronic records Australia Management Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Leslie, Heather. "Commentary: the patient's memory stick may complement electronic health records." Australian Health Review 29, no. 4 (2005): 401. http://dx.doi.org/10.1071/ah050401.

Full text
Abstract:
THE SITUATION DESCRIBED by Stevens1 in the foregoing article is similar to that navigated by thousands of individuals in hospitals around Australia each day. Stevens has been able to identify gaps in communication, processes and timely availability of pertinent information which potentially put her health at risk. There is little doubt that her call for ?legible and enduring record systems accessible by appropriate people? (page 400) would be supported by most of the general community. Health information management is hugely complex, with large numbers of concepts and high rates of clinical knowledge change. Electronic health records (EHRs) are definitely not simple concepts that are solved by storing information in a relational database for use in a single organisational silo, but require the capture of the full breadth of health information in a manner that can be easily stored, retrieved in varying contexts, and searched. Then there is the additional and unique requirement of sharing this same information with a range of health care providers with differing foci, requirements, technical tools and term-sets. When you add in some of the other more lateral requirements such as medico-legal accountability, pooling data for public health research, and privacy, consent and authorisation for sharing sensitive health information, it becomes increasingly evident that health data management has no real equivalent in other industries. In order for shareable electronic health records to become ubiquitous, there are numerous building blocks that need to be in place ? appropriate levels of funding, legislative changes, consensus on a range of standards, stakeholder engagement, implementation of massive change management programs and so on, as outlined by Grain.2 Australia?s solution is the HealthConnect program ? a joint Commonwealth and state government initiative ? which is gradually identifying the required pieces, and laying them out in a systematic way to solve the e-health system puzzle.
APA, Harvard, Vancouver, ISO, and other styles
2

Ammenwerth, E., and A. Hoerbst. "Quality and Certification of Electronic Health Records." Applied Clinical Informatics 01, no. 02 (2010): 149–64. http://dx.doi.org/10.4338/aci-2010-02-r-0009.

Full text
Abstract:
Summary Background: Numerous projects, initiatives, and programs are dedicated to the development of Electronic Health Records (EHR) worldwide. Increasingly more of these plans have recently been brought from a scientific environment to real life applications. In this context, quality is a crucial factor with regard to the acceptance and utility of Electronic Health Records. However, the dissemination of the existing quality approaches is often rather limited. Objectives: The present paper aims at the description and comparison of the current major quality certification approaches to EHRs. Methods: A literature analysis was carried out in order to identify the relevant publications with regard to EHR quality certification. PubMed, ACM Digital Library, IEEExplore, CiteSeer, and Google (Scholar) were used to collect relevant sources. The documents that were obtained were analyzed using techniques of qualitative content analysis. Results: The analysis discusses and compares the quality approaches of CCHIT, EuroRec, IHE, openEHR, and EN13606. These approaches differ with regard to their focus, support of service-oriented EHRs, process of (re-)certification and testing, number of systems certified and tested, supporting organizations, and regional relevance. Discussion: The analyzed approaches show differences with regard to their structure and processes. System vendors can exploit these approaches in order to improve and certify their information systems. Health care organizations can use these approaches to support selection processes or to assess the quality of their own information systems. Citation: Hoerbst A, Ammenwerth E. Quality and certification of electronic health records – An overview of current approaches from the US and Europe. Appl Clin Inf 2010; 1: 149–164 http://dx.doi.org/10.4338/ACI-2010-02-R-0009
APA, Harvard, Vancouver, ISO, and other styles
3

Kovlekov, Ivan, and M. Nesterovich. "ANALYSIS OF ELECTRONIC HR RECORDS MANAGEMENT IN STATE INSTITUTIONS (ON THE EXAMPLE OF THE STATE COMMITTEE ON PRICE POLICY OF THE REPUBLIC OF SAKHA (YAKUTIA))." Management of the Personnel and Intellectual Resources in Russia 9, no. 3 (July 23, 2020): 70–75. http://dx.doi.org/10.12737/2305-7807-2020-70-75.

Full text
Abstract:
In modern conditions, the traditional manual manner of working with documents in business is replaced gradually by the most rational methods of conducting digital office using a personal computer. Nowadays in the software market there is a wide enough choice of various programs for personnel records management at the company. However, the best properly choice often has difficulties connected with the juridical status of the real consumer of the software, the purpose of its activities, computer literacy of workers and the current experience of using a particular software package. The relevance of the problem is due to the fact that the state character of the work and the specific legal framework of the state institution differ significantly from the one of doing business by commercial (private) enterprises, on which are mainly focused the majority of the human resources software applications. The situation of the issue of electronic personnel records management in state institutions was analyzed on the pat-tern of experience with personnel documentation established in the State Committee on Price Policy of the Republic of Sakha (Yakutia). The main aspects of the paperless office work was studied, covering a variety of procedures and routine works with documents, as well as the software itself for dealing with documents of the personnel database of the institution. The article presents the results of studying indicators of electronic document administration and comparative analysis of options for professional personnel management programs. It was noted that at the moment the level of electronic personnel records management in the state institution does not yet fully meet the requirements of modern digital personnel documents management. It was concluded that the destination of further improving the activity of the state institution and raising work on personnel records administration and HR management to a higher level could be solved only if the digital document system for personnel records and accounting will be applied with an operatively updated package of legislative and regulatory framework.
APA, Harvard, Vancouver, ISO, and other styles
4

Heider, Ann-Kathrin, and Harald Mang. "Integration of Risk Scores and Integration Capability in Electronic Patient Records." Applied Clinical Informatics 13, no. 04 (August 2022): 828–35. http://dx.doi.org/10.1055/s-0042-1756367.

Full text
Abstract:
Abstract Background Digital availability of patient data is continuously improving with the increasing implementation of electronic patient records in physician practices. The emergence of digital health data defines new fields of application for data analytics applications, which in turn offer extensive options of using data. Common areas of data analytics applications include decision support, administration, and fraud detection. Risk scores play an important role in compiling algorithms that underlay tools for decision support. Objectives This study aims to identify the current state of risk score integration and integration capability in electronic patient records for cardiovascular disease and diabetes in German primary care practices. Methods We developed an evaluation framework to determine the current state of risk score integration and future integration options for four cardiovascular disease risk scores (arriba, Pooled Cohort Equations, QRISK3, and Systematic Coronary Risk Evaluation) and two diabetes risk scores (Finnish Diabetes Risk Score and German Diabetes Risk Score). We then used this framework to evaluate the integration of risk scores in common practice software solutions by examining the software and inquiring the respective software contact person. Results Our evaluation showed that the most widely integrated risk score is arriba, as recommended by German medical guidelines. Every software version in our sample provided either an interface to arriba or the option to implement one. Our assessment of integration capability revealed a more nuanced picture. Results on data availability were mixed. Each score contains at least one variable, which requires laboratory diagnostics. Our analysis of data standardization showed that only one score documented all variables in a standardized way. Conclusion Our assessment revealed that the current state of risk score integration in physician practice software is rather low. Integration capability currently faces some obstacles. Future research should develop a comprehensive framework that considers the reasonable integration of risk scores into practice workflows, disease prevention programs, and the awareness of physicians and patients.
APA, Harvard, Vancouver, ISO, and other styles
5

Davidson, Kamila, Helen Vidgen, Elizabeth Denney-Wilson, and Lynne Daniels. "How is children’s weight status assessed for early identification of overweight and obesity? – Narrative review of programs for weight status assessment." Journal of Child Health Care 22, no. 3 (February 13, 2018): 486–500. http://dx.doi.org/10.1177/1367493518759238.

Full text
Abstract:
Assessment of a child’s weight status is the first step in the management of childhood overweight and obesity. We reviewed routine assessment programs to inform early and routine identification of childhood overweight and obesity to address this global health issue. Twelve electronic databases were searched (Scopus, Web of Science, Wiley, ScienceDirect, PsycINFO, PsycARTICLES, PsycEXTRA, CINAHL, Primary Search, MEDLINE, ERIC, Academic Search Elite) for universal programs for weight status assessment of children aged 4–12 in Organization for Economic Co-operation and Development – countries, which included more than one assessment and parents receiving feedback. Of 1638 papers found via database searches, and 18 additional records identified through other sources, 26 were included. Reference to five countries’ programs for weight status assessment was found in the results: Australia, Sweden, the Netherlands, the United Kingdom and the United States. All of these programs were implemented in a school setting. Lack of services, stakeholder collaboration, parental awareness and engagement and government funding need to be improved for this health check to be undertaken as a part of an ongoing program. This review is about the implementation of similar programs. Early identification of risk for overweight and obesity allows families that require help to connect with available health services.
APA, Harvard, Vancouver, ISO, and other styles
6

McGreevey, John D., Colleen P. Mallozzi, Randa M. Perkins, Eric Shelov, and Richard Schreiber. "Reducing Alert Burden in Electronic Health Records: State of the Art Recommendations from Four Health Systems." Applied Clinical Informatics 11, no. 01 (January 2020): 001–12. http://dx.doi.org/10.1055/s-0039-3402715.

Full text
Abstract:
Abstract Background Electronic health record (EHR) alert fatigue, while widely recognized as a concern nationally, lacks a corresponding comprehensive mitigation plan. Objectives The goal of this manuscript is to provide practical guidance to clinical informaticists and other health care leaders who are considering creating a program to manage EHR alerts. Methods This manuscript synthesizes several approaches and recommendations for better alert management derived from four U.S. health care institutions that presented their experiences and recommendations at the American Medical Informatics Association 2019 Clinical Informatics Conference in Atlanta, Georgia, United States. The assembled health care institution leaders represent academic, pediatric, community, and specialized care domains. We describe governance and management, structural concepts and components, and human–computer interactions with alerts, and make recommendations regarding these domains based on our experience supplemented with literature review. This paper focuses on alerts that impact bedside clinicians. Results The manuscript addresses the range of considerations relevant to alert management including a summary of the background literature about alerts, alert governance, alert metrics, starting an alert management program, approaches to evaluating alerts prior to deployment, and optimization of existing alerts. The manuscript includes examples of alert optimization successes at two of the represented institutions. In addition, we review limitations on the ability to evaluate alerts in the current state and identify opportunities for further scholarship. Conclusion Ultimately, alert management programs must strive to meet common goals of improving patient care, while at the same time decreasing the alert burden on clinicians. In so doing, organizations have an opportunity to promote the wellness of patients, clinicians, and EHRs themselves.
APA, Harvard, Vancouver, ISO, and other styles
7

van der Lei, J. "Closing the Loop between Clinical Practice, Research, and Education: The Potential of Electronic Patient Records." Methods of Information in Medicine 41, no. 01 (2002): 51–54. http://dx.doi.org/10.1055/s-0038-1634313.

Full text
Abstract:
Summary Objective: To discuss the possible contribution of electronic patient records in closing the loop among clinical practice, research and education. Results and conclusions: Applying Information and Communication Technology (ICT) to a given medical domain is not merely adding a new technique. When introduced into an environment, ICT will initially often emulate or resemble the already existing processes. When workers and researchers in that domain begin to appreciate the potential of ICT, this initial stage is followed by more fundamental changes in that domain that take advantage of the potential of ICT. To understand the scope of the potential changes enabled by electronic records, three principle changes need to be understood. First, data recorded in computer memories can be readily retrieved and re-used for a variety of purposes. Second, once data are available in computer memories, the data can be transported easily. Third, as physicians (and patients) are using computers to record medical data, the same electronic record can be used to introduce other computer programs that interact with the user. New usage of data, however, generates additional requirements. Thus the experience in developing decision support systems and analyzing observational databases feeds back into the requirements for electronic medical records.Each patient-physician encounter, each investigation, each laboratory test, and each treatment in medical practice constitutes, in principle, an experiment. Ideally, we learn from each experiment. Electronic medical records will facilitate research that relies on data recorded in routine medical practice. The potential and challenge, however, of Medical Informatics lies in its ability to close the loop among clinical practice, research, and education.
APA, Harvard, Vancouver, ISO, and other styles
8

Leo, Fabian, Miriam Songa Stegemann, and Florian Maurer. "Antibiotic Stewardship bei ambulant erworbener Pneumonie." DMW - Deutsche Medizinische Wochenschrift 145, no. 06 (March 2020): 383–92. http://dx.doi.org/10.1055/a-0993-1164.

Full text
Abstract:
AbstractAntibiotic stewardship (ABS) denotes structured and continuous measures to improve the quality of prescribing anti-infectives. The aim is to achieve optimal treatment results and to minimize undesirable effects, especially the emergence of antibiotic resistance. This review summarizes the most important ABS principles based on recently published studies with implications for the management of community-acquired pneumonia. Local guidelines, education and training and “prospective audit and feedback” are established strategies to improve the management of patients with community-acquired pneumonia. However, the implementation of ABS programs requires trained personnel and may be impeded by limited structural and time resources. Hence, electronic health records and computer-based interventions are useful support for ABS programs and offer potential to facilitate ABS in inpatient and outpatient care. PCR-based rapid diagnostic tests, PCT-guided algorithms and penicillin allergy testing are suitable procedures to supplement ABS programs.
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Jay S., Hoa Vo, An Nguyen, Bari Dzomba, and Huanmei Wu. "A Data-Driven Assessment of the U.S. Health Informatics Programs and Job Market." Applied Clinical Informatics 13, no. 02 (March 2022): 327–38. http://dx.doi.org/10.1055/s-0042-1743242.

Full text
Abstract:
Abstract Background Health Informatics (HI) is an interdisciplinary field, integrating health sciences, computer science, information science, and cognitive science to assist health information management, analysis, and utilization. As the HI field is broad, it is impossible that a student will be able to master all the diverse HI topics. Thus, it is important to train the HI students based on the offering of the various HI programs and needs of the current market. This project will study the U.S. HI programs, training materials, HI job market, the skillset required by the employers, competencies taught in HI programs, and comparisons between them. Methods We collected the training information for the 238 U.S. universities that offered MS, PhD, or postbaccalaureate certificate programs in HI or related professions. Next, we explored the HI job market by randomly checking 200 jobs and their required skillsets and domain knowledge. Then, we compared these skillsets with those offered by the HI programs and identified the gaps and overlaps for program enhancements. Results Among the 238 U.S. universities, 94 universities offer HI programs: 92 universities with MS (Master of Science), 43 with doctoral, 42 with both MS and doctoral, and 54 with certificate programs. The most offered HI courses are related to practicum, data analytics, research, and ethics. For the HI job postings, the three most technical skillsets required in HI job posting are data analysis, database management, and knowledge of electronic health records. However, only 58% of HI programs offer courses in database management and analytics. Compared with American Medical Informatics Association's recommended 10 fundamental domains, the HI curriculum generally lacks training in socio-technical systems, social-behavioral aspects of health, and interprofessional collaborative practice. Conclusion There are gaps between the industry expectations of HI and the training received in HI programs. Advance level technical courses are needed in HI programs to meet industry expectations.
APA, Harvard, Vancouver, ISO, and other styles
10

van der Does, E., A. J. Man in ’t Veld, M. A. Musen, J. H. van Bemmel, and J. van der Lei. "Response of General Practitioners to Computer-Generated Critiques of Hypertension Therapy." Methods of Information in Medicine 32, no. 02 (1993): 146–53. http://dx.doi.org/10.1055/s-0038-1634911.

Full text
Abstract:
Abstract:We recently have shown that a computer system, known as HyperCritic, can successfully audit general practitioners’ treatment of hypertension by analyzing computer-based patient records. HyperCritic reviews the electronic medical records and offers unsolicited advice. To determine which unsolicited advice might be perceived as inappropriate, builders of programs such as HyperCritic need insight into providers’ responses to computer-generated critique of their patient care. Twenty medical charts, describing in total 243 visits of patients with hypertension, were audited by 8 human reviewers and by the critiquing-system HyperCritic. A panel of 14 general practitioners subsequently judged the relevance of those critiques on a five-point scale ranging from relevant critique to erroneous or harmful critique. The panel judged reviewers’ comments to be either relevant or somewhat relevant in 61 to 68% of cases, and either erroneous or possibly erroneous in 15 to 18%; the panel judged HyperCritic’s comments to be either relevant or somewhat relevant in 65% of cases, and either erroneous or possibly erroneous in 16%. Comparison of individual members of the panel showed large differences; for example, the portion of HyperCritic’s comments judged relevant ranged from 0 to 82%. We conclude that, from the perspective of general practitioners, critiques generated by the critiquing system HyperCritic are perceived equally beneficial as critiques generated by human reviewers. Different general practitioners, however, judge the critiques differently. Before auditing systems based on computer-based patient records that are acceptable to practitioners can be introduced, additional studies are needed to evaluate the reasons a physician may have for judging critiques to be irrelevant, and to evaluate the effect of critiques on physician behavior.
APA, Harvard, Vancouver, ISO, and other styles
11

Lynch, Elizabeth, Kate Laver, Tamina Levy, and Timothy Schultz. "‘The way that we are collecting and using data has evolved’ evaluating the Australian National Stroke Audit programme to inform strategic direction." BMJ Open Quality 12, no. 1 (January 2023): e002136. http://dx.doi.org/10.1136/bmjoq-2022-002136.

Full text
Abstract:
BackgroundThe National Stroke Audit has been used to audit and provide feedback to health professionals and stroke care services in Australia since 2007. The Australian Stroke Clinical Registry was piloted in 2009 and numbers of hospitals participating in the registry are increasing. Considering the changing data landscape in Australia, we designed this study to evaluate the stroke audit and to inform strategic direction.MethodsWe conducted a rapid review of published literature to map features of successful data programmes, followed by a mixed-methods study, comprising national surveys and interviews with clinicians and administrators about the stroke audit. We analysed quantitative data descriptively and analysed open-ended survey responses and interview data using qualitative content analysis. We integrated data from the two sources.ResultsWe identified 47 Australian data programs, successful programs were usually funded by government sources or professional associations and typically provided twice yearly or yearly reports.106 survey participants, 14 clinician and 5 health administrator interview participants were included in the evaluation. The Stroke Audit was consistently perceived as useful for benchmarking, but there were mixed views about its value for local quality improvement. Time to enter data was the most frequently reported barrier to participation (88% of survey participants), due to the large number of datapoints and features of the audit software.Opportunities to improve the Stroke Audit included refining Audit questions, developing ways to automatically export data from electronic medical records and capturing accurate data for patients who transferred between hospitals.ConclusionWhile the Stroke Audit was not perceived by all users to be beneficial for traditional quality improvement purposes, the ability to benchmark national stroke services and use these data in advocacy activities was a consistently reported benefit. Modifications were suggested to improve usability and usefulness for participating sites.
APA, Harvard, Vancouver, ISO, and other styles
12

Kemper, C. A., N. M. Lane, R. W. Carlson, M. A. Musen, and S. W. Tu. "A Methodology for Determining Patients’ Eligibility for Clinical Trials." Methods of Information in Medicine 32, no. 04 (1993): 317–25. http://dx.doi.org/10.1055/s-0038-1634933.

Full text
Abstract:
AbstractThe task of determining patients’ eligibility for clinical trials is knowledge and data intensive. In this paper, we present a model for the task of eligibility determination, and describe how a computer system can assist clinical researchers in performing that task. Qualitative and probabilistic approaches to computing and summarizing the eligibility status of potentially eligible patients are described. The two approaches are compared, and a synthesis that draws on the strengths of each approach is proposed. The result of applying these techniques to a database of HIV-positive patient cases suggests that computer programs such as the one described can increase the accrual rate of eligible patients into clinical trials. These methods may also be applied to the task of determining from electronic patient records whether practice guidelines apply in particular clinical situations.
APA, Harvard, Vancouver, ISO, and other styles
13

Barnett, Stephen, Joan Henderson, Adam Hodgkins, Christopher Harrison, Abhijeet Ghosh, Bridget Dijkmans-Hadley, Helena Britt, and Andrew Bonney. "A valuable approach to the use of electronic medical data in primary care research: Panning for gold." Health Information Management Journal 46, no. 2 (October 12, 2016): 51–57. http://dx.doi.org/10.1177/1833358316669888.

Full text
Abstract:
Background: Electronic medical data (EMD) from electronic health records of general practice computer systems have enormous research potential, yet many variables are unreliable. Objective: The aim of this study was to compare selected data variables from general practice EMD with a reliable, representative national dataset (Bettering the Evaluation and Care of Health (BEACH)) in order to validate their use for primary care research. Method: EMD variables were compared with encounter data from the nationally representative BEACH program using χ2 tests and robust 95% confidence intervals to test their validity (measure what they reportedly measure). The variables focused on for this study were patient age, sex, smoking status and medications prescribed at the visit. Results: The EMD sample from six general practices in the Illawarra region of New South Wales, Australia, yielded data on 196,515 patient encounters. Details of 90,553 encounters were recorded in the 2013 BEACH dataset from 924 general practitioners. No significant differences in patient age ( p = 0.36) or sex ( p = 0.39) were found. EMD had a lower rate of current smokers and higher average scripts per visit, but similar prescribing distribution patterns. Conclusion: Validating EMD variables offers avenues for improving primary care delivery and measuring outcomes of care to inform clinical practice and health policy.
APA, Harvard, Vancouver, ISO, and other styles
14

Kannry, Joseph, Jeff Smith, Vishnu Mohan, Bruce Levy, John Finnell, and Christoph U. Lehmann. "Policy Statement on Clinical Informatics Fellowships and the Future of Informatics-Driven Medicine." Applied Clinical Informatics 11, no. 05 (October 2020): 710–13. http://dx.doi.org/10.1055/s-0040-1717117.

Full text
Abstract:
AbstractBoard certified clinical informaticians provide expertise in leveraging health IT (HIT) and health data for patient care and quality improvement. Clinical Informatics experts possess the requisite skills and competencies to make systems-level improvements in care delivery using HIT, workflow and data analytics, knowledge acquisition, clinical decision support, data visualization, and related informatics tools. However, these physicians lack structured and sustained funding because they have no billing codes. The sustainability and growth of this new and promising medical subspecialty is threatened by outdated and inconsistent funding models that fail to support the education and professional growth of clinical informaticians. The Clinical Informatics Program Directors' Community is calling upon the Centers for Medicare and Medicaid Services to consider novel funding structures and programs through its Innovation Center for Clinical Informatics Fellowship training. Only through structural and sustained funding for Clinical Informatics fellows will be able to fully develop the potential of electronic health records to improve the quality, safety, and cost of clinical care.
APA, Harvard, Vancouver, ISO, and other styles
15

Allen, B. A., P. D. Clayton, and J. J. Cimino. "Medical Informatics Training at Columbia University and the Columbia-Presbyterian Medical Center." Yearbook of Medical Informatics 04, no. 01 (August 1995): 125–29. http://dx.doi.org/10.1055/s-0038-1638029.

Full text
Abstract:
Abstract:The Department of Medical Informatics at Columbia University College of Physicians and Surgeons consists of a faculty of 17 full-and part-time faculty. The Department faculty collaborate with the Department of Computer Science and several clinical departments of the medical center. We offer courses in medical informatics, formal degrees (M.A., M.Phil. and Ph.D.) and a postdoctoral training program. In addition to academic offerings, the close affiliation with the Columbia-Presbyterian Medical Center and the primary responsibilities for clinical information systems offers trainees unique opportunities to work with and develop real-world applications. Faculty research programs include work on the Integrated Advanced Information Management System (IAIMS), Unified Medical Language System (UMLS), High-Perfor-mance Computing and Communications (HPCC), Electronic Medical Records, automated decision support and technology transfer through the Center for Advanced Technology.
APA, Harvard, Vancouver, ISO, and other styles
16

Chruściel-Nogalska, Małgorzata, Tomasz Smektała, Marcin Tutak, Katarzyna Sporniak-Tutak, and Raphael Olszewski. "OPEN-SOURCE SOFTWARE IN DENTISTRY: A SYSTEMATIC REVIEW." International Journal of Technology Assessment in Health Care 33, no. 4 (2017): 487–93. http://dx.doi.org/10.1017/s0266462317000708.

Full text
Abstract:
Objectives:Technological development and the need for electronic health records management resulted in the need for a computer with dedicated, commercial software in daily dental practice. The alternative for commercial software may be open-source solutions. Therefore, this study reviewed the current literature on the availability and use of open-source software (OSS) in dentistry.Methods:A comprehensive database search was performed on February 1, 2017. Only articles published in peer-reviewed journals with a focus on the use or description of OSS were retrieved. The level of evidence, according to Oxford EBM Centre Levels of Evidence Scale was classified for all studies. Experimental studies underwent additional quality reporting assessment.Results:The screening and evaluation process resulted in twenty-one studies from 1,940 articles found, with 10 of them being experimental studies. None of the articles provided level 1 evidence, and only one study was considered high quality following quality assessment.Twenty-six different OSS programs were described in the included studies of which ten were used for image visualization, five were used for healthcare records management, four were used for educations processes, one was used for remote consultation and simulation, and six were used for general purposes.Conclusions:Our analysis revealed that the dental literature on OSS consists of scarce, incomplete, and methodologically low quality information.
APA, Harvard, Vancouver, ISO, and other styles
17

Hui, Ka Ho Matthew, Hugh Simon Lam, Cheuk Hin Twinny Chow, Yuen Shun Janice Li, Pok Him Tom Leung, Long Yin Brian Chan, Chui Ping Lee, Celeste Lom Ying Ewig, Yin Ting Cheung, and Tai Ning Teddy Lam. "Using Electronic Health Records for Personalized Dosing of Intravenous Vancomycin in Critically Ill Neonates: Model and Web-Based Interface Development Study." JMIR Medical Informatics 10, no. 1 (January 31, 2022): e29458. http://dx.doi.org/10.2196/29458.

Full text
Abstract:
Background Intravenous (IV) vancomycin is used in the treatment of severe infection in neonates. However, its efficacy is compromised by elevated risks of acute kidney injury. The risk is even higher among neonates admitted to the neonatal intensive care unit (NICU), in whom the pharmacokinetics of vancomycin vary widely. Therapeutic drug monitoring is an integral part of vancomycin treatment to balance efficacy against toxicity. It involves individual dose adjustments based on the observed serum vancomycin concentration (VCs). However, the existing trough-based approach shows poor evidence for clinical benefits. The updated clinical practice guideline recommends population pharmacokinetic (popPK) model–based approaches, targeting area under curve, preferably through the Bayesian approach. Since Bayesian methods cannot be performed manually and require specialized computer programs, there is a need to provide clinicians with a user-friendly interface to facilitate accurate personalized dosing recommendations for vancomycin in critically ill neonates. Objective We used medical data from electronic health records (EHRs) to develop a popPK model and subsequently build a web-based interface to perform model-based individual dose optimization of IV vancomycin for NICU patients in local medical institutions. Methods Medical data of subjects prescribed IV vancomycin in the NICUs of Prince of Wales Hospital and Queen Elizabeth Hospital in Hong Kong were extracted from EHRs, namely the Clinical Information System, In-Patient Medication Order Entry, and electronic Patient Record. Patient demographics, such as body weight and postmenstrual age (PMA), serum creatinine (SCr), vancomycin administration records, and VCs were collected. The popPK model employed a 2-compartment infusion model. Various covariate models were tested against body weight, PMA, and SCr, and were evaluated for the best goodness of fit. A previously published web-based dosing interface was adapted to develop the interface in this study. Results The final data set included EHR data extracted from 207 subjects, with a total of 689 VCs measurements. The final model chosen explained 82% of the variability in vancomycin clearance. All parameter estimates were within the bootstrapping CIs. Predictive plots, residual plots, and visual predictive checks demonstrated good model predictability. Model approximations showed that the model-based Bayesian approach consistently promoted a probability of target attainment (PTA) above 75% for all subjects, while only half of the subjects could achieve a PTA over 50% with the trough-based approach. The dosing interface was developed with the capability to optimize individual doses with the model-based empirical or Bayesian approach. Conclusions Using EHRs, a satisfactory popPK model was verified and adopted to develop a web-based individual dose optimization interface. The interface is expected to improve treatment outcomes of IV vancomycin for severe infections among critically ill neonates. This study provides the foundation for a cohort study to demonstrate the utility of the new approach compared with previous dosing methods.
APA, Harvard, Vancouver, ISO, and other styles
18

Bourla, Ariel B., and Neal J. Meropol. "Bridging the divide between clinical research and clinical care in oncology: An integrated real-world evidence generation platform." DIGITAL HEALTH 7 (January 2021): 205520762110599. http://dx.doi.org/10.1177/20552076211059975.

Full text
Abstract:
Real world data (RWD) are data relating to patient health status and/or the delivery of health care routinely collected from a variety of sources; real-world evidence (RWE) generated by RWD analyses can become an important component of drug development programs and, potentially, regulatory decision-making. As a RWD source, electronic health records (EHRs) can now provide patient-level data at unparalleled depth and granularity. We propose a RWE generation framework that could maximize the synergy between RWD and prospective clinical trials by capitalizing on an emerging data curation infrastructure that may be applied to both retrospective and prospective research. In this platform, centralized data collection and monitoring could be enabled via routine EHR use, and seamlessly integrated with select intentional data capture during prospective study periods. By bridging the divide between routine care and clinical research, this integrated platform aggregates retrospective and prospective data, collected both routinely and intentionally. This approach makes clinical trial participation more available to patients, increasing the potential depth of data, representativeness and efficiency of clinical research.
APA, Harvard, Vancouver, ISO, and other styles
19

Nasri, Edy, Yul Hendra, and M. Nur Farezi. "REKAYASA PERANGKAT LUNAK PENGARSIPAN DIGITAL DOKUMEN ACCOUNTING FINANCIAL DENGAN PENDEKAN METODE MVC." Jurnal Ilmiah Sains dan Teknologi 5, no. 1 (February 26, 2021): 1–13. http://dx.doi.org/10.47080/saintek.v5i1.1193.

Full text
Abstract:
In the activities of document interception has an important role in the processing of document archiving in an agency or company and is used in supporting administrative processes or other activities. If the archiving of documents owned is not well managed can lead to difficulty finding the information that has been stored and ultimately can hinder the next stage of the work process. In the practice of paper-based records management, many problems are faced, thus giving space to electronic media as an alternative in archiving management. In archival terminology, electronic media is grouped as a new media archive, one form of storage of new media archives is digital media. Digital media usually requires tools in the form of computers, because it cannot be read directly, can be processed in computer programs and stored in digital data storage media. In This research discussed how to design, implement the system and maintenance and security of documents so as to avoid damage. This Software Engineering was created with MVC approach by using Framwork Codeigniter with the aim of archiving this digital document done to help and prevent a very long process in the storage and search of a document needed in a fast, precise and detailed time
APA, Harvard, Vancouver, ISO, and other styles
20

Reid, C. L., and A. M. Ridley. "Environmental motivation and monitoring by landholders in north-east Victoria: fact, fantasy and future implications for catchment management." Australian Journal of Experimental Agriculture 47, no. 3 (2007): 346. http://dx.doi.org/10.1071/ea06021.

Full text
Abstract:
This paper reports on the social and business profiles of 39 landholders (in three groups) in north-east Victoria, participating in an Environmental Management Systems (EMS) project, and their motivations for participating in EMS. The level and type of record keeping, formal monitoring, use of electronic technology, and interest or capacity to monitor their environmental performance were also assessed because this is a crucial part of the EMS process and one that research has not reported on to date. Landholder participation in EMS was mostly for reasons of wanting to better account for sustainability issues in farm management. Most participants recorded rainfall, soil test results, production measures and chemical use (in total 69–97%); however, 31% kept no chemical records. Few kept records of remnant native vegetation, pasture management, weeds, pest animals or native fauna. Electronic record keeping systems were used by 26% of participants. Almost all owned a computer and over 70% used the internet and email. To assess interest and capacity to monitor environmental performance, participants were introduced to a water balance calculation tool (this being a locally relevant issue) and asked to calculate their own values. Most participants needed two to three visits to gain confidence to perform the calculations and most did not view the tools as being of much relevance. This was in strong contrast to previous work carried out in the southern Riverina of New South Wales. We conclude that environmental monitoring is more important for catchment management authorities (CMAs) and state agencies than for landholders. If CMAs are to assess how on-farm actions lead to improved environmental performance, there is a need to collect information remotely, invest in monitoring or provide incentives for farmers. There appears to be insufficient record keeping and monitoring by landholders to trace chemical residue problems. This, in addition to a lack of environmental monitoring, means that farmers in north-east Victoria cannot substantiate either ‘clean’ or ‘green’ claims. Future work should focus on awareness and education in natural resource management, as well as improved record keeping and monitoring. Some form of recognition will be needed if the majority of farmers are to participate in environmental programs. Introductory EMS training provides a means of improving business outcomes, documentation and improving environmental management.
APA, Harvard, Vancouver, ISO, and other styles
21

M., Supriya, and Vijay Kumar Chattu. "A Review of Artificial Intelligence, Big Data, and Blockchain Technology Applications in Medicine and Global Health." Big Data and Cognitive Computing 5, no. 3 (September 6, 2021): 41. http://dx.doi.org/10.3390/bdcc5030041.

Full text
Abstract:
Artificial intelligence (AI) programs are applied to methods such as diagnostic procedures, treatment protocol development, patient monitoring, drug development, personalized medicine in healthcare, and outbreak predictions in global health, as in the case of the current COVID-19 pandemic. Machine learning (ML) is a field of AI that allows computers to learn and improve without being explicitly programmed. ML algorithms can also analyze large amounts of data called Big data through electronic health records for disease prevention and diagnosis. Wearable medical devices are used to continuously monitor an individual’s health status and store it in cloud computing. In the context of a newly published study, the potential benefits of sophisticated data analytics and machine learning are discussed in this review. We have conducted a literature search in all the popular databases such as Web of Science, Scopus, MEDLINE/PubMed and Google Scholar search engines. This paper describes the utilization of concepts underlying ML, big data, blockchain technology and their importance in medicine, healthcare, public health surveillance, case estimations in COVID-19 pandemic and other epidemics. The review also goes through the possible consequences and difficulties for medical practitioners and health technologists in designing futuristic models to improve the quality and well-being of human lives.
APA, Harvard, Vancouver, ISO, and other styles
22

Apolinário-Hagen, Jennifer, Jessica Kemper, and Carolina Stürmer. "Public Acceptability of E-Mental Health Treatment Services for Psychological Problems: A Scoping Review." JMIR Mental Health 4, no. 2 (April 3, 2017): e10. http://dx.doi.org/10.2196/mental.6186.

Full text
Abstract:
Background Over the past decades, the deficient provision of evidence-based interventions for the prevention and treatment of mental health problems has become a global challenge across health care systems. In view of the ongoing diffusion of new media and mobile technologies into everyday life, Web-delivered electronic mental health (e-mental health) treatment services have been suggested to expand the access to professional help. However, the large-scale dissemination and adoption of innovative e-mental health services is progressing slowly. This discrepancy between potential and actual impact in public health makes it essential to explore public acceptability of e-mental health treatment services across health care systems. Objective This scoping review aimed to identify and evaluate recent empirical evidence for public acceptability, service preferences, and attitudes toward e-mental health treatments. On the basis of both frameworks for technology adoption and previous research, we defined (1) perceived helpfulness and (2) intentions to use e-mental health treatment services as indicators for public acceptability in the respective general population of reviewed studies. This mapping should reduce heterogeneity and help derive implications for systematic reviews and public health strategies. Methods We systematically searched electronic databases (MEDLINE/PubMed, PsycINFO, Psyndex, PsycARTICLES, and Cochrane Library, using reference management software for parallel searches) to identify surveys published in English in peer-reviewed journals between January 2010 and December 2015, focusing on public perceptions about e-mental health treatments outside the context of clinical, psychosocial, or diagnostic interventions. Both indicators were obtained from previous review. Exclusion criteria further involved studies targeting specific groups or programs. Results The simultaneous database search identified 76 nonduplicate records. Four articles from Europe and Australia were included in this scoping review. Sample sizes ranged from 217 to 2411 participants of ages 14-95 years. All included studies used cross-sectional designs and self-developed measures for outcomes related to both defined indicators of public acceptability. Three surveys used observational study designs, whereas one study was conducted as an experiment investigating the impact of brief educational information on attitudes. Taken together, the findings of included surveys suggested that e-mental health treatment services were perceived as less helpful than traditional face-to-face interventions. Additionally, intentions to future use e-mental health treatments were overall smaller in comparison to face-to-face services. Professional support was essential for help-seeking intentions in case of psychological distress. Therapist-assisted e-mental health services were preferred over unguided programs. Unexpectedly, assumed associations between familiarity with Web-based self-help for health purposes or “e-awareness” and intentions to use e-mental health services were weak or inconsistent. Conclusions Considering the marginal amount and heterogeneity of pilot studies focusing on public acceptability of e-mental health treatments, further research using theory-led approaches and validated measures is required to understand psychological facilitator and barriers for the implementation of innovative services into health care.
APA, Harvard, Vancouver, ISO, and other styles
23

Joshi, Shubham, Shalini Stalin, Prashant Kumar Shukla, Piyush Kumar Shukla, Ruby Bhatt, Rajan Singh Bhadoria, and Basant Tiwari. "Unified Authentication and Access Control for Future Mobile Communication-Based Lightweight IoT Systems Using Blockchain." Wireless Communications and Mobile Computing 2021 (December 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/8621230.

Full text
Abstract:
The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such Internet of Things (IoT) equipment generates a large volume of private and safety information. Because IoT systems are resource-constrained in terms of operation, memory, and communication capability, safeguarding accessibility to them is a difficult task. In the blockchain concept, the majority, or even all network nodes, check the validity and accuracy of exchanged data before accepting and recording it, whether this data is related to financial transactions, measurements of a sensor, or an authentication message. In evaluating the validity of exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices’ information with a distributed attitude, a new authentication protocol based on blockchain has been proposed, and it is claimed that this protocol satisfies user privacy while preserving security. Today’s identification and authentication techniques have substantial shortcomings due to rapidly growing prevalence and implementation. As a result, the protection of such gadgets is critical to guarantee the program’s efficacy and safety. A decentralized authentication and access control method for lightweight IoT systems are proposed in this work and a blockchain-based system that enables identification and secures messaging with IoT nodes. The technique is built on fog information systems and the idea of a blockchain system; when contrasted to something like a blockchain-based verification system, the testing findings show that the suggested mechanism outperforms it. The authentication and verification system undergoes using the blockchain technique. Our method takes advantage of blockchain’s inherent advantages while also associated with development authentication systems. Our suggested blockchain-based approach, structure, and layout, in particular, provide for transparency, consistency, and provenance while also providing tamper-proof records. The article describes the general systems architectural style and the analysis and execution of a real scenario as just a prototype system. The authentication included give as protected prototype that can transmit data with secured protocol and achieves minimum error rate.
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Haiyang, Li Kuang, and FengQiang Xia. "Multimodal temporal-clinical note network for mortality prediction." Journal of Biomedical Semantics 12, no. 1 (February 15, 2021). http://dx.doi.org/10.1186/s13326-021-00235-3.

Full text
Abstract:
Abstract Background Mortality prediction is an important task to achieve smart healthcare, especially for the management of intensive care unit. It can provide a reference for doctors to quickly predict the course of disease and customize early intervention programs for the patients in need. With the development of the electronic medical records, deep learning methods are introduced to deal with the prediction task. In the electronic medical records, clinical notes always contain rich and diverse medical information, including the clinical histories and reports during admission. Mortality prediction methods mostly rely on the temporal events such as medical examinations and ignore the related reports and history information in the clinical notes. We hope that we can utilize both temporal events and clinical notes information to get better mortality prediction results. Results We propose a multimodal temporal-clinical note network to model both temporal and clinical notes. Specifically, the clinical text are further processed for differentiating the chronic illness patients in the historical information of clinical notes from non-chronic illness patients. In order to further mine the information related to the mortality in the text, we learn the time series embedding with Long Short Term Memory networks and the clinical notes embedding with a label aware convolutional neural network. We also propose a scoring function to measure the importance of clinical note sections. Our approach achieved a better AUCPR and AUCROC than competing methods and visual explanations for word importance showed the interpretability improvement of the model. Conclusions We have tested our methodology on the MIMIC-III dataset. Contributions of different clinical note sections were uncovered by visualization methods. Our work demonstrates that the introduction of the medical history related information can improve the performance of the mortality prediction. Using label aware convolutional neural networks can further improve the results.
APA, Harvard, Vancouver, ISO, and other styles
25

Kudia, Ousswa, Michael Popovich, and Todd Watkins. "The Power of Consumer Activism and the Value of Immunization Registries in a Pandemic." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9721.

Full text
Abstract:
ObjectiveIf public health agencies used direct communication channels to individuals by building on existing immunization networks, the public would receive correct information quicker during a pandemic. Furthermore, there is value that can be leveraged from social networks to advance public health efforts to manage disease events and encourage consumers being more proactive in managing their own health care.IntroductionEpidemiologists and public health professionals work to ensure the risk and impact of existing and emerging diseases are minimized and do not turn into a pandemic. Timely and accurate information has become imperative as the world has become more interconnected through travel and technology.Recently, new information systems have played a key role in improving public health’s early warning and case management for disease outbreaks. Improved analytics to predict risk in populations have helped researchers open new doors to disease cures and medicines. The role of technology and public health to support these efforts has become more valuable.Health information systems are traditionally used for electronic medical records or payer billing systems and are not paired with technology advancements. Efforts today to link information and technology to engage consumers are championed by health plans and healthcare providers. Empowering individuals to be proactive when presented with their medical records is not a simple problem to solve. Information must be actionable but it still may not achieve the desired success.What if the health community engaged consumers with a social mission to help them fight disease outbreaks by becoming frontline activists to report occurrences and outcomes, and become “intelligent connections” to extend the right information to their social networks? This would encourage consumer technology to be better integrated with health information technology with continued investment in sustaining critical public health ecosystems.A large part of health information systems are immunization information systems (IIS) where administered vaccines are documented in a confidential computer based system in a specific geographic area1. The IIS can be used for disease surveillance purposes and provide valuable information to public health authorities2. Recently, MyIR was created where any IIS, pharmacy or provider can provide patients direct access to family immunization records. Providers can communicate to patients using MyIR to increase engagement and send vaccine reminders.MethodsA public-health engagement approach to empower consumers begins by offering individuals a mission they care about that will contribute to the social good and make them more attentive to their own healthcare. Our approach was to place a mission for every cell phone owner by using a commonly understood health event.The most significant public health event in the 20th century was the power of vaccines and the most significant action an individual can take to reduce their risk of a vaccine-preventable disease is to stay up-to-date on their immunizations3. However, there is a gap between believing in the value of immunizations and ensuring one’s immunizations are current. The challenge is to engage individuals, empower them to be advocates of their own health and in an outbreak, become sources of trusted public health messages as they communicate in their social network.A few experiments were conducted using MyIR.Increase SustainmentUsers who had not used MyIR in over 30 days were contacted. The baseline looked at users that were logging into MyIR more than once a month. The target was non-engaged users which were about 8,000 accounts.Customer Engagement IIn November 2017, an email was sent to 7,772 users that asked them, "Did you get your flu shot?" If they clicked Yes, they received positive affirmation. If they clicked No, the message was an encouragement to get their flu shot before Thanksgiving 2017.Customer Engagement IIIn January 2017, a Healthy Lifestyle page was created within MyIR. It featured a food blogger who offers readers nutritious easy meal ideas.Outreach EffortsMyIR Louisiana users were targeted who had failed to complete the two step enrollment process to access their immunization histories.Efficacy of FluIn April 2018, 212 MyIR users in Washington and Louisiana were asked: Did you get a flu shot this year? Do you feel like you got the flu this year?ResultsIncrease Sustainment27% of people opened the email and 3.6% of these individuals used MyIR within 30 days to access their records.Customer Engagement I9% answered the question with 80% saying “YES” they got their flu shot. As a result, 25 new immunizations were administered to these individuals within 60 days.Customer Engagement IIA 7.1% increase in returning users were tracked and a 9.1% increase in engaged users. There was a 6.7% increase in average session duration.Outreach Effort556 emails were sent which contained instructions to finalize enrollment for MyIR. There was a 30% open rate and 50 individuals completed the process.Efficacy of Flu78% responded they did receive the flu shot this year. Of these, 61.5% felt they got the flu this year which equates to a 38.5% efficacy rate. In February, CDC had determined the interim estimates for the effectiveness of the influenza were 36%4.ConclusionsOur aim was to show examples where public health agencies using direct communication channels to individuals could increase the efficacy of reaching the public with correct information. It was not designed to prove to be statistically effective but to show the potential of engaging individuals that have access to their immunization records. These early experiments and the growing data assets in IIS's help create a framework and technical platform to accelerate the potential value of engaging individuals in response plans for pandemic preparedness.Immunization information systems and technology have reached a point where information is available across wide networks of stakeholders. While health plans, providers and pharmacists struggle to engage their networks, by encouraging patients to be proactive in their healthcare, public health immunization assets may be the tipping point to accelerate this movement.Continued investment of immunization programs, private sector innovation, and consumer empowerment are essential to evolve and sustain data assets. As these assets create added value to each stakeholder, the investment will create a positive return. The value of this virtual ecosystem is untapped and opportunities to use it to drive down healthcare costs and improve patient outcomes are unlimited.References1. Centers for Disease Control Prevention (CDC). About Immunization Information Systems. Atlanta: CDC; 2012 May 15 [Cited 06 Jun 2018]. Available from: http://www.cdc.gov/vaccines/programs/iis/about.html2. Derrough T, Olsson K, Gianfredi V, et al. Immunisation Information Systems – useful tools for monitoring vaccination programmes in EU/EEA countries. Eurosurveillance [Internet];22(17):30519. Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5434883/#r13. Centers for Disease Control and Prevention (CDC). Ten great public health achievements--United States, 1900-1999. MMWR Morb Mortal Wkly Rep [Internet]. 1999 Apr 2;48(12):241-3 [Cited 06 Jun 2018]. Available from: https://www.cdc.gov/mmwr/preview/mmwrhtml/00056796.htm4. Morbidity and Mortality Weekly Report (MMWR): Interim Estimates of 2017-18 Seasonal Influenza Vaccine Effectiveness – United States, February 2018. Centers for Disease Control and Prevention [Internet]. 2018 Feb [Cited 2018 Apr 24]. Available from: https://www.cdc.gov/mmwr/volumes/67/wr/mm6706a2.htm
APA, Harvard, Vancouver, ISO, and other styles
26

Hope, Cathy, and Bethaney Turner. "The Right Stuff? The Original Double Jay as Site for Youth Counterculture." M/C Journal 17, no. 6 (September 18, 2014). http://dx.doi.org/10.5204/mcj.898.

Full text
Abstract:
On 19 January 1975, Australia’s first youth station 2JJ (Double Jay) launched itself onto the nation’s airwaves with a NASA-style countdown and You Only Like Me ‘Cause I’m Good in Bed by Australian band Skyhooks. Refused airtime by the commercial stations because of its explicit sexual content, this song was a clear signifier of the new station’s intent—to occupy a more radical territory on Australian radio. Indeed, Double Jay’s musical entrée into the highly restrictive local broadcasting environment of the time has gone on to symbolise both the station’s role in its early days as an enfant terrible of radio (Inglis 376), and its near 40 years as a voice for youth culture in Australia (Milesago, Double Jay). In this paper we explore the proposition that Double Jay functioned as an outlet for youth counterculture in Australia, and that it achieved this even with (and arguably because of) its credentials as a state-generated entity. This proposition is considered via brief analysis of the political and musical context leading to the establishment of Double Jay. We intend to demonstrate that although the station was deeply embedded in “the system” in material and cultural terms, it simultaneously existed in an “uneasy symbiosis” (Martin and Siehl 54) with this system because it consciously railed against the mainstream cultures from which it drew, providing a public and active vehicle for youth counterculture in Australia. The origins of Double Jay thus provide one example of the complicated relationship between culture and counterculture, and the multiple ways in which the two are inextricably linked. As a publicly-funded broadcasting station Double Jay was liberated from the industrial imperatives of Australia’s commercial stations which arguably drove their predisposition for formula. The absence of profit motive gave Double Jay’s organisers greater room to experiment with format and content, and thus the potential to create a genuine alternative in Australia broadcasting. As a youth station Double Jay was created to provide a minority with its own outlet. The Labor government committed to wrenching airspace from the very restrictive Australian broadcasting “system” (Wiltshire and Stokes 2) to provide minority voices with room to speak and to be heard. Youth was identified by the government as one such minority. The Australian Broadcasting Commission (ABC) contributed to this process by enabling young staffers to establish the semi-independent Contemporary Radio Unit (CRU) (Webb) and within this a youth station. Not only did this provide a focal point around which a youth collective could coalesce, but the distinct place and identity of Double Jay within the ABC offered its organisers the opportunity to ignore or indeed subvert some of the perceived strictures of the “mothership” that was the ABC, whether in organisational, content and/or stylistic terms. For these and other reasons Double Jay was arguably well positioned to counter the broadcasting cultures that existed alongside this station. It did so stylistically, and also in more fundamental ways, At the same time, however, it “pillaged the host body at random” (Webb) co-opting certain aspects of these cultures (people, scheduling, content, administration) which in turn implicated Double Jay in the material and cultural practices of those mainstream cultures against which it railed. Counterculture on the Airwaves: Space for Youth to Play? Before exploring these themes further, we should make clear that Double Jay’s legitimacy as a “counterculture” organisation is observably tenuous against the more extreme renderings of the concept. Theodore Roszak, for example, requires of counterculture something “so radically disaffiliated from the mainstream assumptions of our society that it scarcely looks to many as a culture at all” (5). Double Jay was a brainchild of the state: an outcome of the Whitlam Government’s efforts to open up the nation’s airwaves (Davis, Government; McClelland). Further, the supervision of this station was given to the publicly funded Australian national broadcaster, the ABC (Inglis). Any claim Double Jay has to counterculture status then is arguably located in less radical invocations of the term. Some definitions, for example, hold that counterculture contains value systems that run counter to culture, but these values are relational rather than divorced from each other. Kenneth Leech, for example, states that counterculture is "a way of life and philosophy which at central points is in conflict with the mainstream society” (Desmond et al. 245, our emphasis); E.D. Batzell defines counterculture as "a minority culture marked by a set of values, norms and behaviour patterns which contradict those of the dominant society" (116, our emphasis). Both definitions imply that counterculture requires the mainstream to make sense of what it is doing and why. In simple terms then, counterculture as the ‘other’ does not exist without its mainstream counterpoint. The particular values with which counterculture is in conflict are generated by “the system” (Heath and Potter 6)—a system that imbues “manufactured needs and mass-produced desires” (Frank 15) in the masses to encourage order, conformity and consumption. Counterculture seeks to challenge this “system” via individualist, expression-oriented values such as difference, diversity, change, egalitarianism, and spontaneity (Davis On Youth; Leary; Thompson and Coskuner‐Balli). It is these kinds of counterculture values that we demonstrate were embedded in the content, style and management practices within Double Jay. The Whitlam Years and the Birth of Double Jay Double Jay was borne of the Whitlam government’s brief but impactful period in office from 1972 to 1975, after 23 years of conservative government in Australia. Key to the Labor Party’s election platform was the principle of participatory democracy, the purpose of which was “breaking down apathy and maximising active citizen engagement” (Cunningham 123). Within this framework, the Labor Party committed to opening the airwaves, and reconfiguring the rhetoric of communication and media as a space of and for the people (Department of the Media 3). Labor planned to honour this commitment via sweeping reforms that would counter the heavily concentrated Australian media landscape through “the encouragement of diversification of ownership of commercial radio and television”—and in doing so enable “the expression of a plurality of viewpoints and cultures throughout the media” (Department of the Media 3). Minority groups in particular were to be privileged, while some in the Party even argued for voices that would actively agitate. Senator Jim McClelland, for one, declared, “We say that somewhere in the system there must be broadcasting which not only must not be afraid to be controversial but has a duty to be controversial” (Senate Standing Committee 4). One clear voice of controversy to emerge in the 1960s and resonate throughout the 1970s was the voice of youth (Gerster and Bassett; Langley). Indeed, counterculture is considered by some as synonymous with a particular strain of youth culture during this time (Roszak; Leech). The Labor Government acknowledged this hitherto unrecognised voice in its 1972 platform, with Minister for the Media Senator Doug McClelland claiming that his party would encourage the “whetting of the appetite” for “life and experimentation” of Australia’s youth – in particular through support for the arts (160). McClelland secured licenses for two “experimental-type” stations under the auspices of the ABC, with the youth station destined for Sydney via the ABC’s standby transmitter in Gore Hill (ABCB, 2). Just as the political context in early 1970s Australia provided the necessary conditions for the appearance of Double Jay, so too did the cultural context. Counterculture emerged in the UK, USA and Europe as a clear and potent force in the late 1960s (Roszak; Leech; Frank; Braunstein and Doyle). In Australia this manifested in the 1960s and 1970s in various ways, including political protest (Langley; Horne); battles for the liberalisation of censorship (Hope and Dickerson, Liberalisation; Chipp and Larkin); sex and drugs (Dawson); and the art film scene (Hope and Dickerson, Happiness; Thoms). Of particular interest here is the “lifestyle” aspect of counterculture, within which the value-expressions against the dominant culture manifest in cultural products and practices (Bloodworth 304; Leary ix), and more specifically, music. Many authors have suggested that music was pivotal to counterculture (Bloodworth 309; Leech 8), a key “social force” through which the values of counterculture were articulated (Whiteley 1). The youth music broadcasting scene in Australia was extremely narrow prior to Double Jay, monopolised by a handful of media proprietors who maintained a stranglehold over the youth music scene from the mid-50s. This dominance was in part fuelled by the rising profitability of pop music, driven by “the dreamy teenage market”, whose spending was purely discretionary (Doherty 52) and whose underdeveloped tastes made them “immune to any sophisticated disdain of run-of-the-mill” cultural products (Doherty 230-231). Over the course of the 1950s the commercial stations pursued this market by “skewing” their programs toward the youth demographic (Griffen-Foley 264). The growing popularity of pop music saw radio shift from a “multidimensional” to “mono-dimensional” medium according to rock journalist Bruce Elder, in which the “lowest-common-denominator formula of pop song-chat-commercial-pop-song” dominated the commercial music stations (12). Emblematic of this mono-dimensionalism was the appearance of the Top 40 Playlist in 1958 (Griffin-Foley 265), which might see as few as 10–15 songs in rotation in peak shifts. Elder claims that this trend became more pronounced over the course of the 1960s and peaked in 1970, with playlists that were controlled with almost mechanical precision [and] compiled according to American-devised market research methods which tended to reinforce repetition and familiarity at the expense of novelty and diversity. (12) Colin Vercoe, whose job was to sell the music catalogues of Festival Records to stations like 2UE, 2SER and SUW, says it was “an incredibly frustrating affair” to market new releases because of the rigid attachment by commercials to the “Top 40 of endless repeats” (Vercoe). While some air time was given to youth music beyond the Top 40, this happened mostly in non-peak shifts and on weekends. Bill Drake at 2SM (who was poached by Double Jay and allowed to reclaim his real name, Holger Brockmann) played non-Top 40 music in his Sunday afternoon programme The Album Show (Brockmann). A more notable exception was Chris Winter’s Room to Move on the ABC, considered by many as the predecessor of Double Jay. Introduced in 1971, Room to Move played all forms of contemporary music not represented by the commercial broadcasters, including whole albums and B sides. Rock music’s isolation to the fringes was exacerbated by the lack of musical sales outlets for rock and other forms of non-pop music, with much music sourced through catalogues, music magazines and word of mouth (Winter; Walker). In this context a small number of independent record stores, like Anthem Records in Sydney and Archie and Jugheads in Melbourne, appear in the early 1970s. Vercoe claims that the commercial record companies relentlessly pursued the closure of these independents on the grounds they were illegal entities: The record companies hated them and they did everything they could do close them down. When (the companies) bought the catalogue to overseas music, they bought the rights. And they thought these record stores were impinging on their rights. It was clear that a niche market existed for rock and alternative forms of music. Keith Glass and David Pepperell from Archie and Jugheads realised this when stock sold out in the first week of trade. Pepperell notes, “We had some feeling we were doing something new relating to people our own age but little idea of the forces we were about to unleash”. Challenging the “System” from the Inside At the same time as interested individuals clamoured to buy from independent record stores, the nation’s first youth radio station was being instituted within the ABC. In October 1974, three young staffers—Marius Webb, Ron Moss and Chris Winter— with the requisite youth credentials were briefed by ABC executives to build a youth-style station for launch in January 1975. According to Winter “All they said was 'We want you to set up a station for young people' and that was it!”, leaving the three with a conceptual carte blanche–although assumedly within the working parameters of the ABC (Webb). A Contemporary Radio Unit (CRU) was formed in order to meet the requirements of the ABC while also creating a clear distinction between the youth station and the ABC. According to Webb “the CRU gave us a lot of latitude […] we didn’t have to go to other ABC Departments to do things”. The CRU was conscious from the outset of positioning itself against the mainstream practices of both the commercial stations and the ABC. The publicly funded status of Double Jay freed it from the shackles of profit motive that enslaved the commercial stations, in turn liberating its turntables from baser capitalist imperatives. The two coordinators Ron Moss and Marius Webb also bypassed the conventions of typecasting the announcer line-up (as was practice in both commercial and ABC radio), seeking instead people with charisma, individual style and youth appeal. Webb told the Sydney Morning Herald that Double Jay’s announcers were “not required to have a frontal lobotomy before they go on air.” In line with the individual- and expression-oriented character of the counterculture lifestyle, it was made clear that “real people” with “individuality and personality” would fill the airwaves of Double Jay (Nicklin 9). The only formula to which the station held was to avoid (almost) all formula – a mantra enhanced by the purchase in the station’s early days of thousands of albums and singles from 10 or so years of back catalogues (Robinson). This library provided presenters with the capacity to circumvent any need for repetition. According to Winter the DJs “just played whatever we wanted”, from B sides to whole albums of music, most of which had never made it onto Australian radio. The station also adapted the ABC tradition of recording live classical music, but instead recorded open-air rock concerts and pub gigs. A recording van built from second-hand ABC equipment captured the grit of Sydney’s live music scene for Double Jay, and in so doing undercut the polished sounds of its commercial counterparts (Walker). Double Jay’s counterculture tendencies further extended to its management style. The station’s more political agitators, led by Webb, sought to subvert the traditional top-down organisational model in favour of a more egalitarian one, including a battle with the ABC to remove the bureaucratic distinction between technical staff and presenters and replace this with the single category “producer/presenter” (Cheney, Webb, Davis 41). The coordinators also actively subverted their own positions as coordinators by holding leaderless meetings open to all Double Jay employees – meetings that were infamously long and fraught, but also remembered as symbolic of the station’s vibe at that time (Frolows, Matchett). While Double Jay assumed the ABC’s focus on music, news and comedy, at times it politicised the content contra to the ABC’s non-partisan policy, ignored ABC policy and practice, and more frequently pushed its contents over the edges of what was considered propriety and taste. These trends were already present in pockets of the ABC prior to Double Jay: in current affairs programmes like This Day Tonight and Four Corners (Harding 49); and in overtly leftist figures like Alan Ashbolt (Bowman), who it should be noted had a profound influence over Webb and other Double Jay staff (Webb). However, such an approach to radio still remained on the edges of the ABC. As one example of Double Jay’s singularity, Webb made clear that the ABC’s “gentleman’s agreement” with the Federation of Australian Commercial Broadcasters to ban certain content from airplay would not apply to Double Jay because the station would not “impose any censorship on our people” – a fact demonstrated by the station’s launch song (Nicklin 9). The station’s “people” in turn made the most of this freedom with the production of programmes like Gayle Austin’s Horny Radio Porn Show, the Naked Vicar Show, the adventures of Colonel Chuck Chunder of the Space Patrol, and the Sunday afternoon comic improvisations of Nude Radio from the team that made Aunty Jack. This openness also made its way into the news team, most famously in its second month on air with the production of The Ins and Outs of Love, a candid documentary of the sexual proclivities and encounters of Sydney’s youth. Conservative ABC staffer Clement Semmler described the programme as containing such “disgustingly explicit accounts of the sexual behaviour of young teenagers” that it “aroused almost universal obloquy from listeners and the press” (35). The playlist, announcers, comedy sketches, news reporting and management style of Double Jay represented direct challenges to the entrenched media culture of Australia in the mid 1970s. The Australian National Commission for UNESCO noted at the time that Double Jay was “variously described as political, subversive, offensive, pornographic, radical, revolutionary and obscene” (7). While these terms were understandable given the station’s commitment to experiment and innovation, the “vital point” about Double Jay was that it “transmitted an electronic reflection of change”: What the station did was to zero in on the kind of questioning of traditional values now inherent in a significant section of the under 30s population. It played their music, talked in their jargon, pandered to their whims, tastes, prejudices and societal conflicts both intrinsic and extrinsic. (48) Conclusion From the outset, Double Jay was locked in an “uneasy symbiosis” with mainstream culture. On the one hand, the station was established by federal government and its infrastructure was provided by state funds. It also drew on elements of mainstream broadcasting in multiple ways. However, at the same time, it was a voice for and active agent of counterculture, representing through its content, form and style those values that were considered to challenge the ‘system,’ in turn creating an outlet for the expression of hitherto un-broadcast “ways of thinking and being” (Leary). As Henry Rosenbloom, press secretary to then Labor Minister Dr Moss Cass wrote, Double Jay had the potential to free its audience “from an automatic acceptance of the artificial rhythms of urban and suburban life. In a very real sense, JJ [was] a deconditioning agent” (Inglis 375-6). While Double Jay drew deeply from mainstream culture, its skilful and playful manipulation of this culture enabled it to both reflect and incite youth-based counterculture in Australia in the 1970s. References Australian Broadcasting Control Board. Development of National Broadcasting and Television Services. ABCB: Sydney, 1976. Batzell, E.D. “Counter-Culture.” Blackwell Dictionary of Twentieth-Century Social Thought. Eds. Williams Outhwaite and Tom Bottomore. Oxford: Blackwell, 1994. 116-119. Bloodworth, John David. “Communication in the Youth Counterculture: Music as Expression.” Central States Speech Journal 26.4 (1975): 304-309. Bowman, David. “Radical Giant of Australian Broadcasting: Allan Ashbolt, Lion of the ABC, 1921-2005.” Sydney Morning Herald 15 June 2005. 15 Sep. 2013 ‹http://www.smh.com.au/news/Obituaries/Radical-giant-of-Australian-broadcasting/2005/06/14/1118645805607.html›. Braunstein, Peter, and Michael William Doyle. Eds. Imagine Nation: The American Counterculture of the 1960s and '70s New York: Taylor and Francis, 2002. Brockman, Holger. Personal interview. 8 December 2013. Cheney, Roz. Personal interview. 10 July 2013. Chipp, Don, and John Larkin. Don Chipp: The Third Man. Adelaide: Rigby, 2008. Cunningham, Frank. Theories of Democracy: A Critical Introduction. London: Routledge, 2002. Davis, Fred. On Youth Subcultures: The Hippie Variant. New York: General Learning Press, 1971. Davis, Glyn. "Government Decision‐Making and the ABC: The 2JJ Case." Politics 19.2 (1984): 34-42. Dawson, Jonathan. "JJJ: Radical Radio?." Continuum: Journal of Media & Cultural Studies 6.1 (1992): 37-44. Department of the Media. Submission by the Department of the Media to the Independent Inquiry into Frequency Modulation Broadcasting. Sydney: Australian Government Publishers, 1974. Desmond, John, Pierre McDonagh, and Stephanie O'Donohoe. “Counter-Culture and Consumer Society.” Consumption Markets & Culture 4.3 (2000): 241-279. Doherty, Thomas. Teenagers and Teenpics: The Juvenilization of American Movies in the 1950s. Boston: Unwin Hyman, 1988. Elder, Bruce. Sound Experiment. Unpublished manuscript, 1988. Australian National Commission for UNESCO. Extract from Seminar on Entertainment and Society, Report on Research Project. 1976. Frolows, Arnold. Personal interview. 10 July 2013. Frank, Thomas. The Conquest of Cool: Business Culture, Counterculture, and the Rise of Hip Consumerism. Chicago: University of Chicago Press, 1997. Gerster, Robin, and Jan Bassett. Seizures of Youth: The Sixties and Australia. Melbourne: Hyland House, 1991. Griffen-Foley, Bridget. Changing Stations: The Story of Australian Commercial Radio, Sydney: UNSW Press, 2009. Harding, Richard. Outside Interference: The Politics of Australian Broadcasting. Melbourne: Sun Books, 1979. Heath, Joseph, and Andrew Potter. Nation of Rebels: Why Counterculture Became Consumer Culture. New York: Harper Collins, 2004. Hope, Cathy, and Adam Dickerson. “The Sydney and Melbourne Film Festivals, and the Liberalisation of Film Censorship in Australia”. Screening the Past 35 (2012). 12 Aug. 2014 ‹http://www.screeningthepast.com/2012/12/the-sydney-and-melbourne-film-festivals-and-the-liberalisation-of-film-censorship-in-australia/›. Hope, Cathy, and Adam Dickerson. “Is Happiness Festival-Shaped Any Longer? The Melbourne and Sydney Film Festivals and the Growth of Australian Film Culture 1973-1977”. Screening the Past 38 (2013). 12 Aug. 2014 ‹http://www.screeningthepast.com/2013/12/‘is-happiness-festival-shaped-any-longer’-the-melbourne-and-sydney-film-festivals-and-the-growth-of-australian-film-culture-1973-1977/›. Horne, Donald. Time of Hope: Australia 1966-72. Sydney: Angus and Robertson, 1980. Inglis, Ken. This Is the ABC: The Australian Broadcasting Commission, 1932-1983. Melbourne: Melbourne University Press, 1983. Langley, Greg. A Decade of Dissent: Vietnam and the Conflict on the Australian Homefront. Sydney: Allen and Unwin, 1992. Leary, Timothy. “Foreword.” Counterculture through the Ages: From Abraham to Acid House. Eds. Ken Goffman and Dan Joy. New York: Villard, 2007. ix-xiv. Leech, Kenneth. Youthquake: The Growth of a Counter-Culture through Two Decades. London: Sheldon Press, 1973. Martin, J., and C. Siehl. "Organizational Culture and Counterculture: An Uneasy Symbiosis. Organizational Dynamics, 12.2 (1983): 52-64. Martin, Peter. Personal interview. 10 July 2014. Matchett, Stuart. Personal interview. 10 July 2013. McClelland, Douglas. “The Arts and Media.” Towards a New Australia under a Labor Government. Ed. John McLaren. Victoria: Cheshire Publishing, 1972. McClelland, Douglas. Personal interview. 25 August 2010. Milesago. “Double Jay: The First Year”. n.d. 8 Oct. 2012 ‹http://www.milesago.com/radio/2jj.htm›. Milesago. “Part 5: 1971-72 - Sundown and 'Archie & Jughead's”. n.d. Keith Glass – A Life in Music. 12 Oct. 2012 ‹http://www.milesago.com/Features/keithglass5.htm›. Nicklin, Lenore. “Rock (without the Roll) around the Clock.” Sydney Morning Herald 18 Jan. 1975: 9. Robinson, Ted. Personal interview. 11 December 2013. Roszak, Theodore. The Making of a Counter Culture. New York: Anchor, 1969. Semmler, Clement. The ABC - Aunt Sally and Sacred Cow. Carlton: Melbourne University Press, 1981. Senate Standing Committee on Education, Science and the Arts and Jim McClelland. Second Progress Report on the Reference, All Aspects of Television and Broadcasting, Including Australian Content of Television Programmes. Canberra: Australian Senate, 1973. Thompson, Craig J., and Gokcen Coskuner‐Balli. "Countervailing Market Responses to Corporate Co‐optation and the Ideological Recruitment of Consumption Communities." Journal of Consumer Research 34.2 (2007): 135-152. Thoms, Albie. “The Australian Avant-garde.” An Australian Film Reader. Eds. Albert Moran and Tom O’Regan. Sydney: Currency Press, 1985. 279–280. Vercoe, Colin. Personal interview. 11 Feb. 2014. Walker, Keith. Personal interview. 11 July 2013. Webb, Marius. Personal interview. 5 Feb. 2013. Whiteley, Sheila. The Space between the Notes: Rock and the Counter-Culture. London: Routledge, 1992. Wiltshire, Kenneth, and Charles Stokes. Government Regulation and the Electronic Commercial Media. Monograph M43. Melbourne: Committee for Economic Development of Australia, 1976. Winter, Chris. Personal interview. 16 Mar. 2013.
APA, Harvard, Vancouver, ISO, and other styles
27

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
28

Pavlenko, Zhanna. "LAW IN DIGITAL REALITY." Bulletin of Yaroslav Mudryi National Law University. Series:Philosophy, philosophies of law, political science, sociology 2, no. 49 (May 26, 2021). http://dx.doi.org/10.21564/2663-5704.49.229779.

Full text
Abstract:
The Problem setting. Due to the rapid development of digital technologies, the issue of status settlement and the use of artificial intelligence technologies is especially relevant. This fact indicates the need and importance of finding answers to the question and aims to intensify and unite the efforts of the scientific community to address relevant issues. One of the areas of scientific research is the doctrinal development of new phenomena and processes that have arisen and are taking place in the state and legal sphere under the influence of digitalization of economics, management and law. The tasks of scientific research are to comprehend the impact of the digitization process on the state and legal sphere of society; law as such; assessment of the transformations that are taking place and identification of trends in their dynamics; forecasting the state of these phenomena in the future; formulation of fundamental and applied problems of legal science in terms of doctrinal development of the laws of development and functioning of law, state and legal sphere of society in the conditions of digital reality, determination of approaches to their solution. Recent research and publications analysis. An analysis of recent research and publications shows that scientific research on this issue is carried out mainly within the economic, political, computer, legal sciences, although the problems and prospects of digitization of law require a deep and thorough philosophical, including philosophical and legal understanding. The rapid development of new technologies, in particular artificial intelligence technologies, the Internet of Things, cloud technologies, etc., is contributing to changes in current legislation. Today, advanced economies are already pondering the question of regulating the status and use of AI technologies. While these are only the first bold steps, in the future, all of these can affect global changes in the legal system - perhaps full-fledged comprehensive institutions of law, even the branches of law. Paper objectiv. The purpose of this article is a philosophical and legal understanding of the impact of digitalization on the state and legal sphere of society and law as such. Paper main body. One of the practical aspects of digitalization is the manifestation of the state’s ability to provide various services. If necessary, citizens receive certificates, records, statements, responses to electronic inquiries, electronic payments. Other practical aspects, provided that these technologies are used wisely, can improve welfare in education, public safety, and health. In addition, digital imaging can also help address common global issues, such as climate change and greater access to health care and mobility. At the same time, according to many researchers, along with the benefits of digital technologies, including artificial intelligence, new types of ethical issues are being raised, namely compliance with legal ethics standards by artificial intelligence systems and justice, the most important of which are respect for human rights and democratic values. , as well as the danger of transferring prejudices from the analog to the digital world. Researchers have linked the legal challenges of using artificial intelligence technologies in legal practice to a number of issues. In particular, with such as: ensuring data confidentiality; access to confidential law enforcement information; lack of regulatory framework for the use of artificial intelligence systems in legal practice; protection of intellectual property; risk assessment of the use of artificial intelligence systems by a lawyer when working with a client; other potential problems of lawyer’s liability; dangers of unauthorized access and modification of artificial intelligence systems by attackers; damage to artificial intelligence systems by malicious virus programs; violation of the terms of providing advice from artificial intelligence systems in case of technical problems, etc. Therefore, the development of systems that transparently use artificial intelligence and are responsible for their results is critical. Artificial intelligence systems must function properly and safely. According to experts, the unresolved in Ukraine of many political and legal issues related to the rapid development of the information and communication sphere with the advent of digital technologies has become dangerous. It is obvious that the transformations in society associated with these processes require new approaches to the development of national policies for the digitalization of society, which should be based on international agreements. Due to these transformations, there is a need to develop strategic documents that will regulate this area. These documents should be flexible and designed to take into account the maximum amount of data, as well as ensure the free development of innovative technologies and prevent possible risks. Issues of development of the digital economy and society of Ukraine do not fully meet today’s conditions, not enough account is taken of the transformations that have emerged and are currently taking place both in law and in the field of legal regulation under the influence of digitalization. Digital technologies are able to change the image of law, to influence its regulatory potential and efficiency, to open the way or to block its action in new dimensions of social reality. Traditional rather than digital vision of law, legal technologies and certain types of legal activity by legislators is a consequence of the lack of relevant scientific developments that will identify and explain the impact of the digitization process on the law and the legal sphere of society. The practical need for this kind of research is now greater than ever. In order to satisfy it, scientists should intensify work in this direction. Conclusions of the research. The new digital reality puts forward new requirements for legal science and legal practice, including the development of effective tools and models of legal regulation of various spheres of public life. In modern conditions, law becomes not only a means, a tool that provides digitalization of the economy, government and other segments of social life, but also the object of digitalization. With the development of digital technologies, the contradiction between the need for quality both in terms of form and content of regulations, as well as the ability to meet it in a short time. The task of the state is both to provide favorable conditions conducive to digitalization and to create opportunities for their implementation.
APA, Harvard, Vancouver, ISO, and other styles
29

"Romanian Congress of Physical and Rehabilitation Medicine and Balneology, Galați, 4-6 September 2019 - Congress Abstracts." Balneo Research Journal 10, Vol.10, No.3 (September 3, 2019): 321–432. http://dx.doi.org/10.12680/balneo.2019.276.

Full text
Abstract:
Scientific Program Oral Presentations Authors Title Abstract CONSTANTIN MUNTEANU, Mihail HOTETEU, Diana MUNTEANU, Gabriela DOGARU - 12 minutes PERSPECTIVES OF BALNEOLOGY - INTERNATIONAL DATA INPUTS, NATIONAL OUTPUTS Link L1 UMBERTO SOLIMENE - 14 minutes CLIMATE AND HEALTH: A NEW CHALLENGE FOR AN OLD SCIENCE Link L2 Zeki KARAGÜLLE - 14 minutes BALNEOLOGICAL TREATMENTS WITH NATURAL HYDROGEN SULFIDE (H2S) Waters Link L3 Constantin Florin Dragan, Liliana Padure, Gelu Onose - 12 minutes SPECIFIC ADVANCED QUANTIFICATIONS ON THE RELATIONSHIP BETWEEN THE ANGULATION OF THE MAIN SCOLIOTIC CURVE AND LEG SWING IN THE GAIT PHASES, IN CHILDREN AND ADOLESCENTS WITH AND WITHOUT POSTURAL TREATMENT Link L4 Irina ALBADI, Camelia CIOBOTARU, Andreea-Alexandra LUPU, Ionela BALASA, Claudiu FATU, Enghin SACHIR, Gelu ONOSE - 12 minutes A MULTIMODAL APPROACHES TO MANAGE REHABILITATION THERAPY OF DISFUNCTIONALS ASPECTS TO A PACIENT WITH GOUT, MIELLITUS DIABETES, ATRIAL FIBRILATION AND MIDDLE CEREBRAL ARTERY STROKE Link L5 ELENA RAEVSCHI - 12 minutes PREVENTION CONSIDERATIONS IN Cardiovascular Diseases regarding the premature mortality reduction Link L6 ANIȘOARA CIMIL - 12 minutes THE EFFECTIVENESS OF THE REHABILITATION PROGRAMME ACCORDING TO THE ETIOPATHOGENESIS OF PROSTHETIC JOINT PATHOLOGY Link L7 TRAIAN -VIRGILIU SURDU, Monica SURDU, Olga SURDU - 10 minutes FOURTH INDUSTRIAL REVOLUTION (INDUSTRY 4.0) AND MODERN THERMAL MEDICINE (THERME 4.0) IN XXIST CENTURY Link L8 Gabriela DOGARU, Akos MOLNAR, Marieta MOTRICALA - 10 minutes EFFECTS OF CARBONATED MINERAL WATER AND MOFETTE IN BĂILE TUŞNAD IN EXPERIMENTALLY INDUCED ISCHEMIC HEART DISEASE Link L9 Q & A – 12 minutes Authors Title Abstract Aurelian Anghelescu, Valentin Deaconu, Catalina Axente,Elena Constantin, Gelu Onose - 12 minutes THERAPEUTIC DIFFICULTIES IN A YOUNG PATIENT WITH MULTIDRUG RESISTANT EPILEPSY (NEEDING VAGAL NERVE ELECTROSTIMULATION), SEQUELAE AFTER CONGENITAL VASCULAR CEREBRAL MALFORMATION, WITH CHRONIC GAIT IMPAIRMENTS AND RECENT TRAUMATIC BRAIN COMPLICATION Link L10 Luminița NIRLU, Alexandru G. STAVRICĂ, Laura Georgiana Popescu, Ana Carmen Albeșteanu, Ali-Osman Saglam, Gelu Onose - 12 minutes DIAGNOSTIC PARTICULARITIES AND MULTIMODAL THERAPEUTIC AND REHABILITATION APPROACHES TO A COMPLEX CASE OF POST ISCHEMIC STROKE WITH DYSPHAGIA AND DYSPHONIA, ASSOCIATING MILLARD-GUBLER AND WALLENBERG SYNDROMES - CASE REPORT Link L11 Cristina Octaviana DAIA, Croitoru Stefana, Mariana Axente, Gelu ONOSE - 14 minutes IONTOPHORESIS AND LASER APPLICATIONS IN FACIAL NERVE PALSY Link L12 Doina Maria MOLDOVAN, Gabriela DOGARU - 12 minutes SPLINTING VERSUS SURGICAL TREATMENT IN MALLET FINGER Link L13 Doina Maria MOLDOVAN, Gabriela DOGARU - 12 minutes EARLY REHABILITATION IN PATIENT AFTER TREATMENT FOR DISTAL RADIUS FRACTURE Link L14 Liliana PADURE, Raluca PETCU, Anca Irina GRIGORIU - 12 minutes THE IMPACT OF MULTIFACTORIAL GAIT ANALYSIS ON THE DIAGNOSIS AND REHABILITATION OF CHILDREN WITH WALKING DISORDERS Link L15 Valerica Creanga-Zarnescu, Ana-Maria Fatu, Mihaela Lungu, Violeta Sapira, Anamaria Ciubara - 12 minutes REHABILITATION POSSIBILITIES OF APHASIC PATIENT Link L16 Cristina DAIA, Simona SCHEK, Stefana CROITORU, Alina GHERGHICEANU, Gelu ONOSE - 12 minutes FAVORABLE REHABILITATION RESULTS ON A PATIENT WITH SEVERE LEFT HEMIPLEGIA AFTER AN INTRAPARENCHYMAL HEMATOMA Link L17 Elena VIZITIU, Mihai CONSTANTINESCU, Sînziana Călina SILIȘTEANU - 12 minutes THE ROLE OF THERAPEUTIC SWIMMING IN THE PROPHYLAXIS OF SCOLIOSIS IN THE "C" LEFT IN CHILDREN DURING THE PREPUBERTAL PERIOD Link L18 Q & A – 12 minutes Authors Title Abstract Alexandru G. STAVRICĂ, Luminiţa Nirlu, Laura Georgiana Popescu, Ana Carmen Albeşteanu, Gelu ONOSE - 12 minutes DIAGNOSTIC AND THERAPEUTIC APPROACHES IN REHABILITATION CORRELATED TO A CASE OF TETRAPARESIS (WITH PREDOMINANCE OF PARAPARESIS) AFTER SEVERE CCT - BIFRONTO - BASAL AND BITEMPORAL CONTUSION. Link L19 Ana Maria Bumbea, Otilia Rogoveanu, Carmen,Albu Rodica Traistaru, Catalin,Bostina, Bogdan Stefan Bumbea, Roxana Dumitrascu, Borcan Madalina MANAGEMENT OF SPASTICITY IN NEUROLOGICAL PATIENTS Link L20 Laura Georgiana Popescu, Luminița Nirlu, Ana Carmen Albeșteanu, Ali Osman Saglam, Gelu Onose - 12 minutes PARTICULARITIES OF COMPLEX THERAPEUTICALLY-REHABILITATIVE MANAGEMENT, STEPWISE, IN A PATIENT WITH POST-CCT PSYCHO-COGNITIVE IMPAIRMENT IN A LARGE POLYTRAMATIC CONTEXT - CASE REPORT Link L21 Adrian MELNIC, Oleg PASCAL - 12 minutes DEVELOPING STRATEGIES TO ADDRESS COMORBIDITY IN STROKE REHABILITATION. Link L22 Dorin-Gheorghe TRIFF, Simona POP - 12 minutes MONOGENIC DISEASES WITH MUSCULO ARTICULAR LAXITY. DIAGNOSTIC CRITERIA AND PRINCIPLES OF RECOVERY THERAPY Link L23 Catalin Ionite, Dragos Arotaritei, Mihai Ilea, Mariana Rotariu - 12 minutes THE USE OF ELASTIC BANDS IN THE RECOVERY OF ANKLE SPRAINS Link L24 Mariana Rotariu, Marius Turnea, Calin Corciova, Catalin Ionite - 12 minutes THE EFFECTS OF CUBE THERAPY IN THE RECOVERY OF THE ARTHROSIS HAND IN GERIATRICS Link L25 Cristian Ştefan LIUŞNEA - 12 minutes FITNESS AND WELLNESS. CONCEPTUAL DELIMITATIONS Link L26 Adriana LUPU - 12 minutes NSAID THERAPY OF MUSCULOSKELETAL PAINS AND ITS PARTICULARITIES IN THE PATIENTS SUFFERING FROM CARDIOVASCULAR DISORDERS Link L27 Q & A – 12 minutes Authors Title Abstract Mihaela MANDU, Cristinel Dumitru BADIU, Raluca PETCU, Cosmin OPREA, Gelu ONOSE - 12 minutes CLINICAL-EVOLUTIVE PARTICULARITIES AND A MULTIMODAL THERAPEUTIC-REHABILITATIVE, AS WELL AS THROUGH CONNECTED CARES, APPROACH, IN A CASE OF HEMIPLEGIA AFTER ISCHEMIC CARDIO-EMBOLIC STROKE WITHIN A POLYPATHOLOGICAL CONTEXT Link L28 Ana Carmen Albesteanu, Laura Georgiana Popescu, Luminița Nirlu, Ali Osman Saglam, Gelu Onose - 12 minutes MULTIMODAL - REHABILITATIVE THERAPEUTICAL APPROACHES IN A COMPLEX OF PATHOLOGY INCLUDING POSSIBLY EVOLVING DISCARIOTIC TYPE - CASE REPORT Link L29 Liliana PADURE, Cristian Adam, Laura Fierbinteanu - 12 minutes ATTACHMENT - PROGNOSTIC FACTOR IN MEDICAL RECOVERY Link L30 Prof. Alexandru Vlad Ciurea - 20 minutes MOTILITY OR MORBIDITY IN NEUROSURGERY Link L31 Valerica CREANGA-ZARNESCU, Ana-Maria FATU, Anamaria CIUBARA, Violeta SAPIRA,Aurelia ROMILA, Mihaela LUNGU - 12 minutes EXERCISES PROGRAM AND REHABILITATION IN PARKINSON’S DISEASE Link L32 Irina VERINCEANU,Alice MUNTEANU, Andreea STOICA, Stefan ISPAS - 12 minutes THE CARDIAC REHABILITATION IN PATIENTS WITH ACUTE MYOCARDIAL INFARCTION Link L33 Marius Turnea, Catalin Ionite, Mihai Ilea, Dragos Arotaritei - 12 minutes STATISTICAL ANALYSIS OF PHYSIOTHERAPEUTIC MEANS USED IN THE RECOVERY OF MUSCLE INJURIES IN ATHLETES Link L34 Mihaiela CHICU, Eugen BITERE - 10 minutes THE ROLE OF IL1β IN CARTILAGINOUS DISTRUCTION IN RHEUMATOID ARTHRITIS Link L35 Mihaiela CHICU, Eugen BITERE - 10 minutes THE ROLE OF THE INFLAMMASOMS IN THE PATHOGENESIS OF INFLAMMATORY REACTION Link L36 Q & A – 8 minutes Authors Title Abstract Prof. Dr. Gelu Onose, (Keynote Speaker) Vlad Ciobanu, Corina Sporea - 20 minutes A TOPICAL SYSTEMATIC LITERATURE REVIEW AND REAPPRAISAL ON ESSAYS TOWARDS SYSTEMATIZING CLINICAL ASSESSMENT INSTRUMENTS USED TO EVALUATE NEURO-functional deficits after spinal cord injuries, mainly in adults, including through the ICF(-DH) conceptual framework Link L37 Diana-Elena SERBAN, Aurelian ANGHELESCU, Elena CONSTANTIN, Gelu ONOSE - 12 minutes THE ACQUISITION OF SELF-DEFENSE TECHNIQUES AND PROCEDURES AGAINST THE ACT OF AGGRESSION IN THE PACIENT WITH PARAPLEGIA, WHEEL-CHAIR INDEPENDENT Link L38 Aurelian Anghelescu, Elena Constantin, Anca Sanda Mihaescu, Gelu Onose - 12 minutes “PREVENTION IS CURE, EDUCATION IS ESSENTIAL” - RESPONSIBLE IMPLICATION OF YOUNG PEOPLE IN EDUCATIONAL AND PROPHYLACTIC ACTIONS AGAINST ACCIDENTAL CERVICAL SPINAL CORD INJURY AND SEVERE DISABILITIES BY DIVING IN UNVERIFIED WATERS. Link L39 Alexandra SPORICI, Irina ANGHEL, Lapadat MAGDALENA, Gelu ONOSE - 12 minutes RECOVERABLE RESULTS AT A PATIENT WITH AIS/FRANKEL D INCOMPLETE TETRAPLEGIA / POST SPINAL CORD INJURY BY FALLING FROM A HEIGHT, ON AN ANKYLOSING SPONDYLITIS BACKGROUND Link L40 Ioana ANDONE, Carmen CHIPĂRUȘ, Andreea FRUNZA, Aura SPÎNU, Simona STOICA, Liliana ONOSE, George PATRASCU, Gelu ONOSE -12 minutes CLINICAL, PARACLINICAL ASPECTS AND COMPLEX THERAPEUTICAL APPROACHES IN A PATIENT WITH INCOMPLETE PARAPLEGIA, POST THORACIC MENIGIOMA SURGICALLY TREATED, IN NEUROFIBROMATOSIS CONTEXT Link L41 Cristina Octaviana DAIA, Alina-Elena Gherghiceanu, Helene Ivan, Gelu ONOSE - 12 minutes RESEARCH ON NEUROREHABILITATION RESULTS IN VERTEBRO-MEDULLARY POST-TRAUMATIC CONDITIONS ASSOCIATING FRACTURES, IN A POLITRAMATIC CONTEXT Link L42 Ali-Osman Saglam, Alexandru G. Stavrica, Ana Carmen Albeşteanu, Laura Georgiana Popescu, Luminita Nirlu, Gelu Onose - 12 minutes MEDICAL-REHABILITATION ENDEAVORS, CARE INTERVENTIONS AND CONNOTATIONS OF A MEDICO-SOCIAL TYPE, IN A COMPLEX POLYPATHOLOGICAL CASE: PARAPLEGIA, SPONDYLODISCITIS, KIDNEY FAILURE IN THE HAEMODIALYSIS STAGE AND BILATERAL NEPHROSTOMIES AFTER SURGICALY TREATTED BLADDER NEOPLASM. Link L43 Sorina Petrușan-Dunca, Liviu Lazăr, Tiberiu-Dorin Corha - 12 minutes INDICATIONS AND LIMITIS OF REHABILITATION TREATMENT FOR LUMBAR DISCOPATHY IN PREGNACY Link L44 Q & A – 8 minutes Authors Title Abstract Elena Silvia SHELBY, Mihaela AXENTE, Liliana PĂDURE - 12 minutes CHARCOT MARIE TOOTH DISEASE. CASE PRESENTATION. GENETIC DISEASES WHICH REQUIRE physical rehabilitation Link L45 Link L46 Simona Carniciu - 12 minutes Influence of nutrition and exercise on the use of different energy substrates in the prevention of metabolic diseases Link L81 Simona-Isabelle STOICA, Carmen Elena CHIPĂRUȘ, Magdalena Vasilica LAPADAT, George PĂTRAȘCU, Gelu ONOSE - 12 minutes CLINICAL-THERAPEUTIC AND RECUPERATORY FEATURES IN A PATIENT WITH PLURIPATOLOGY: ISCHEMIC STROKE, ISCHEMIC HEART DISEASE (SECHELAR MYOCARDIAL INFARCTION), CHRONIC KIDNEY DISEASE AND MONSTROUS GOUT- CASE PRESENTATION Link L47 Eugen BITERE, Mihaiela CHICU - 12 minutes PATHOPHYSIOLOGY OF ATHEROGENESIS AND CARDIOVASCULAR RISK IN CHRONIC INFLAMMATORY DISEASES Link L48 Victoria CHIHAI, Alisa TĂBÎRȚĂ, Anastasia ROTĂREANU, Vladlena MIHAILOV, Mihail CÎRÎM - 12 minutes THE IMPACT OF ACTIVE KINETIC PROGRAMS ON CLINICAL AND FUNCTIONAL STATUS ADRESSED TO PEOPLE WITH DIABETIC ANGIOPATHY Link L49 Ana-Maria Fătu, Ana Maria Pâslaru, Valerica Creangă-Zărnescu, Alexandru Nechifor, Mădălina Verenca, Mihaela Lungu, Anamaria Ciubară - 12 minutes THE IMPACT OF COGNITIVE DECLINE ON STROKE REHABILITATION Link L50 Alisa TĂBÎRŢĂ, Victoria CHIHAI - 12 minutes THE USE OF TRINITY AMPUTATION AND PROSTHESIS EXPERIENCE SCALES IN THE COMPLEX REHABILITATION OF PERSONS WITH LOWER LIBM AMPUTATION Link L51 Ilie ONU, Mariana ROTARIU, Elvina MIHALAȘ, Călin CORCIOVĂ - 12 minutes STUDY ON EFFICIENCY OF ELECTROTHERAPY AND PHYSIOTHERAPY MANAGEMENT ON HERNIATED LUMBAR DISC Link L52 María G. Souto Figueroa, Antonio Freire Magariños RESEARCH - SURVEY TO 142 THERMALIST WHO HAVE PERFORMED A THERMAL CURE AT THE BATHS OF BAÑOS DE MOLGAS (OURENSE) AND AUGAS SANTAS (LUGO) - GALICIA – SPAIN Link L53 Q & A – 12 minutes Authors Title Abstract Irina Ionica - 12 minutes ACUPUNCTURE IN REHABILITATION - A GENERAL VIEW Link L54 Denisa COAJĂ, Gabriela DOGARU - 12 minutes THE HEALTH BENEFITS OF FINNISH SAUNA BATHING Link L55 Otilia ROGOVEANU, Florin GHERGHINA , Rodica TRAISTARU - 12 minutes SPINA BIFIDA – FUNCTIONAL REHABILITATION METHODS IN CHILDREN Link L56 Mihaela DUTESCU, Raluca OLTEAN, Petru NENADICI - 12 minutes GEOAGIU BAI RESORT - OUR EXPERIENCE OF MEDICAL REHABILITATION TREATMENT Link L57 Dumitru MIHĂILĂ, SILISTEANU Sinziana Calina, ȚICULEANU Mihaela (Ciurlică) - 12 minutes THE METEOROLOGICAL COMPLEX AND THE HUMAN PATHOLOGY. CASE STUDY – SUCEAVA COUNTY Link L58 Mariana VARODI, Gabriela DOGARU - 12 minutes EFFICACY OF NATURAL THERAPEUTIC FACTORS FROM OCNA SIBIULUI SPA RESORT IN GONARTHROSIS Link L59 Boróka-Panna GÁSPÁR, Gabriela DOGARU - 12 minutes BONE HYDRATION AND MINERAL WATERS Link L60 CALIN BOCHIS, LIVIU LAZAR, HORAȚIU URECHESCU, CARMEN NISTOR-CSEPPENTO, FELICIA CIOARA, NICOLETA PASCALAU, ALIN BOCHIS , DIANA IOVANOVICI - 12 minutes CORRELATION OF VAS PAIN SCORE WITH FUNCTION AT THE PACIENTS WITH TEMPOROMANDIBULAR OSTEOARTHRITIS Link L61 Marian Romeo CALIN, Ileana RADULESCU, Mihaela Antonina CALIN, Elena Roxana ALMASAN - 12 minutes RADIOMETRIC ASSESSMENT OF PELOID AND SALT WATER USED FOR THERAPY AND BALNEARY TRATAMENT FROM TECHIRGHIOL LAKE, ROMANIA Link L62 Q & A – 12 minutes Authors Title Abstract Cristina PETRESCU - 12 minutes EFFICACY NATURAL THERAPEUTIC FACTORS FROM BAILE GOVORA IN BRONCHIAL ASTHMA Link L63 PARASCHIVA POSTOLACHE - 12 minutes PULMONARY REHABILITATION SAVES LIVES AND IMPROVES LIFE Link L64 DOINA-CLEMENTINA COJOCARU, PARASCHIVA POSTOLACHE - 12 minutes ASSESSMENT OF DYSPNEA IN PULMONARY REHABILITATION PRACTICE Link L65 PARASCHIVA POSTOLACHE, CRISTINA LACATUSI - 12 minutes HELIOTHERAPY, CLIMATOTHERAPY AND PATIENTS WITH RESPIRATORY DISEASES Link L66 CONSTANTIN MUNTEANU, DIANA MUNTEANU, MIHAIL HOTETEU - 12 minutes BIOLOGICAL INSIGHTS OF SPELEOTHERAPY Link L67 PARASCHIVA POSTOLACHE, CRISTINA LACATUSI, DOINA-CLEMENTINA COJOCARU - 12 minutes AEROSOLS AND BREATHING Link L68 PARASCHIVA POSTOLACHE, MADALINA ZEBEGA - 12 minutes RESPIRATORY MUSCLE TRAINING AND RESPIRATORY REHABILITATION Link L69 CRISTI FRENȚ, GEORGETA MAIORESCU - 12 minutes DEVELOPMENTS AND INVOLUTIONS OF TOURISM IN THE SPA RESORTS IN ROMANIA AND THE CASE STUDY FOR LACUL SĂRAT RESORT Link L70 Dragos Arotaritei, Andrei Gheorghita, Mariana Rotariu, Marius Turnea - 12 minutes MATHEMATICAL MODEL OF SULPHUR ABSORPTION PROCESS, A POSSIBLE APPLICATION IN CURE WITH SULPHUROUS MINERAL WATER Link L71 Q & A – 12 minutes Authors Title Abstract Mihai Ciocanu, Anișoara Cimil - 12 minutes THE EFFICIENCY OF THE REHABILITATION SERVICE IN HOSPITAL CONDITIONS Link L72 Sinziana Calina SILIȘTEANU, Andrei Emanuel SILIȘTEANU - 12 minutes TRIAL ON THE WATER CONSUMPTION BY THE PERSONS IN THE GROUP AGED 19-30 YEARS Link L73 Liviu Lazăr, Florin Marcu, Felicia Cioară, Carmen Nistor Csepentö - 12 minutes MANAGEMENT OF SPECIAL ARTERIAL DISEASES Link L74 Mihaela-Carmen SUCEVEANU, Paul-Nicolae SUCEVEANU - 12 minutes EVOLUTION OF CARDIOVASCULAR RISK FACTORS AFTER MORE THAN 2 PERIODIC HOSPITALIZATIONS IN THE COVASNA HOSPITAL FOR CARDIOVASCULAR REHABILITATION Link L75 Mihaela DUTESCU, Adina TRAILA, Margit SERBAN, Emilia URSU, Dorina MIU, Ioana MALITA, Bianca CIRESAN - 12 minutes THE EFFICIENCY OF MEDICAL REHABILITATION TREATMENT IN PATIENTS WITH HEMOPHILIA AFTER SURGICAL ORTHOPEDIC INTERVENTIONS - THE EXPERIENCE OF "CRISTIAN SERBAN" BUZIAS CENTER Link L76 Dorin-Gheorghe TRIFF, Simona POP - 12 minutes PRECURSORS OF BALENOLOGY EDUCATION IN ROMANIA Link L77 Dr. Eugenia Dumitrescu, Dr. Carmen Enescu - 12 minutes ANTIALLERGIC PROCEDURES MOST COMMONLY USED IN PHYSICAL RECOVERY MEDICINE AND BALNEOLOGY Link L78 Mihail HOTETEU, Constantin MUNTEANU, Diana MUNTEANU, Gabriela DOGARU - 12 minutes PELOIDS - PERSPECTIVES ON RESEARCH AND FUTURE PLANS Link L79 Liliana Stanciu, Daniela Profir, Viorica Marin, Doinița Oprea, Elena Ionescu, Elena Almășan, Carmen Oprea - 12 minutes THE SCIENCE OF AGING WELL Link L80 Q & A – 12 minutes POSTER SESSION Authors Title Abstract Andra Pintilie, Liliana Pădure, Andrada Mirea, Corina Sporea Proprioceptive Functional Vibration Stimulation as therapeutic tool in spasticity management of jump gait pattern of spastic diplegic children with cerebral palsy Poster 1 Andra Pintilie, Liliana Pădure, Andrada Mirea, Corina Sporea Modern computerized techniques for gait’s functional evaluation through a specialized wireless inertial sensor – premise for orthopedic corrective shoes wear in children with gait disorders secondary to Cerebral Palsy Poster 2 Ana Maria PÂSLARU, Ana Maria FĂTU, Anamaria CIUBARĂ The role of medical recovery in oncology Poster 3 Maria Veronica MORCOV, Liliana PADURE, Cristian Gabriel MORCOV, Gelu ONOSE Exercises availed by sensor-based computer advanced devices: part of the interactive cognitive recovery – adjuvant of the therapy applied in the Centrul National Clinic de Recuperare Neuropsihomotorie Copii “Dr. N. Robanescu” Poster 4 Avram Mihai, Liliana Padure, Gelu Onose Theoretical fundamentals and conceptual premise for advanced proprioceptive and sensory stimulus apparatus, with sequential evaluation for the treatment of the recuperator in the equilibrium disorder, from Cerebral Palsy (PC) casuistry. Poster 5 Andrada MIREA, Gelu ONOSE, Madalina LEANCA, Florin-Petru GRIGORAS, Mihaela AXENTE, Liliana PADURE, Corina SPOREA Respiratory management in patients with rare progressive neuromuscular diseases Poster 6 Mihaela MANDU, Elena CONSTANTIN, Cristinel Dumitru BADIU, Cosmin Daniel OPREA, Cristina DAIA, Gelu ONOSE Presentation od the Fugl Meyer Assesment scale and related suggesttion in order to enhance its level of implementation in inner neurorehabilitation units Poster 7 ALEXANDRU BOGDAN-CĂTĂLIN, ALINA SIMONA ȘOVREA, ANNE-MARIE CONSTANTIN, ADINA BIANCA BOȘCA, CARMEN GEORGIU, MONICA POPA Complex oral rehabilitation in an elderly patient with periodontal disease who exercises regularly Poster 8 Dorin-Gheorghe TRIFF, Simona POP MORBIDITY BY OSTEO-MUSCULO-ARTICULAR DISEASES IN THE OCCUPATIONAL ENVIRONMENT IN MARAMURES COUNTY. THE IMPORTANCE OF MEDICAL RECOVERY AND RECORDS THROUGH ELECTRONIC DATA MANAGEMENT SYSTEMS Poster 9 Authors Title Abstract Mihaela Antonina CALIN, Marian Romeo CALIN, Constantin Munteanu New evidence on the effects of pelotherapy on local microcirculation Poster 10 Izabela Lazar, Gabriela Dogaru The effectiveness of balnear treatment in the management of psoriasis Poster 11 Dorin-Gheorghe TRIFF, Mușata Dacia BOCOȘ CORRELATIONS OF OSTEOMUSCULO-ARTICULAR DISEASES WITH WORK ABILITY, PERCEIVED SELF EFFICACY AND OCCUPATIONAL STRESSORS AT A REGULAR MEDICAL CHECK-UP IN PRE-UNIVERSITY EDUCATION UNITS Poster 12 Doroteea Teoibas-Serban, Valentin Stan, Dan Blendea PREVENTION OF LUMBAR DISC HERNIATION IN YOUNG ADULT POPULATION: A PRACTICAL APPROACH Poster 13 Călin Corciovă, Cătălina Luca, Robert Fuior, Flavia Corciovă Development a Monitoring Device for Arm Rehabilitation Poster 14 Simona Daniela Zavalichi, Marius Andrei Zavalichi, Sorin Stratulat, Florin Mitu Cardiovascular rehabilitation: challenges in a case of acute myocardial infarction and familial hypercholesterolemia Poster 15 Simona-Isabelle STOICA, Ioana TANASE, Gelu ONOSE Influences and consequences resulting in addictions in general and to chronic alcoholism, especially for patients with spinal cord injury Poster 16 Roxana Dumitrascu, Ana Maria Bumbea, Carmen Albu, Otilia Rogoveanu, Catalin Bostina, Rodica Traistaru, Borcan Madalina BIOMECHANICAL DYSFUNCTIONS OF THE FOOT – MAJOR IMPACT ON THE KINETIC CHAIN Poster 17 Otilia Rogoveanu, Gherghina Florin, Caimac Dan, Trifu Ramona, Cruceru Andra, Beldie C Medical rehabilitation in post-stroke spastic hemiparesis in young patients Poster 18 Ana Maria Bumbea, Otilia Rogoveanu, Roxana Dumitrascu, Bogdan Stefan Bumbea, Catalin Bostina, Albu Carmen, Borcan Madalina PERIPHERAL MAGNETIC STIMULATION - A CHALLENGE IN VERTEBRAL POSTTRAUMATIC RECOVERY Poster 19 Authors Title Abstract Dănuţ PĂCURAR, Mihaela Ramona PĂCURAR KNEE ARTHROPLASTY RECOVERY OF AN CANCER PATIENT Poster 20 Dănuţ PĂCURAR, Mihaela Ramona PĂCURAR THE IMPACT OF OSTEOARTICULAR PATHOLOGY IN POSTSTROKE RECOVERY Poster 21 Borcan Madalina, Bumbea Ana Maria, Bostina Catalin, Radoi Georgeta, Bumbea Bogdan EFFICIENT REHABILITATION TREATMENT IN A CASE WITH MAV-RUPTA MALFORMATION Poster 22 Demirgian Sibel, Nan Simona, Lulea Adela, Lascu Ioana, Marin Viorica Is possible the management of synovial chondromatosis of the hip by arthroscopy or complex balneal treament? Poster 23 Mădălina Codruța Verenca, Sorina Mierlan, Claudiu Elisei Tanase The Efficiency of Medical Treatment of Scoliosis – Paediatrics Poster 24 Florentina NASTASE¹, Alin Laurentiu TATU², Madalina Codruta VERENCA¹ Orthopaedic manifestations of Neurofibromatosis type 1 – case report Poster 25 Simona CARNICIU, Anatolie BACIU, Vasile FEDAS The attenuation of energy metabolic misbalance by means of aerobic, hypoxic, hypothermal adaptation and environment optimization at recreation resort center Poster 26 Irina Anghel, Alexandra Sporici, Magdalena Lapadat, Gelu Onose Complex clinical and therapeutic rehabilitation approach of a patient with Complete AIS/Frankel A quadriplegia post cervical spinal cord injury after accidental fall off a trailer and multiple complications occurring during disease progression - case study Poster 27 Ana-Maria Pelin , Monica Georgescu , Cristina Stefanescu , Costinela Georgescu Molecular treatment strategies in osteoporosis Poster 28
APA, Harvard, Vancouver, ISO, and other styles
30

Leung, Linda. "Mobility and Displacement." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2612.

Full text
Abstract:
The paper discusses mobility in the context of displacement. How is the mobile phone appropriated by refugees in immigration detention? What does the mobile phone, and indeed, mobility, signify in an Australian policy landscape of mandatory detention of asylum seekers and formerly prohibited access to mobile phones for detainees inside immigration detention centres? What does this intimate about the perceived dangers of “new” and mobile media? The author’s preliminary research with refugees in Australian immigration detention centres compares policy and practice. Firstly, it interrogates the unwritten policies regulating refugees’ access to media technologies when incarcerated in immigration detention. As there is no written policy on technology access and practices vary across immigration detention centres, the information in this paper has been given by detainees and has not been verified by the management of detention centres. The paper suggests that the utopian promises of mobile media echo those made about cyberspace in the 1990s. Furthermore, the residual effects of such rhetoric have infiltrated government policy in terms of perceiving mobile media as dangerous when adopted by marginalised groups such as refugees. Secondly, the research examines how and why the mobile phone has been adopted by immigration detainees despite their former prohibition. It explores the ways in which refugees practice an imagined mobility through media whilst in detention, and finds that this is critical to sustaining connection with their imagined communities. Why Refugees? In the context of increased forced migration of people due to circumstances such as political instability, war, natural disaster and famine; it is necessary to better understand how refugees mobilise and organise in situations of displacement. As new technologies encourage the capacity for borderlessness, such advantages also have to be contrasted with the potential dangers of spontaneous border crossings. The study of the behaviour and practices of refugees in relation to communication technologies offers an insight into the efficacy of immigration detention policy in filtering movement and interaction, both physical and virtual, between Australia and other countries. Although the study of refugees is a discipline in its own right, there has been minimal examination of how they appropriate technology, particularly that which facilitates and complements their mobility, to maintain connections with their diasporic networks while in situations of displacement. The studies that have been undertaken concentrate on the use of technology by refugees living in the wider community (see Glazebrook, McIver Jr. and Prokosch; Howard and Owens), rather than in the context of detention. In previous research of diasporas within the discipline of Cultural Studies, technology has been regarded as vital to subcultures and minority groups. Technology has been the tool by which such communities respond to their structural conditions (see Cunningham; Hall; Halleck). Such investigations have concentrated on the intersection of class, gender and ethnicity and how they inscribe meanings to specific technologies, which in turn, become intrinsic to the identities of the groups and communities. The research extends the work that has been done within Cultural Studies by similarly focusing on a marginalised group, refugees, and their participation in particular technologies. A review of literature across refugee studies, diaspora studies and technology studies has shown that: The study of technology use by refugees has had minimal investigation The study of diasporas has rarely included refugees The study of communities and communication practices which surround particular technologies has concentrated on groups other than refugees The escalation of issues of asylum and border control in public discourse warrant more knowledge about refugees and their networks of communication beyond the boundaries of detention and Australia The notion of “networks” refers to people, technologies, processes and practices that form the relationships between refugees in institutionalised immigration detention and the outside world. The Australian Immigration Detention Context Between 1992 and 1994, Australian law moved from permitting (but not enforcing) limited detention of asylum seekers, to a blanket policy of mandatory detention (HREOC) which, at one point, had up to 12,000 individuals in detention (Castan Centre for Human Rights Law). The detention context is particularly relevant to Australia, because its policy of mandatory detention means that refugees have restricted contact with the world outside of the detention centre. In 2005, the Migration Amendment (Detention Arrangements) Bill allowed detained families with children to live in community detention, that is, in residential accommodation outside of an immigration detention centre. Although community detention carries with it specific conditions, families are unaccompanied and have more freedom of movement. This paper discusses the author’s preliminary work with refugees in immigration detention, prior to the introduction of community detention. The research sought to investigate how asylum seekers use technology to sustain connections with their virtual communities in situations of displacement. Specifically, it explored how technology is appropriated to mediate communication in the context of institutionalised detention. The key research questions addressed by the research were: what kinds of technologies are available to refugees? How are these used? How are their benefits and limitations perceived? What, if any, kinds of social networks surround these technologies? How are relationships of power surrounding these technologies negotiated? Can technology assist refugees in sustaining connections with their communities of choice and reducing their sense of isolation? Can technology play a role in reducing the well-documented effects of this incarceration by providing mediated social interaction? What are the implications for policy, especially in relation to permitted technologies and surveillance of communication practices? Access to informants was gained by working with a refugee community advocacy group, which has established links with refugees in detention and experience in dealing with the management of detention centres. One such group is ChilOut, which organises visitor programs to immigration detention centres. This affiliation was important in gaining access to, and trust of, detainees who were willing to participate in the research. It presented opportunities to interact with detainees on a social basis. Semi-structured interviews with the research subjects were conducted to ascertain the strategies and resources currently utilised to counter the effects of mandatory detention. In 2005, detainees had access to a range of technology which can be broadly termed “old media”, while access to “new media” – such as the Internet and mobile phones – are prohibited. At the time of printing, detainees reported that mobile phones without cameras were only recently permitted. Detainees have access to pay phones inside the centre. Visitors are allowed to give detainees phone cards so they can use the pay phones without charge or the need for change. In addition to pay phones, detainees are provided with access to a fax and photocopier, which are generally used to liaise with and send relevant documentation to lawyers. There is distrust of using the fax machine at the detention centre because it is in a management office area and the detainees require permission to use it. It means the guards can read the faxes that are sent, as well as those that are received before notifying the detainees that they have received one. Detainees also have television, videos, DVDs and newspapers, so there is the possibility of feeling like part of an imagined community (Anderson) through these media. There are computers available, but no Internet access. Some of the children load computer games on them to play, others have Playstation in their rooms. It is noteworthy that the only technology to which detainees have access and which facilitates real-time person-to-person interaction is the telephone. The phone offers the opportunity for direct contact with the outside world without the visual and other sensory realities of detention. The telephone is able to mask the extent of imprisonment as it does not show the barbed razor wire surrounding the compound. Yet detainees were not permitted to have mobile phones for a long time. Thus, the key question remains: why were they deprived of access to mobile phones while allowed access to pay phones and landlines? What does this suggest about the perceived dangers of mobile media and the resonance of last century’s techno-utopian discourses? Given that detainees were only given access to “old media”, it seems that this tired but resolutely upbeat rhetoric about new technology which celebrates it as inherently liberating actually inflected policies determining the kinds of technologies to which detainees have access. It confirms the pessimistic assertions of media theorists such as Schiller and Mosco, that new technologies further alienate disadvantaged groups. As the Australian government attempts to regulate the physical movement of people across its borders, mantras of the dot.com era such as “everyone is a free agent” (Kumar 77) appear to undermine this agenda. The assumptions of liberty and democracy embedded in this “free agency” are implicit in policies that denied refugees access to “new media” such as the Internet and mobile phones. The “liberating” nature of such technology was regarded as unsafe in the hands of refugees, whose freedom of movement is institutionally contained by the Australian government through mandatory detention. The physical movement of refugees, as well as the agency and freedom with which they can claim asylum in a country, is actively discouraged through immigration detention policy and limitations on access to technology. The promise of self-expression afforded by mobile media seemed antithetical to the prejudicial administration of refugees, which is premised upon a distrust of their claims of identity and asylum. Subsequently, their use of mobile technology was also assumed to be suspect and therefore had to be restricted. Detained refugees serve as a reminder of the parameters of upbeat discourses about new technology. That is, the utopian possibilities of mobile media appear to be conditional such that its “power” can only be entrusted to certain groups. In policy terms, the mobile phone is a rich site of signification. Not only does the technology itself imply a way of being (that is free, mobile, always accessible and always able to access), but it also connotes an ideal type of user, one that is appropriate and deserving of such technology. It seems that refugees are not entitled to their mobility and, therefore, do not have rights to media that is considered to facilitate such mobility, in spite of their detention. Furthermore, there is a suggested dichotomy in the government’s classification of the technologies to which refugees have access. The fact of detention means refugees are surrounded by technology, held captive by it and are inevitably in close proximity to it. It is technology which is seen as antithetical to mobility and therefore could be described as “static”: phones, faxes, photocopiers, television, video – all of which may be characterised as “old media”. The binary opposite of such technology is that which can be regarded as mobile or new or interactive media; that which resonates with the residual effects of 1990s techno-utopian rhetoric; and could be considered as threatening in the hands of those who have physically made unauthorised border crossings. However, prior investigations of “mobile” technologies, demonstrates that such dualisms are flawed as the lowest technologies also have the capacity to facilitate mobility. Examples include Paul Gilroy’s work on the Black Atlantic, which notes that books and records have been vital in carrying oppositional ideologies and philosophies across the black diaspora. Within Asian diasporas, the exchange of video letters and taped Bollywood movies have been interpreted as forms of localised challenges to the centralised power of the broadcast media industries (Ang; Gillespie). These economies of exchange as facilitated by older forms of mobile media have been studied in relation to issues of migration and marginalisation. Given that refugees are also affected by such issues, their mobile media practices are a sobering reminder that mobility is not necessarily hi-tech nor confined to the realms of the affluent, educated and socio-economically advantaged. Rather, mobility can be a tenuous state of being displaced and itinerant, with technology adopted to manage and adapt to its challenges. The Mobile Media Practices of Detained Refugees The initial findings from the fieldwork indicate that for refugees, the mobile phone is not a technology of choice but instead, a technology of necessity and survival. Every technology that is available to them is used to sustain connection to their localized and globalised networks. The restriction to their physical movement of detainees is compensated through use of technology which allows any sort of interaction and communication. Being part of a technologically-mediated community appears to minimise the marginalisation and isolation they experience. Such feelings of dislocation have been well-documented in studies of the impact of incarceration on the mental health of refugees (see Mares and Jureidini; RANZCP; Hodes). It seems that the telephone and fax are the mainstays of their communication networks. However, such technologies are closely monitored, as landline phone calls can be traced or even tapped, and faxes have to be sent from an office manned by guards. An experienced visitor to detention centres commented that “most” detainees had mobile phones and when they were contraband, guards knew about them but generally ignored their use by detainees. Only mobile phones offer the potential for communication to be free from the surveillance by detention centres staff. The ways in which mobile phones are used by detainees is decidedly lo-tech, for example, for communication with family where use of a landline is impractical. One of the detainees said that he speaks to his wife and children on the centre pay phone every few days. However, the call costs are expensive as his family only has a mobile phone, not a landline, at their place of residence. For them to call him is also expensive and awkward, because they have to call the pay phone and if somebody answers, they have then to locate him somewhere within the compound. Thus, the connections between the detainees and their loved ones are very fragile in that they are almost totally dependent on the phone to maintain these relationships. In this instance, the mobile phone offers another means for managing the tenuous nature of these ties. The mobile phone, particularly SMS technology, offers a suitable alternative as the detainee can communicate with his family cheaply and quickly. It compensates for the constraints of the pay phone. The informal interactions afforded by the mobile phone also extend beyond family members of detainees to their supporters and advocates. Likewise, the mobile phone complements the communication practices facilitated through permitted technologies. For example, when detainees are liaising with the Department of Immigration (DIMIA), they will ask advice from the regular visitors to the immigration detention centre who come from an array of organizations such as churches, refugee advocacy groups, law firms and health organizations. Visitors generally offer whatever assistance they can by obtaining necessary forms from the department, searching the Internet, undertaking letter writing campaigns, and lobbying government ministers. Something worked in amongst all the network activity that took place over the course of this week. As promised to the family, I scoured the DIMIA web site for a form for applying under Section 417. While there didn’t seem to be an official form, I used the opportunity to research the section of the Migration Act. Googling turned up a 12 page “guide to section 417 applications” written by a barrister, which I printed out and faxed to them. So as to ensure that the family received the fax, I SMS-ed them to let them know a fax was on its way and how many pages to expect. They responded to me by fax, saying that they had been notified that they too were going to be released into community detention in the coming weeks. (Extract from fieldwork diary) The mobile phone serves the function of anticipating and verifying communications which may potentially be surveilled by staff of detention centres. Where detainees may not trust that they are being given all the letters or faxes that have been sent to them, the mobile phone enables a degree of privacy so that they at least know what to expect from their correspondents. Furthermore, it provides the opportunity for detainees to speak about matters related to their case for asylum that are regarded as too sensitive to risk being discussed in a public place such as on the centre pay phone. Often this involves seeking assistance with their application for asylum. He rang T on the centre pay phone and said that he would like to speak with me, but did not have my number. He didn’t have a pen and paper to jot down my details at the time, so he gave T his mobile number and asked her to pass it onto me, so I could ring him on it. When I rang, he had returned to his room where he could talk freely. He told me about the visit from the Commonwealth Ombudsman, who undertook to look into his case over the next couple of weeks. We talked about what would assist the Ombudsman in reviewing the case. I said I would write a letter or email in the first instance, and if he wanted other letters of support, I could circulate details of his case on the ChilOut newsletter. He said he didn’t want publicity at this stage. I offered to fax him a copy of my email, but he preferred that I give it to him in person as the fax machine in the office was too public and any documents received could be read. Again, the mobile seems to be the most appropriate technology for coordinating and organising privately away from centre surveillance… (Extract from fieldwork diary) Fear of breaches of confidentiality form only part of detainees’ desire for privacy from detention centre staff. There is also a need for private space away from other detainees as their imprisonment necessitates the constant use of communal facilities such as the pay phone. In addition to being used for its capacity for private communication, the mobile phone was also exploited as a broadcast technology by detained refugees. Text messages proved an effective way of providing brief updates to family and friends about the status of their case: 20 September 200510:24:07 Hi Linda. I am fine thank u. not news yet, I think they’ll come to see me soon, if I got news, I’ll let u know. Wish u have a good time. 15 October 200516:31:49 HI Linda, I was interview by Ombudsman yesterday, we talked about one hour and a half, it sound good…Thank u for yr concern 25 December 200520:26:54 Hi Linda. I am still in [detention centre]. No any news from Ombudsman, may be early next year. I am fine here, thanks. Tuesday 17 October 200613:44:41 Hi Linda…I transferd to [community] housing. Its much better here. How a u? takecare ur health, thanks. Thursday 16 November 200618:46:23 HI There is a good news to let u know I got the decision from that I won the FC case. Thus, for detained refugees, the mobile phone has been adopted for simple, lo-tech use. None of the respondents indicated a desire for a camera function on their mobile phones. However, one detainee did suggest that she would like to use a webcam to see and hear her child in China, whom she has not seen in eight years. While she did use the Internet for this purpose when she was on the “outside”, now she can only rely on weekly telephone conversations made from inside the detention centre. Conclusion What happens when technology is placed in the hands of those for whom it was never meant? It makes explicit what is often implied in studies of adoption of new technology, that the “utopian promise” is confined to a narrow socio-economic demographic: the advantaged, the affluent and the educated. Those who fall outside these perimeters are perceived as undeserving and untrustworthy of such technology. This is exemplified in the Australian government’s policy to deny refugees access to “new” and mobile media whilst being compulsorily detained. The decision to withhold mobile technology from mobile communities who are not so materially privileged is not only ironic but unwarranted in light of the empirical data. This has since been acknowledged by allowing detainees use of mobile phones. The mobile phone practices of detained refugees show that it is being used as a complementary and alternative technology, that is, to compensate for the inadequacies of the communication media allowed by detention centres. The mobile phone is exploited for the functions that permitted technologies do not offer: firstly, the ability to communicate with friends and family more immediately and effectively; secondly, the capacity to communicate privately with less probability of surveillance; thirdly, the opportunity to broadcast content one to many. In such communications, use of the mobile phone is simple and lo-tech: it is deployed for straightforward (but improved) interaction with detainees’ imagined communities which would otherwise be possible anyway through the “old” media technologies provided in detention. In practice, there was no evidence of the use of the hi-tech functions of mobile phones; nor was there any indication, as implied by policy, of the possible dangers that may ensue if such features of mobile media were available to detained refugees. Potentially, the research can impact on immigration detention policy, particularly in terms of reviewing the conditions under which technology is made available to refugees in institutionalised detention contexts. However, further research is required, especially a comparison of the former prohibited use of mobile media in immigration detention centres with the permitted use of these in community immigration detention. References Anderson, Benedict. Imagined Communities. London: Verso, 1993. Ang, Ien. Living Room Wars: Rethinking Media Audiences for a Postmodern World. London: Routledge, 1996. Castan Centre for Human Rights Law. 2003. “Detention, Children and Asylum Seekers: A Comparative Study.” Submission to the National Inquiry into Children in Immigration Detention. 26 July 2004. http://www.hreoc.gov.au/human_rights/children_detention/ submissions/castan.html>. Cunningham, Stuart. “Popular Media as Public ‘Sphericules’ for Diasporic Communities.” International Journal of Cultural Studies 4.2 (2001): 131-147. Gillespie, Marie. Television, Ethnicity and Cultural Change. London: Routledge, 1995. Gilroy, Paul. There Ain’t no Black in the Union Jack. London: Hutchison, 1987. Glazebrook, Diana. “Becoming Mobile after Detention.” Social Analysis: International Journal of Cultural and Social Practice 48.3 (2004). Hall, Stuart. “Aspirations and Attitude… Reflections on Black Britain in the 90s.” New Formations: Frontlines, Backyards. London: Lawrence and Wishart, 1998. Halleck, Dee. “Watch Out Dick Tracy! Popular Video in the Wake of Exxon Valdez.” Technoculture. Eds. Constance Penley and Andrew Ross. Minneapolis: U of Minnesota P, 1991. Hodes, Matthew. “Three Key Issues for Young Refugees’ Mental Health.” Transcultural Psychiatry 39.2 (2002): 196-213. Howard, Ellen, and Christine Owens. “Using the Internet to Communicate with Immigrant/Refugee Communities about Health.” Poster presentation at JCDL ‘02, Portland, Oregon, 13-17 July 2002. Human Rights and Equal Opportunity Commission (HREOC). “A Last Resort?” Report on National Inquiry into Children in Immigration Detention. 26 July 2004. http://www.hreoc.gov.au/human_rights/children_detention/ submissions/castan.html>. Kumar, Amitava. “Temporary Access: The Indian H-1B Worker in the US.” Technicolor: Race, Technology and Everyday Life. Eds. Alondra Nelson and Thuy Linh Tu. New York: NYU P, 2001. Mares, Sarah, and Jon Jureidini. “Children and Families Referred from a Remote Immigration Detention Centre.” Forgotten Rights – Responding to the Crisis of Asylum Seeker Health Care: A National Summit. 12 Nov. 2003. McIver, William, and Arthur Prokosch. “Towards a Critical Approach to Examining the Digital Divide”. IEEE, 2002. Mosco, Vincent. Pushbutton Fantasies: Critical Perspectives in Videotex and Information Technology. Norwood: Ablex, 1982. Royal Australian and New Zealand College of Psychiatrists. “RANZCP Airs Deep Concern at the Mandatory Detention of Child Asylum Seekers.” Media release, 11 Nov. 2003. Schiller, Herbert. Information Inequality: The Deepening Social Crisis in America. London: Routledge, 1996. Citation reference for this article MLA Style Leung, Linda. "Mobility and Displacement: Refugees' Mobile Media Practices in Immigration Detention." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/10-leung.php>. APA Style Leung, L. (Mar. 2007) "Mobility and Displacement: Refugees' Mobile Media Practices in Immigration Detention," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/10-leung.php>.
APA, Harvard, Vancouver, ISO, and other styles
31

Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2696.

Full text
Abstract:
Introduction It has frequently been noted that ICTs and social networking applications have blurred the once-clear boundary between work, leisure and entertainment, just as they have collapsed the distinction between public and private space. While each individual has a sense of what “home” means, both in terms of personal experience and more conceptually, the following three examples of online interaction (based on participants’ interest, or involvement, in activities traditionally associated with the home: pet care, craft and cooking) suggest that the utilisation of online communication technologies can lead to refined and extended definitions of what “home” is. These examples show how online communication can assist in meeting the basic human needs for love, companionship, shelter and food – needs traditionally supplied by the home environment. They also provide individuals with a considerably expanded range of opportunities for personal expression and emotional connection, as well as creative and commercial production, than that provided by the purely physical (and, no doubt, sometimes isolated and isolating) domestic environment. In this way, these case studies demonstrate the interplay and melding of physical and virtual “home” as domestic practices leach from the most private spaces of the physical home into the public space of the Internet (for discussion, see Gorman-Murray, Moss, and Rose). At the same time, online interaction can assert an influence on activity within the physical space of the home, through the sharing of advice about, and modeling of, domestic practices and processes. A Dog’s (Virtual) Life The first case study primarily explores the role of online communities in the formation and expression of affective values and personal identity – as traditionally happens in the domestic environment. Garber described the 1990s as “the decade of the dog” (20), citing a spate of “new anthropomorphic” (22) dog books, Internet “dog chat” sites, remakes of popular classics such as Lassie Come Home, dog friendly urban amenities, and the meteoric rise of services for pampered pets (28-9). Loving pets has become a lifestyle and culture, witnessed and commodified in Pet Superstores as well as in dog collectables and antiques boutiques, and in publications like The Bark (“the New Yorker of Dog Magazines”) and Clean Run, the international agility magazine, Website, online book store and information gateway for agility products and services. Available online resources for dog lovers have similarly increased rapidly during the decade since Garber’s book was published, with the virtual world now catering for serious hobby trainers, exhibitors and professionals as well as the home-based pet lover. At a recent survey, Yahoo Groups – a personal communication portal that facilitates social networking, in this case enabling users to set up electronic mailing lists and Internet forums – boasted just over 9,600 groups servicing dog fanciers and enthusiasts. The list Dogtalk is now an announcement only mailing list, but was a vigorous discussion forum until mid-2006. Members of Dogtalk were Australian-based “clicker-trainers”, serious hobbyist dog trainers, many of whom operated micro-businesses providing dog training or other pet-related services. They shared an online community, but could also engage in “flesh-meets” at seminars, conferences and competitive dog sport meets. An author of this paper (Rutherford) joined this group two years ago because of her interest in clicker training. Clicker training is based on an application of animal learning theory, particularly psychologist E. F. Skinner’s operant conditioning, so called because of the trademark use of a distinctive “click” sound to mark a desired behaviour that is then rewarded. Clicker trainers tend to dismiss anthropomorphic pack theory that positions the human animal as fundamentally opposed to non-human animals and, thus, foster a partnership (rather than a dominator) mode of social and learning relationships. Partnership and nurturance are common themes within the clicker community (as well as in more traditional “home” locations); as is recognising and valuing the specific otherness of other species. Typically, members regard their pets as affective equals or near-equals to the human animals that are recognised members of their kinship networks. A significant function of the episodic biographical narratives and responses posted to this list was thus to affirm and legitimate this intra-specific kinship as part of normative social relationship – a perspective that is not usually validated in the general population. One of the more interesting nexus that evolved within Dogtalk links the narrativisation of the pet in the domestic sphere with the pictorial genre of the family album. Emergent technologies, such as digital cameras together with Web-based image manipulation software and hosting (as provided by portals like Photobucket and Flickr ) democratise high quality image creation and facilitate the sharing of these images. Increasingly, the Dogtalk list linked to images uploaded to free online galleries, discussed digital image composition and aesthetics, and shared technical information about cameras and online image distribution. Much of this cultural production and circulation was concerned with digitally inscribing particular relationships with individual animals into cultural memory: a form of family group biography (for a discussion of the family photograph as a display of extended domestic space, see Rose). The other major non-training thread of the community involves the sharing and witnessing of the trauma suffered due to the illness and loss of pets. While mourning for human family members is supported in the off-line world – with social infrastructure, such as compassionate leave and/or bereavement counselling, part of professional entitlements – public mourning for pets is not similarly supported. Yet, both cultural studies (in its emphasis on cultural memory) and trauma theory have highlighted the importance of social witnessing, whereby traumatic memories must be narratively integrated into memory and legitimised by the presence of a witness in order to loosen their debilitating hold (Felman and Laub 57). Postings on the progress of a beloved animal’s illness or other misfortune and death were thus witnessed and affirmed by other Dogtalk list members – the sick or deceased pet becoming, in the process, a feature of community memory, not simply an individual loss. In terms of such biographical narratives, memory and history are not identical: “Any memories capable of being formed, retained or articulated by an individual are always a function of socially constituted forms, narratives and relations … Memory is always subject to active social manipulation and revision” (Halbwachs qtd. in Crewe 75). In this way, emergent technologies and social software provide sites, akin to that of physical homes, for family members to process individual memories into cultural memory. Dogzonline, the Australian Gateway site for purebred dog enthusiasts, has a forum entitled “Rainbow Bridge” devoted to textual and pictorial memorialisation of deceased pet dogs. Dogster hosts the For the Love of Dogs Weblog, in which images and tributes can be posted, and also provides links to other dog oriented Weblogs and Websites. An interesting combination of both therapeutic narrative and the commodification of affect is found in Lightning Strike Pet Loss Support which, while a memorial and support site, also provides links to the emerging profession of pet bereavement counselling and to suppliers of monuments and tributary urns for home or other use. loobylu and Narratives of Everyday Life The second case study focuses on online interactions between craft enthusiasts who are committed to the production of distinctive objects to decorate and provide comfort in the home, often using traditional methods. In the case of some popular craft Weblogs, online conversations about craft are interspersed with, or become secondary to, the narration of details of family life, the exploration of important life events or the recording of personal histories. As in the previous examples, the offering of advice and encouragement, and expressions of empathy and support, often characterise these interactions. The loobylu Weblog was launched in 2001 by illustrator and domestic crafts enthusiast Claire Robertson. Robertson is a toy maker and illustrator based in Melbourne, Australia, whose clients have included prominent publishing houses, magazines and the New York Public Library (Robertson “Recent Client List” online). She has achieved a measure of public recognition: her loobylu Weblog has won awards and been favourably commented upon in the Australian press (see Robertson “Press for loobylu” online). In 2005, an article in The Age placed Robertson in the context of a contemporary “craft revolution”, reporting her view that this “revolution” is in “reaction to mass consumerism” (Atkinson online). The hand-made craft objects featured in Robertson’s Weblogs certainly do suggest engagement with labour-intensive pursuits and the construction of unique objects that reject processes of mass production and consumption. In this context, loobylu is a vehicle for the display and promotion of Robertson’s work as an illustrator and as a craft practitioner. While skills-based, it also, however, promotes a family-centred lifestyle; it advocates the construction by hand of objects designed to enhance the appearance of the family home and the comfort of its inhabitants. Its specific subject matter extends to related aspects of home and family as, in addition to instructions, ideas and patterns for craft, the Weblog features information on commercially available products for home and family, recipes, child rearing advice and links to 27 other craft and other sites (including Nigella Lawson’s, discussed below). The primary member of its target community is clearly the traditional homemaker – the mother – as well as those who may aspire to this role. Robertson does not have the “celebrity” status of Lawson and Jamie Oliver (discussed below), nor has she achieved their market saturation. Indeed, Robertson’s online presence suggests a modest level of engagement that is placed firmly behind other commitments: in February 2007, she announced an indefinite suspension of her blog postings so that she could spend more time with her family (Robertson loobylu 17 February 2007). Yet, like Lawson and Oliver, Robertson has exploited forms of domestic competence traditionally associated with women and the home, and the non-traditional medium of the Internet has been central to her endeavours. The content of the loobylu blog is, unsurprisingly, embedded in, or an accessory to, a unifying running commentary on Robertson’s domestic life as a parent. Miles, who has described Weblogs as “distributed documentaries of the everyday” (66) sums this up neatly: “the weblogs’ governing discursive quality is the manner in which it is embodied within the life world of its author” (67). Landmark family events are narrated on loobylu and some attract deluges of responses: the 19 June 2006 posting announcing the birth of Robertson’s daughter Lily, for example, drew 478 responses; five days later, one describing the difficult circumstances of her birth drew 232 comments. All of these comments are pithy, with many being simple empathetic expressions or brief autobiographically based commentaries on these events. Robertson’s news of her temporary retirement from her blog elicited 176 comments that both supported her decision and also expressed a sense of loss. Frequent exclamation marks attest visually to the emotional intensity of the responses. By narrating aspects of major life events to which the target audience can relate, the postings represent a form of affective mass production and consumption: they are triggers for a collective outpouring of largely homogeneous emotional reaction (joy, in the case of Lily’s birth). As collections of texts, they can be read as auto/biographic records, arranged thematically, that operate at both the individual and the community levels. Readers of the family narratives and the affirming responses to them engage in a form of mass affirmation and consumerism of domestic experience that is easy, immediate, attractive and free of charge. These personal discourses blend fluidly with those of a commercial nature. Some three weeks after loobylu announced the birth of her daughter, Robertson shared on her Weblog news of her mastitis, Lily’s first smile and the family’s favourite television programs at the time, information that many of us would consider to be quite private details of family life. Three days later, she posted a photograph of a sleeping baby with a caption that skilfully (and negatively) links it to her daughter: “Firstly – I should mention that this is not a photo of Lily”. The accompanying text points out that it is a photo of a baby with the “Zaky Infant Sleeping Pillow” and provides a link to the online pregnancystore.com, from which it can be purchased. A quotation from the manufacturer describing the merits of the pillow follows. Robertson then makes a light-hearted comment on her experiences of baby-induced sleep-deprivation, and the possible consequences of possessing the pillow. Comments from readers also similarly alternate between the personal (sharing of experiences) to the commercial (comments on the product itself). One offshoot of loobylu suggests that the original community grew to an extent that it could support specialised groups within its boundaries. A Month of Softies began in November 2004, describing itself as “a group craft project which takes place every month” and an activity that “might give you a sense of community and kinship with other similar minded crafty types across the Internet and around the world” (Robertson A Month of Softies online). Robertson gave each month a particular theme, and readers were invited to upload a photograph of a craft object they had made that fitted the theme, with a caption. These were then included in the site’s gallery, in the order in which they were received. Added to the majority of captions was also a link to the site (often a business) of the creator of the object; another linking of the personal and the commercial in the home-based “cottage industry” sense. From July 2005, A Month of Softies operated through a Flickr site. Participants continued to submit photos of their craft objects (with captions), but also had access to a group photograph pool and public discussion board. This extension simulates (albeit in an entirely visual way) the often home-based physical meetings of craft enthusiasts that in contemporary Australia take the form of knitting, quilting, weaving or other groups. Chatting with, and about, Celebrity Chefs The previous studies have shown how the Internet has broken down many barriers between what could be understood as the separate spheres of emotional (that is, home-based private) and commercial (public) life. The online environment similarly enables the formation and development of fan communities by facilitating communication between those fans and, sometimes, between fans and the objects of their admiration. The term “fan” is used here in the broadest sense, referring to “a person with enduring involvement with some subject or object, often a celebrity, a sport, TV show, etc.” (Thorne and Bruner 52) rather than focusing on the more obsessive and, indeed, more “fanatical” aspects of such involvement, behaviour which is, increasingly understood as a subculture of more variously constituted fandoms (Jenson 9-29). Our specific interest in fandom in relation to this discussion is how, while marketers and consumer behaviourists study online fan communities for clues on how to more successfully market consumer goods and services to these groups (see, for example, Kozinets, “I Want to Believe” 470-5; “Utopian Enterprise” 67-88; Algesheimer et al. 19-34), fans regularly subvert the efforts of those urging consumer consumption to utilise even the most profit-driven Websites for non-commercial home-based and personal activities. While it is obvious that celebrities use the media to promote themselves, a number of contemporary celebrity chefs employ the media to construct and market widely recognisable personas based on their own, often domestically based, life stories. As examples, Jamie Oliver and Nigella Lawson’s printed books and mass periodical articles, television series and other performances across a range of media continuously draw on, elaborate upon, and ultimately construct their own lives as the major theme of these works. In this, these – as many other – celebrity chefs draw upon this revelation of their private lives to lend authenticity to their cooking, to the point where their work (whether cookbook, television show, advertisement or live chat room session with their fans) could be described as “memoir-illustrated-with-recipes” (Brien and Williamson). This generic tendency influences these celebrities’ communities, to the point where a number of Websites devoted to marketing celebrity chefs as product brands also enable their fans to share their own life stories with large readerships. Oliver and Lawson’s official Websites confirm the privileging of autobiographical and biographical information, but vary in tone and approach. Each is, for instance, deliberately gendered (see Hollows’ articles for a rich exploration of gender, Oliver and Lawson). Oliver’s hip, boyish, friendly, almost frantic site includes the what are purported-to-be self-revelatory “Diary” and “About me” sections, a selection of captioned photographs of the chef, his family, friends, co-workers and sponsors, and his Weblog as well as footage streamed “live from Jamie’s phone”. This self-revelation – which includes significant details about Oliver’s childhood and his domestic life with his “lovely girls, Jools [wife Juliette Norton], Poppy and Daisy” – completely blurs the line between private life and the “Jamie Oliver” brand. While such revelation has been normalised in contemporary culture, this practice stands in great contrast to that of renowned chefs and food writers such as Elizabeth David, Julia Child, James Beard and Margaret Fulton, whose work across various media has largely concentrated on food, cooking and writing about cooking. The difference here is because Oliver’s (supposedly private) life is the brand, used to sell “Jamie Oliver restaurant owner and chef”, “Jamie Oliver cookbook author and TV star”, “Jamie Oliver advertising spokesperson for Sainsbury’s supermarket” (from which he earns an estimated £1.2 million annually) (Meller online) and “Jamie Oliver social activist” (made MBE in 2003 after his first Fifteen restaurant initiative, Oliver was named “Most inspiring political figure” in the 2006 Channel 4 Political Awards for his intervention into the provision of nutritious British school lunches) (see biographies by Hildred and Ewbank, and Smith). Lawson’s site has a more refined, feminine appearance and layout and is more mature in presentation and tone, featuring updates on her (private and public) “News” and forthcoming public appearances, a glamorous selection of photographs of herself from the past 20 years, and a series of print and audio interviews. Although Lawson’s children have featured in some of her television programs and her personal misfortunes are well known and regularly commented upon by both herself and journalists (her mother, sister and husband died of cancer) discussions of these tragedies, and other widely known aspects of her private life such as her second marriage to advertising mogul Charles Saatchi, is not as overt as on Oliver’s site, and the user must delve to find it. The use of Lawson’s personal memoir, as sales tool, is thus both present and controlled. This is in keeping with Lawson’s professional experience prior to becoming the “domestic goddess” (Lawson 2000) as an Oxford graduated journalist on the Spectator and deputy literary editor of the Sunday Times. Both Lawson’s and Oliver’s Websites offer readers various ways to interact with them “personally”. Visitors to Oliver’s site can ask him questions and can access a frequently asked question area, while Lawson holds (once monthly, now irregularly) a question and answer forum. In contrast to this information about, and access to, Oliver and Lawson’s lives, neither of their Websites includes many recipes or other food and cooking focussed information – although there is detailed information profiling their significant number of bestselling cookbooks (Oliver has published 8 cookbooks since 1998, Lawson 5 since 1999), DVDs and videos of their television series and one-off programs, and their name branded product lines of domestic kitchenware (Oliver and Lawson) and foodstuffs (Oliver). Instruction on how to purchase these items is also featured. Both these sites, like Robertson’s, provide various online discussion fora, allowing members to comment upon these chefs’ lives and work, and also to connect with each other through posted texts and images. Oliver’s discussion forum section notes “this is the place for you all to chat to each other, exchange recipe ideas and maybe even help each other out with any problems you might have in the kitchen area”. Lawson’s front page listing states: “You will also find a moderated discussion forum, called Your Page, where our registered members can swap ideas and interact with each other”. The community participants around these celebrity chefs can be, as is the case with loobylu, divided into two groups. The first is “foodie (in Robertson’s case, craft) fans” who appear to largely engage with these Websites to gain, and to share, food, cooking and craft-related information. Such fans on Oliver and Lawson’s discussion lists most frequently discuss these chefs’ television programs and books and the recipes presented therein. They test recipes at home and discuss the results achieved, any problems encountered and possible changes. They also post queries and share information about other recipes, ingredients, utensils, techniques, menus and a wide range of food and cookery-related matters. The second group consists of “celebrity fans” who are attracted to the chefs (as to Robertson as craft maker) as personalities. These fans seek and share biographical information about Oliver and Lawson, their activities and their families. These two areas of fan interest (food/cooking/craft and the personal) are not necessarily or always separated, and individuals can be active members of both types of fandoms. Less foodie-orientated users, however (like users of Dogtalk and loobylu), also frequently post their own auto/biographical narratives to these lists. These narratives, albeit often fragmented, may begin with recipes and cooking queries or issues, but veer off into personal stories that possess only minimal or no relationship to culinary matters. These members also return to the boards to discuss their own revealed life stories with others who have commented on these narratives. Although research into this aspect is in its early stages, it appears that the amount of public personal revelation either encouraged, or allowed, is in direct proportion to the “open” friendliness of these sites. More thus are located in Oliver’s and less in Lawson’s, and – as a kind of “control” in this case study, but not otherwise discussed – none in that of Australian chef Neil Perry, whose coolly sophisticated Website perfectly complements Perry’s professional persona as the epitome of the refined, sophisticated and, importantly in this case, unapproachable, high-end restaurant chef. Moreover, non-cuisine related postings are made despite clear directions to the contrary – Lawson’s site stating: “We ask that postings are restricted to topics relating to food, cooking, the kitchen and, of course, Nigella!” and Oliver making the plea, noted above, for participants to keep their discussions “in the kitchen area”. Of course, all such contemporary celebrity chefs are supported by teams of media specialists who selectively construct the lives that these celebrities share with the public and the postings about others’ lives that are allowed to remain on their discussion lists. The intersection of the findings reported above with the earlier case studies suggests, however, that even these most commercially-oriented sites can provide a fruitful data regarding their function as home-like spaces where domestic practices and processes can be refined, and emotional relationships formed and fostered. In Summary As convergence results in what Turow and Kavanaugh call “the wired homestead”, our case studies show that physically home-based domestic interests and practices – what could be called “home truths” – are also contributing to a refiguration of the private/public interplay of domestic activities through online dialogue. In the case of Dogtalk, domestic space is reconstituted through virtual spaces to include new definitions of family and memory. In the case of loobylu, the virtual interaction facilitates a development of craft-based domestic practices within the physical space of the home, thus transforming domestic routines. Jamie Oliver’s and Nigella Lawson’s sites facilitate development of both skills and gendered identities by means of a bi-directional nexus between domestic practices, sites of home labour/identity production and public media spaces. As participants modify and redefine these online communities to best suit their own needs and desires, even if this is contrary to the stated purposes for which the community was instituted, online communities can be seen to be domesticated, but, equally, these modifications demonstrate that the activities and relationships that have traditionally defined the home are not limited to the physical space of the house. While virtual communities are “passage points for collections of common beliefs and practices that united people who were physically separated” (Stone qtd in Jones 19), these interactions can lead to shared beliefs, for example, through advice about pet-keeping, craft and cooking, that can significantly modify practices and routines in the physical home. Acknowledgments An earlier version of this paper was presented at the Association of Internet Researchers’ International Conference, Brisbane, 27-30 September 2006. The authors would like to thank the referees of this article for their comments and input. Any errors are, of course, our own. References Algesheimer, R., U. Dholake, and A. Herrmann. “The Social Influence of Brand Community: Evidence from European Car Clubs”. Journal of Marketing 69 (2005): 19-34. Atkinson, Frances. “A New World of Craft”. The Age (11 July 2005). 28 May 2007 http://www.theage.com.au/articles/2005/07/10/1120934123262.html>. Brien, Donna Lee, and Rosemary Williamson. “‘Angels of the Home’ in Cyberspace: New Technologies and Biographies of Domestic Production”. Paper. Biography and New Technologies conference. Humanities Research Centre, Australian National University, Canberra, ACT. 12-14 Sep. 2006. Crewe, Jonathan. “Recalling Adamastor: Literature as Cultural Memory in ‘White’ South Africa”. In Acts of Memory: Cultural Recall in the Present, eds. Mieke Bal, Jonathan Crewe, and Leo Spitzer. Hanover, NH: Dartmouth College, 1999. 75-86. Felman, Shoshana, and Dori Laub. Testimony: Crises of Witnessing in Literature, Psychoanalysis, and History. New York: Routledge, 1992. Garber, Marjorie. Dog Love. New York: Touchstone/Simon and Schuster, 1996. Gorman-Murray, Andrew. “Homeboys: Uses of Home by Gay Australian Men”. Social and Cultural Geography 7.1 (2006): 53-69. Halbwachs, Maurice. On Collective Memory. Trans. Lewis A. Closer. Chicago: U of Chicago P, 1992. Hildred, Stafford, and Tim Ewbank. Jamie Oliver: The Biography. London: Blake, 2001. Hollows, Joanne. “Feeling like a Domestic Goddess: Post-Feminism and Cooking.” European Journal of Cultural Studies 6.2 (2003): 179-202. ———. “Oliver’s Twist: Leisure, Labour and Domestic Masculinity in The Naked Chef.” International Journal of Cultural Studies 6.2 (2003): 229-248. Jenson, J. “Fandom as Pathology: The Consequences of Characterization”. The Adoring Audience; Fan Culture and Popular Media. Ed. L. A. Lewis. New York, NY: Routledge, 1992. 9-29. Jones, Steven G., ed. Cybersociety, Computer-Mediated Communication and Community. Thousand Oaks, CA: Sage, 1995. Kozinets, R.V. “‘I Want to Believe’: A Netnography of the X’Philes’ Subculture of Consumption”. Advances in Consumer Research 34 (1997): 470-5. ———. “Utopian Enterprise: Articulating the Meanings of Star Trek’s Culture of Consumption.” Journal of Consumer Research 28 (2001): 67-88. Lawson, Nigella. How to Be a Domestic Goddess: Baking and the Art of Comfort Cooking. London: Chatto and Windus, 2000. Meller, Henry. “Jamie’s Tips Spark Asparagus Shortages”. Daily Mail (17 June 2005). 21 Aug. 2007 http://www.dailymail.co.uk/pages/live/articles/health/dietfitness.html? in_article_id=352584&in_page_id=1798>. Miles, Adrian. “Weblogs: Distributed Documentaries of the Everyday.” Metro 143: 66-70. Moss, Pamela. “Negotiating Space in Home Environments: Older Women Living with Arthritis.” Social Science and Medicine 45.1 (1997): 23-33. Robertson, Claire. Claire Robertson Illustration. 2000-2004. 28 May 2007 . Robertson, Claire. loobylu. 16 Feb. 2007. 28 May 2007 http://www.loobylu.com>. Robertson, Claire. “Press for loobylu.” Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/press.html>. Robertson, Claire. A Month of Softies. 28 May 2007. 21 Aug. 2007 . Robertson, Claire. “Recent Client List”. Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/clients.html>. Rose, Gillian. “Family Photographs and Domestic Spacings: A Case Study.” Transactions of the Institute of British Geographers NS 28.1 (2003): 5-18. Smith, Gilly. Jamie Oliver: Turning Up the Heat. Sydney: Macmillian, 2006. Thorne, Scott, and Gordon C. Bruner. “An Exploratory Investigation of the Characteristics of Consumer Fanaticism.” Qualitative Market Research: An International Journal 9.1 (2006): 51-72. Turow, Joseph, and Andrea Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, MA: MIT Press, 2003. Citation reference for this article MLA Style Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/10-brien.php>. APA Style Brien, D., L. Rutherford, and R. Williamson. (Aug. 2007) "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/10-brien.php>.
APA, Harvard, Vancouver, ISO, and other styles
32

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography