Academic literature on the topic 'HT. Web 2.0, Social networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'HT. Web 2.0, Social networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "HT. Web 2.0, Social networks"

1

Andreica, I., I. Roman, X. Baraliakos, U. Kiltz, and J. Braun. "AB1190 SOURCES OF INFORMATION ABOUT SARS-CoV-2 USED BY PATIENTS WITH CHRONIC INFLAMMATORY RHEUMATIC DISEASES (CIRD)." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 1710.1–1710. http://dx.doi.org/10.1136/annrheumdis-2022-eular.5288.

Full text
Abstract:
BackgroundPatients with chronic inflammatory rheumatic diseases (CIRD) may be at increased risk of Corona Virus Disease 2019 (COVID-19).1 The quality of information obtained plays a crucial role for patients’ decision to be vaccinated. Knowing patients’ needs for information and which sources are used is important for the management of CIRD patients by rheumatologists and other physicians.ObjectivesTo identify main sources of information on SARS-CoV-2 used by patients with CIRD and to analyze their influence on opinions and willingness to be vaccinated.MethodsCIRD patients presenting to our tertiary rheumatology hospital were, after informed consent, consecutively included in the study once the vaccination campaign in Germany had started, to fill out a questionnaire. Next to sociodemographic and disease-specific data, vaccination willingness and knowledge regarding SARS-CoV-2 were assessed. Furthermore, patients’ sources of information and their concerns about accuracy of information were evaluated. A numerical rating scale (NRS) ranging from 0 (completely disagree) to 10 (completely agree) was used. Values between ≥7 were taken as positive answer. Nonparametric tests and multivariate linear regression analyses were performed.ResultsIn early 2021, a total of 514 patients were interviewed (Table 1). The majority (63.9 %) reported to be well-informed (NRS ≥7), whereas 18% had doubts regarding information on SARS-CoV-2. The most often used source of information was television, and only 8.6% reported to have been informed by a rheumatologist (Figure 1). About 20% of patients were no longer interested in receiving any information on SARS-CoV-2 through media. Information from rheumatologists, general practitioners, public health authorities or health related web sites did not reach 30.5% of patients. Of interest, 16% of subjectively well-informed patients were hesitant towards vaccination. As many as 43.6% of patients with doubts regarding information about SARS-CoV-2 indicated that they were not willing to be vaccinated. No source of information showed a strong correlation with SARS-CoV-2 vaccination willingness or with knowledge on SARS-CoV-2. Weak positive correlations were found between age and education level on the one hand and information sources about SARS-CoV-2 on the other hand. A weak negative correlation was found between doubts about information and health authorities, whereas positive correlations were found with social networks, friends and family.Table 1.Sociodemographic and disease characteristicsAge (years)54.7 ± 12.8Women, No.* (%)315 (61.3%)Educational level, No.* (%) < 8 years50 (10.4 %) 8-12 years275 (57.4 %) >12 years154 (32.2 %)Occupation, No.* (%) Full time198 (38.5 %) Pensioner157 (30.5 %) Part-time80 (15.6 %) Housewife/husband37 (7.2 %) Occupational incapacity29 (5.6 %) In training7 (1.4 %) Healthcare5 (1 %)CIRD, No.* (%)Rheumatoid arthritis192 (37.3 %)Axial spondyloarthritis134 (26.1 %)Connective tissue disease and vasculitis106 (22.6 %)Psoriatic arthritis72 (14.0 %)Disease duration, mean (years)Therapy, No.* (%)9.8 ± 8.9 bDMARD316(61.5 %) csDMARD147(28.6 %) tsDMARD33 (6.4 %) no DMARDs18 (3.5 %)*Number of patientsFigure 1.Sources of information of CIRD patients about SARS-CoV-2ConclusionMost CIRD patients think that they are well-informed about SARS-CoV-2. However, their information rarely comes from expert-based sources and rarely from rheumatologists. Thus, there is an unmet need for CIRD patients to receive appropriate and comprehensive information about SARS-CoV-2, its influence on rheumatic diseases, and about vaccination of patients with CIRD.References[1]Strangfeld A et al. Ann Rheum Dis 2021Disclosure of InterestsNone declared
APA, Harvard, Vancouver, ISO, and other styles
2

Döring, Nicola, and Roberto Walter. "Alcohol Portrayals on Social Media (Social Media)." DOCA - Database of Variables for Content Analysis, May 27, 2022. http://dx.doi.org/10.34778/5h.

Full text
Abstract:
The depiction of alcohol is the focus of a growing number of content analyses in the field of social media research. Typically, the occurrence and nature of alcohol representations are coded to measure the prevalence, normalization, or even glorification of alcohol and its consumption on different social media platforms (Moreno et al., 2016; Westgate & Holliday, 2016) and smartphone apps (Ghassemlou et al., 2020). But social media platforms and smartphone apps also play a role in the prevention of alcohol abuse when they disseminate messages about alcohol risks and foster harm reduction, abstinence, and sobriety (Davey, 2021; Döring & Holz, 2021; Tamersoy et al., 2015; Westgate & Holliday, 2016). Field of application/theoretical foundation: Social Cognitive Theory (SCT; Bandura 1986, 2009) as the dominant media effects theory in communication science, is applicable and widely applied to social media representations of alcohol: According to SCT, positive media portayals of alcohol and attractive role models consuming alcohol can influence the audience’s relation to alcohol. That’s why positive alcohol portayals in the media are considered a public health threat as they can foster increased and risky alcohol consumption among media users in general and young people in particular. The negative health impact predicted by SCT depends on different aspects of alcohol portrayals on social media that have been traditionally coded in manual content analyses (Beullens & Schepers, 2013; Mayrhofer & Naderer, 2019; Moreno et al., 2010) and most recently by studies relying on computational methods for content analysis (e.g. Ricard & Hassanpour, 2021). Core aspects of alcohol representations on social media are: a) the type of communicator / creator of alcohol-related social media content, b) the overall valence of the alcohol portrayal, c) the people consuming alcohol, d) the alcohol consumption behaviors, e) the social contexts of alcohol consumption, f) the types and brands of consumed alcohol, g) the consequences of alcohol consumption, and h) alcohol-related consumer protection messages in alcohol marketing (Moreno et al., 2016; Westgate & Holliday, 2016). For example, a normalizing portrayal shows alcohol consumption as a regular and normal behavior of diverse people in different contexts, while a glorifying portrayal shows alcohol consumption as a behavior that is strongly related to positive effects such as having fun, enjoying social community, feeling sexy, happy, and carefree (Griffiths & Casswell, 2011). While criticism of glorifying alcohol portrayals in entertainment media (e.g., music videos; Cranwell et al., 2015), television (e.g., Barker et al., 2021), and advertising (e.g., Curtis et al., 2018; Stautz et al., 2016) has a long tradition, the concern about alcohol representations on social media is relatively new and entails the phenomenon of alcohol brands and social media influencers marketing alcohol (Critchlow & Moodie, 2022; Turnwald et al., 2022) as well as ordinary social media users providing alcohol-related self-presentations (e.g., showing themselves partying and drinking; Boyle et al., 2016). Such alcohol-related self-presentations might elicit even stronger identification and imitation effects among social media audiences compared to regular advertising (Griffiths & Casswell, 2011). Because of its psychological and health impact, alcohol-related social media content – and alcohol marketing in particular – is also an issue of legal regulation. The World Health Organization states that “Europe is the heaviest-drinking region in the world” and strongly advocates for bans or at least stricter regulations of alcohol marketing both offline and online (WHO, 2020, p. 1). At the same time, the WHO points to the problem of clearly differentiating between alcohol marketing and other types of alcohol representations on social media. Apart from normalizing and glorifying alcohol portayals, there are also anti-alcohol posts and comments on social media. They usually point to the health risks of alcohol consumption and the dangers of alcohol addiction and, hence, try to foster harm reduction, abstincence and sobriety. While such negative alcohol portayals populate different social media platforms, an in-depth investigation of the spread, scope and content of anti-alcohol messages on social media is largely missing (Davey, 2021; Döring & Holz, 2021; Tamersoy et al., 2015). References/combination with other methods of data collection: Manual and computational content analyses of alcohol representations on social media platforms can be complemented by qualitative interview and quantitative survey data addressing alcohol-related beliefs and behaviors collected from social media users who a) create and publish alcohol-related social media content and/or b) are exposed to or actively search for and follow alcohol-related social media content (e.g., Ricard & Hassanpour, 2021; Strowger & Braitman, 2022). Furthermore, experimental studies are helpful to directly measure how different alcohol-related social media posts and comments are perceived and evaluated by recipients and if and how they can affect their alcohol-related thoughts, feelings, and behaviors (Noel, 2021). Such social media experiments can build on respective mass media experiments (e.g., Mayrhofer & Naderer, 2019). Insights from content analyses help to select or create appropriate stimuli for such experiments. Last but not least, to evaluate the effectiveness of alcohol marketing regulations, social media content analyses conducted within a longitudinal or trend study design (including measurements before and after new regulations came into effect) should be preferred over cross-sectional studies (e.g., Chapoton et al., 2020). Example Studies for Manual Content Analyses: Coding Material Measure Operationalization (excerpt) Reliability Source a) Creators of alcohol-related social media content Extensive explorations on Facebook, Instagram and TikTok Creators of alcohol-related social media content on Facebook, Instagram and TikTok Polytomous variable “Type of content creator” (1: alcohol industry; 2: media organization/media professional; 3: health organization/health professional; 4: social media influencer; 5: ordinary social media user; 6: other) Not available Döring & Tröger (2018) Döring & Holz (2021) b) Valence of alcohol-related social media content N = 3 015 Facebook comments N = 100 TikTok videos Valence of alcohol-related social media content (posts or comments) Binary variable “Valence of alcohol-related social media content” (1: positive/pro-alcohol sentiment; 2: negative/anti-alcohol sentiment) Cohen’s Kappa average of .72 for all alcohol-related variables in codebook* Döring & Holz (2021) *Russell et al. (2021) c) People consuming alcohol N = 160 Facebook profiles (profile pictures, personal photos, and text) Portrayal of people consuming alcohol on Facebook profiles Binary variable “Number of persons on picture” (1: alone; 2: with others) Cohen’s Kappa > .90 Beullens & Schepers (2013) d) Alcohol consumption behaviors N = 160 Facebook profiles (profile pictures, personal photos, and text) Type of depicted alcohol use/consumption Polytomous variable “Type of depicted alcohol use/consumption” (1: explicit use such as depiction of person drinking alcohol; 2: implicit use such as depiction of alcohol bottle on table; 3: alcohol logo only) Cohen’s Kappa = .89 Beullens & Schepers (2013) N = 100 TikTok videos Multiple alcoholic drinks consumed per person Binary variable “Multiple alcoholic drinks consumed per person” as opposed to having only one drink or no drink per person (1: present; 2: not present) Cohen’s Kappa average of .72 for all alcohol-related variables in codebook Russell et al. (2021) N = 100 TikTok videos Alcohol intoxication Binary variable “Alcohol intoxication” (1: present; 2: not present) Cohen’s Kappa average of .72 for all alcohol-related variables in codebook Russell et al. (2021) N = 4 800 alcohol-related Tweets Alcohol mentioned in combination with other substance use Binary variable “Alcohol mentioned in combination with tobacco, marijuana, or other drugs” (1: yes; 2: no) Cohen’s Kappa median of .73 for all pro-drinking variables in codebook Cavazos-Rehg et al. (2015) e) Social contexts of alcohol consumption N = 192 Facebook and Instagram profiles (profile pictures, personal photos, and text) Portrayal of social evaluative contexts of alcohol consumption on Facebook and Instagram profiles Polytomous variable “Social evaluative context” (1: negative context such as someone looking disapprovingly at a drunk person; 2: neutral context such as no explicit judgment or emotion is shown; 3: positive context such as people laughing and toasting with alcoholic drinks) Cohen’s Kappa ranging from .68 to .91 for all variables in codebook Hendriks et al. (2018), based on previous work by Beullens & Schepers (2013) N = 51 episodes with a total of N = 1 895 scenes of the American adolescent drama series “The OC” Portrayal of situational contexts of alcohol consumption in scenes of a TV series Polytomous variable “Setting of alcohol consumption” (1: at home; 2: at adult / youth party; 3: in a bar; 4: at work; 5: at other public place) Polytomous variable “Reason of alcohol consumption” (1: celebrating/partying; 2: habit; 3: stress relief; 4: social facilitation) Cohen’s Kappa for setting of alcohol consumption .90 Cohen’s Kappa for reason of alcohol consumption .71 Van den Bulck et al. (2008) f) Types and brands of consumed alcohol N = 17 800 posts of Instagram influencers and related comments Portrayal of different alcohol types and alcohol brands in Instagram posts Polytomous variable “Alcohol type” (1: wine; 2: beer; 3: cocktails; 4: spirits; 5: non-alcoholic drinks/0% alcohol) Binary variable “Alcohol brand visibility” (1: present if full brand name, recognizable logo, or brand name in header or tag are visible; 2: non-present) String variable “Alcohol brand name” (open text coding) Krippendorff’s Alpha ranging from .69 to 1.00 for all variables in codebook Hendriks et al. (2019) g) Consequences of alcohol consumption N = 400 randomly selected public MySpace profiles Portayal of consequences of alcohol consumption on MySpace profiles Five individually coded binary variables for different consequences associated with alcohol use (1: present; 2: not present): a) “Positive emotional consequence highlighting positive mood, feeling or emotion associated with alcohol use” b) “Negative emotional consequence highlighting negative mood, feeling or emotion associated with alcohol use” c) “Positive social consequences highlighting perceived social gain associated with alcohol use” d) “Negative social consequences highlighting perceived poor social outcomes associated with alcohol use” e) “Negative physical consequences describing adverse physical consequences or outcomes associated with alcohol use” Cohen’s Kappa ranging from 0.76 to 0.82 for alcohol references and alcohol use Moreno et al. (2010) h) Alcohol-related consumer protection messages in alcohol marketing N = 554 Tweets collected from 13 Twitter accounts of alcohol companies in Ireland Alcohol-related consumer protection messages in alcohol marketing (covers both mandatory and voluntary messages depending on national legislation) Four individually coded binary variables for different alcohol-related consumer protection messages in alcohol marketing (1: present; 2: not present): a) “Warning about the risks/danger of alcohol consumption” b) “Warning about the risks/danger of alcohol consumption when pregnant” c) “Warning about the link between alcohol consumption and fatal cancers” d) “Link/reference to website with public health information about alcohol” Not available Critchlow & Moodie (2022) The presented measures were developed for specific social media platforms, but are so generic that they can be used across different social media platforms and even across mass media channels such as TV, cinema, and advertisement. The presented measures cover different aspects of media portrayals of alcohol and can be used individually or in combination. Depending on the research aim, more detailed measures can be developed and added: for example, regarding the media portrayal of people consuming alcohol, additional measures can code people’s age, gender, ethnicity and further characteristics relevant to the respective research question. In the course of a growing body of content analyses addressing alcohol-related prevention messages on social media, respective measures can be added as well. References Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice-Hall. Bandura, A. (2009). Social cognitive theory of mass communication. In J. Bryant & M. B. Oliver (Eds.), Communication series. Media effects: Advances in theory and research (3rd ed., pp. 94–124). Routledge. Barker, A. B., Britton, J., Thomson, E., & Murray, R. L. (2021). Tobacco and alcohol content in soap operas broadcast on UK television: A content analysis and population exposure. Journal of Public Health (Oxford, England), 43(3), 595–603. https://doi.org/10.1093/pubmed/fdaa091 Boyle, S. C., LaBrie, J. W., Froidevaux, N. M., & Witkovic, Y. D. (2016). Different digital paths to the keg? How exposure to peers' alcohol-related social media content influences drinking among male and female first-year college students. Addictive Behaviors, 57, 21–29. https://doi.org/10.1016/j.addbeh.2016.01.011 Beullens, K., & Schepers, A. (2013). Display of alcohol use on Facebook: A content analysis. Cyberpsychology, Behavior and Social Networking, 16(7), 497–503. https://doi.org/10.1089/cyber.2013.0044 Cavazos-Rehg, P. A., Krauss, M. J., Sowles, S. J., & Bierut, L. J. (2015). "Hey everyone, I'm drunk." An evaluation of drinking-related Twitter chatter. Journal of Studies on Alcohol and Drugs, 76(4), 635–643. https://doi.org/10.15288/jsad.2015.76.635 Chapoton, B., Werlen, A.‑L., & Regnier Denois, V. (2020). Alcohol in TV series popular with teens: A content analysis of TV series in France 22 years after a restrictive law. European Journal of Public Health, 30(2), 363–368. https://doi.org/10.1093/eurpub/ckz163 Cranwell, J., Murray, R., Lewis, S., Leonardi-Bee, J., Dockrell, M., & Britton, J. (2015). Adolescents' exposure to tobacco and alcohol content in YouTube music videos. Addiction (Abingdon, England), 110(4), 703–711. https://doi.org/10.1111/add.12835 Critchlow, N., & Moodie, C. (2022). Consumer protection messages in alcohol marketing on Twitter in Ireland: A content analysis. Drugs: Education, Prevention and Policy, 1–8. https://doi.org/10.1080/09687637.2022.2028730 Curtis, B. L., Lookatch, S. J., Ramo, D. E., McKay, J. R., Feinn, R. S., & Kranzler, H. R. (2018). Meta-analysis of the association of alcohol-related social media use with alcohol consumption and alcohol-related problems in adolescents and young adults. Alcoholism, Clinical and Experimental Research, 42(6), 978–986. https://doi.org/10.1111/acer.13642 Davey, C. (2021). Online sobriety communities for women's problematic alcohol use: A mini review of existing qualitative and quantitative research. Frontiers in Global Women's Health, 2, 773921. https://doi.org/10.3389/fgwh.2021.773921 Döring, N., & Tröger, C. (2018). Zwischenbericht: Durchführung und Ergebnisse der summativen Evaluation des Facebook-Kanals „Alkohol? Kenn dein Limit.“ [Intermediate report: Implementation and results of the summative evaluation of the Facebook channel "Alcohol? Know your limit."]. Döring, N., & Holz, C. (2021). Alkohol in sozialen Medien: Wo ist der Platz für Prävention? [Alcohol in social media: Where is the space for prevention?]. Bundesgesundheitsblatt, Gesundheitsforschung, Gesundheitsschutz, 64(6), 697–706. https://doi.org/10.1007/s00103-021-03335-8 Ghassemlou, S., Marini, C., Chemi, C., Ranjit, Y. S., & Tofighi, B. (2020). Harmful smartphone applications promoting alcohol and illicit substance use: A review and content analysis in the United States. Translational Behavioral Medicine, 10(5), 1233–1242. https://doi.org/10.1093/tbm/ibz135 Griffiths, R., & Casswell, S. (2010). Intoxigenic digital spaces? Youth, social networking sites and alcohol marketing. Drug and Alcohol Review, 29(5), 525–530. https://doi.org/10.1111/j.1465-3362.2010.00178.x Hendriks, H., van den Putte, B., Gebhardt, W. A., & Moreno, M. A. (2018). Social drinking on social media: Content analysis of the social aspects of alcohol-related posts on Facebook and Instagram. Journal of Medical Internet Research, 20(6), e226. https://doi.org/10.2196/jmir.9355 Hendriks, H., Wilmsen, D., van Dalen, W., & Gebhardt, W. A. (2019). Picture me drinking: Alcohol-related posts by Instagram influencers popular among adolescents and young adults. Frontiers in Psychology, 10, 2991. https://doi.org/10.3389/fpsyg.2019.02991 Mayrhofer, M., & Naderer, B. (2019). Mass media as alcohol educator for everyone? Effects of portrayed alcohol consequences and the influence of viewers’ characteristics. Media Psychology, 22(2), 217–243. https://doi.org/10.1080/15213269.2017.1378112 Moreno, M. A., Briner, L. R., Williams, A., Brockman, L., Walker, L., & Christakis, D. A. (2010). A content analysis of displayed alcohol references on a social networking web site. The Journal of Adolescent Health: Official Publication of the Society for Adolescent Medicine, 47(2), 168–175. https://doi.org/10.1016/j.jadohealth.2010.01.001 Moreno, M. A., D’Angelo, J., & Whitehill, J. (2016). Social media and alcohol: Summary of research, intervention ideas and future study directions. Media and Communication, 4(3), 50–59. https://doi.org/10.17645/mac.v4i3.529 Noel, J. K. (2021). Using social media comments to reduce alcohol purchase intentions: An online experiment. Drug and Alcohol Review, 40(6), 1047–1055. https://doi.org/10.1111/dar.13262 Ricard, B. J., & Hassanpour, S. (2021). Deep learning for identification of alcohol-related content on social media (Reddit and Twitter): Exploratory analysis of alcohol-related outcomes. Journal of Medical Internet Research, 23(9), e27314. https://doi.org/10.2196/27314 Russell, A. M., Davis, R. E., Ortega, J. M., Colditz, J. B., Primack, B., & Barry, A. E. (2021). #Alcohol: Portrayals of alcohol in top videos on TikTok. Journal of Studies on Alcohol and Drugs, 82(5), 615–622. https://doi.org/10.15288/jsad.2021.82.615 Stautz, K., Brown, K. G., King, S. E., Shemilt, I., & Marteau, T. M. (2016). Immediate effects of alcohol marketing communications and media portrayals on consumption and cognition: A systematic review and meta-analysis of experimental studies. BMC Public Health, 16, 465. https://doi.org/10.1186/s12889-016-3116-8 Strowger, M., & Braitman, A. L. (2022). Using social network methodology to examine the effects of exposure to alcohol-related social media content on alcohol use: A critical review. Experimental and Clinical Psychopharmacology. Advance online publication. https://doi.org/10.1037/pha0000561 Tamersoy, A., Choudhury, M. de, & Chau, D. H. (2015). Characterizing smoking and drinking abstinence from social media. HT '15: The Proceedings of the 26th ACM Conference on Hypertext and Social Media, 2015, 139–148. https://doi.org/10.1145/2700171.2791247 Turnwald, B. P., Anderson, K. G., Markus, H. R., & Crum, A. J. (2022). Nutritional analysis of foods and beverages posted in social media accounts of highly followed celebrities. JAMA Network Open, 5(1), e2143087. https://doi.org/10.1001/jamanetworkopen.2021.43087 Van den Bulck, H., Simons, N., & van Gorp, B. (2008). Let's drink and be merry: The framing of alcohol in the prime-time American youth series The OC. Journal of Studies on Alcohol and Drugs, 69(6), 933–940. https://doi.org/10.15288/jsad.2008.69.933 Westgate, E. C., & Holliday, J. (2016). Identity, influence, and intervention: The roles of social media in alcohol use. Current Opinion in Psychology, 9, 27–32. https://doi.org/10.1016/j.copsyc.2015.10.014 World Health Organization Regional Office for Europe (WHO). (2020). Alcohol marketing in the WHO European Region: update report on the evidence and recommended policy actions. https://apps.who.int/iris/bitstream/handle/10665/336178/WHO-EURO-2020-1266-41016-55678-eng.pdf?sequence=1&isAllowed=y
APA, Harvard, Vancouver, ISO, and other styles
3

Luczkovich, Joseph J., Jeffrey C. Johnson, Rebecca A. Deehr, Kevin J. Hart, Lisa Clough, and David C. Griffith. "Linking Fishing Behavior and Ecosystem Dynamics Using Social and Ecological Network Models." Frontiers in Ecology and Evolution 9 (June 9, 2021). http://dx.doi.org/10.3389/fevo.2021.662412.

Full text
Abstract:
One goal of ecosystem-based management is studying an ecosystem and its people, the socio-ecological system, in a qualitative and quantitative modeling approach that can provide management agencies with possible outcomes of their actions using scenario forecasting. Ecosystem-based fisheries management strives to use the socio-ecological system approach, including direct and indirect impacts on multiple species including the behavioral responses of fishers after a regulatory change (a gillnet ban). Here, we link fisher behavioral networks with a mass-balanced food-web ECOPATH network model of an estuarine ecosystem and its commercial fisheries for an analysis of fishing impacts after a gillnet ban on multiple species using ECOSIM. We modeled fisher behavioral networks using reported catches of species from individual fishers along with the gear fished to create nodes in a gear/species affiliation network. Individual fishers with common gear/species use are indicative of common fishing behavior. When such fishers have high network centrality and are engaged in multiple gear/species fisheries, they can transition to other gear/species fisheries along “switching pathways” when facing a regulatory change. We used an index of joint gear participation to identify likely gear switching pathways, and we predicted changes in fishing effort after a gill net ban. We simulated the gill net ban in ECOSIM under two scenarios of fishing effort: Scenario 1, gill net fishing effort of 0%; Scenario 2, gill net fishing effort of 0% with increased effort in the alternative gear fisheries using the predicted switching pathways for the affiliation network. Scenario 1 predicted an increase in flounder (Paralichthys spp.) biomass over a decade. Under Scenario 2, fishers targeting flounders were predicted to switch from gill nets to pound nets. Scenario 2 predicted a 7% decline in flounder biomass over ten years, rather than an increase in flounders. The gillnet ban with increased effort due to switching is predicted to have the opposite effect on the conservation goal, which was to increase flounder stocks. Fishery management that incorporates a socio-ecological approach modeling both fisher behaviors and multi-species ecosystem responses can reveal single-species responses that are in the opposite direction of the anticipated management goals.
APA, Harvard, Vancouver, ISO, and other styles
4

Sahay, Anju, Parisa Gholami, and Paul A. Heidenreich. "Abstract 269: A Successful Blended Facilitation Approach with Internal and External Facilitators to Implement the VA Hospital-To-Home (H2H) Initiative: CHF QUERI." Circulation: Cardiovascular Quality and Outcomes 5, suppl_1 (April 2012). http://dx.doi.org/10.1161/circoutcomes.5.suppl_1.a269.

Full text
Abstract:
A Successful Blended Facilitation Approach with Internal and External Facilitators to Implement the VA Hospital-To-Home (H2H) Initiative: CHF QUERI Objectives: Reducing readmission rates for heart failure (HF) patients is the primary goal of the VA and the CHF QUERI. It is also the goal of Hospital to Home (H2H) national quality improvement (QI) initiative cosponsored by the American College of Cardiology and the Institute for Healthcare Improvement. According to Rogers’ Diffusion of Innovation Theory (2003) social networks significantly affect performance and innovation. Additionally, the Promoting Action on Research Implementation in Health Services (PARIHS, 2008) framework emphasizes the function of dynamic relationships among evidence, context and facilitation. In January 2010 the CHF QUERI through its HF Network launched the “VA H2H” QI initiative to implement the national H2H initiative at the VA facilities. Blended facilitation approach was used with the HF Network's leadership being the “external” facilitators and the opinion leaders (OLs) at each facility being the “internal” facilitators. Methods: A total of 122 VA facilities were identified with >100 discharges during 2007-2008. Using the sociometric method OLs were identified to be “internal” facilitators. Members were to nominate up to 2 providers at own facility (physician/nurse/other/self) as the OL. Then OL teams were asked to participate in the VA H2H. As “external” facilitators the HF Network's leadership conducted web-based meetings and provided tool-kit and consultation to members at all 122 facilities. Periodic surveys were used to track projects (or interventions) recently initiated based on VA H2H, planned based on VA H2H, or ongoing to reduce HF readmissions not based on VA H2H initiative. Results: Members from 66% facilities (n=81) responded with 1-2 nominations for OLs. Members from the remaining 34% facilities (n=41) either responded with no nominations (n=3) or were non-responders (n=38). Overall, 47 facilities (39%) reported a total of 243 projects. Among them, 44 facilities had OLs (94%) with 234 projects (96%). In sharp contrast, the remaining 3 facilities (6%) with no OL had only 9 projects (4%). The 44 facilities with OLs reported 37 recently initiated VA H2H projects (versus 3 VA H2H projects at facilities without OL); 40 VA H2H projects being planned (versus 0 project at facilities without OL); and 149 projects ongoing not in response to VA H2H (versus 6 projects at facilities without OL). Conclusions: Facilities with OLs were very successful in implementing the VA H2H initiative. Impact: Use of OLs may be effective in implementing non-mandated QI initiatives to improve care for all VA HF patients.
APA, Harvard, Vancouver, ISO, and other styles
5

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
6

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text
Abstract:
Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisements which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.
APA, Harvard, Vancouver, ISO, and other styles
7

Kanai, Akane. "WhatShouldWeCallMe? Self-Branding, Individuality and Belonging in Youthful Femininities on Tumblr." M/C Journal 18, no. 1 (January 20, 2015). http://dx.doi.org/10.5204/mcj.936.

Full text
Abstract:
As the use of social networks becomes increasingly commonplace, scholars have observed that associated requirements arise relating to how one’s digital self is practised, worked on, and disseminated (Cover; Miller; Papacharissi). Since the earliest forms of online interaction, scholars have tracked the importance of the question of “realness” in identity and social groupings (Burkhalter; Donath; O’Brien). More recently, as people become more connected, connect-able and subject to peer (as well as corporate and government surveillance) (van Zoonen), digital media cultures have increasingly demanded the performance of authenticity as part of the work of belonging online (Banet-Weiser; Keller). Drawing on Banet-Weiser’s and Keller’s work in particular, “authenticity” is defined here as the quality of being considered consistently “true to oneself” in a way which is socially legitimated. I suggest, online, that this demand for authenticity is manifested through two poles of authenticity: authentic individuality and authentic belonging. In this paper, I discuss the interplay between authentic individuality and authentic belonging in (postfeminist) digital cultures, by using the case study of a set of meme blogs narrating youthful femininity on blogging social network Tumblr. This meme set, based on Tumblr blog “WhatShouldWeCallMe” (WSWCM), sets out a self-representative affective account of quotidian feminine experiences. In a set of six blogs of this meme set, including the “founder”, I consider the production of authenticities where the simultaneous importance of connection and imitative differentiation is foregrounded, tracking the way authenticity is practised in the founder and follower meme blogs. I contend that the WSWCM founder claims authentic individuality, producing itself through claims to originality, and pre-existing “best girlfriendship”. I then suggest that the follower meme blogs foreground authentic digital belonging, by exhibiting certain affective cultural literacies that demonstrate insider status in this intimate digital feminine public (Berlant). I surmise these strategies are used to manage the demands of tension between proving one’s true and individual self and the need to be recognised as belonging through commonality. The Authentic Self Brand and the Authentic Insider I suggest that one expression of authentic individuality can be found in the increasingly prevalent practice of self-branding in digital cultures on social network sites (Banet-Weiser). In what Banet-Weiser calls “the authentic self-brand”, one sets up a simultaneous relationship to oneself, and a relationship between oneself and one’s audience. This double relationship is one of “innovation, production, and consumption [of the self], charged with ideally producing a unique, ‘authentic’ self” (73) for others. The self-social relationship offered by the authentic self-brand dovetails with what scholars identify as a postfeminist media landscape in the West (Gill; McRobbie; Negra). Postfeminist narratives promote highly commercial paradigms of self-surveillance, self-regulation and self-improvement, particularly for young women (Gill, McRobbie), whereby one’s body, social practices and relationships are evaluated as part of the marketability of one’s self-brand (Banet-Weiser, Winch). In this marketised recasting of social relationships, one must treat oneself as a product to be invested in, and remain vigilantly aware of how one is perceived by an audience of potential “buyers”. Notably, postfeminism relies on the idea of a deep, inhering individuality to justify the injunction to marketise oneself (Gill). Following this logic, gendered practices which may improve one’s feminine “self-brand” such as attention to beauty practices and body shape, must be cast as for “oneself” and part of one’s “true desires”. This occurs in a landscape where it is widely presumed that feminism has done its work, and women are now “free” to perform femininity however they wish (Gill). In postfeminist digital cultures, proving one’s acts are done for one’s true self, not for others becomes crucial in demonstrating one’s feminine authenticity (Dobson, Individuality; Performative), even as one is aware of the social value of one’s profile or digital brand (Banet-Weiser, Ringrose and Barajas). Drawing on this body of work, I suggest that authentic individuality, performed through imperviousness to social influence, is the way in which these contradictions of the postfeminist self-brand are justified. At the same time, digital cultures can also be argued to offer “remix” spaces (Lessig) where the borrowing, imitation and adaptation of existing cultural artefacts demonstrates personally felt connections to wider social meanings. One common manifestation of this is the Internet “meme”, a unit of culture which relies on imitative adaptation and differentiation in its circulation (Shifman), which I discuss further in this article. Shifman illustrates the meme as a mode of interpretive connection with the example of YouTube meme “Leave Britney Alone”, which began with the founder meme video by actor Chris Crocker making an emotional plea that society leave singer Britney Spears in peace. Memes signal dominant social understandings of the original cultural unit: Shifman notes that with the “Leave Britney Alone” meme, the follower memes tended to mock Crocker’s perceived effeminacy, sexuality and excessiveness in their re-enactments of Crocker’s founder video. Authenticity in these forms of digital production might be argued to signify more about desires for legitimate or authentic belonging within digital publics as insiders, rather than proving a fundamental individuality. WhatShouldWeCallMe and Tumblr Remix Culture Tumblr is a relatively under-researched but rapidly growing blogging social network, documented at the end of 2014 as the social platform with the most growth in user numbers (Lunden). Tumblr is known as a promising hub of burgeoning visual youth cultures (Third and Hart), possibly due to its norms of anonymity and significant pop culture content of posts. Images are a dominant form of communication on the site, and most content on Tumblr is public. Notably, 70% of Tumblr traffic occurs internally through the repurposing and reblogging of posts in the “dashboard” area (the equivalent being the “newsfeed’ for Facebook), rather than from external sources (Walker). Tumblr users are able to follow each other, and like and reblog each other’s posts. However, direct comments on posts are not an available feature, unlike most “first wave” (Miller and Fink) blogging sites; if a user wishes to comment on a post, they can only do so when reblogging the post, which is then featured on their own blog. According to Tumblr founder David Karp, this feature discourages overly negative comments and flame wars because “if you’re going to be a jerk, you’re looking like a jerk in your own space” (Walker). These structures set up Tumblr as an ideal site for the production of memes as part of its remix culture, whilst still adhering to certain connective features of other social networks. To provide some context, the founder WSWCM blog boasted 50,000 new Tumblr followers in the month following its creation in 2012, with independent traffic reports logging the number of page views as one to two million per day (Casserly). Each post on the founder WSWCM is on average liked and reblogged by hundreds of other Tumblr users, but its significance, which I consider here, lies in the way that it has been taken up in a prolific variety of follower meme blogs. Interestingly, unlike “Leave Britney Alone”, the form of imitative differentiation here is keyed at speaking at a more self-representative level, rather than making a comment on or satirising the founder, suggesting a level of personal connection. Like “Leave Britney Alone”, the WSWCM meme set can be understood as a founder-based meme (Shifman), with one originating, successful meme text which then inspires many follower memes, which are usually less successful. The follower memes I consider here adapt the GIF-reaction format which is used to narrate everyday experiences of youthful femininity. Blog posts are produced by matching a GIF image to situations such as “when my boyfriend forgets to DVR the Voice” or “when I hear my frenemy got dumped by her boyfriend”. GIFs are moving photo files excerpting about three seconds of movement from popular culture ranging from film, television and YouTube videos. It must be stressed that the term “follower” does not necessarily connote a lack of originality. The imitation of the follower blogs is strategic: a deliberate, slight differentiation, which operates to set them apart, but still locates them within a youthful feminine public. The emergence of the WSWCM follower blogs is a dynamic one which, I suggest, has catalysed the founder to intensify its claims to legitimacy through authentic originality even as its funny and creative followers throw its uniqueness into question. The Founder Meme Blog: Best Friendship as Authenticity Practice One key way that the WSWCM founder makes claims to authenticity is through a “best girlfriendship”, which is also explicitly articulated as the driving force for the maintenance of the blog, rather than Tumblr followers or outside audiences. Whilst ads are hosted on the founder blog, it is explained that these are almost ancillary—“to pay the bills” of purchasing material to create the GIFs, pay for the site design, web-hosting fees, and other costs. The almost romantic figure of the female “best friend” features significantly, fitting with Winch’s claim that the female best friend becomes a new “soul mate”, beyond one’s (heterosexual) partner in postfeminist girlfriend culture. In this way, we see how certain social relationships become recognisable as authentic. The founder bloggers state in their FAQs: We are two best friends who met in college and now live on opposite coasts (of the United States). We used to send each other funny .gifs as a way of staying in touch, and decided to start a tumblr that both of us could check during the day. We thought we were just posting inside jokes, but are thrilled that other people find them as funny as we do. We never really intended for anyone else to see it. Whilst now, with potentially hundreds of thousands of followers, it is difficult to maintain that the blog is maintained solely as a means of keeping in contact, this long distance girlfriendship can be drawn on to establish the authenticity and social capital for the blog. The best friend is a productive space through which one can express one’s true, individual desires, free of others’ wishes and outside constraints. Many moments expressed in the original blog centre on (very funny) moments that are only shared with the best friend where one can really be “oneself”, such as “when my best friend and I stay in” (for a night in), or “when my best friend and I are DGAF in public” (“don’t give a fuck”). In the blog, the very exclusivity of the female best friend compared to other ambivalent relations with “other girls” and “guys”, can also be understood as a mechanism for carving out a space of feminine individuality. I suggest that this best girlfriendship should be understood as a permutation of the authentic self-brand, practised to achieve a form of authentic individuality. In Winch’s conception, postfeminist girlfriendship is about strategy rather than solidarity; girlfriendship becomes an “investment in the individual” as it is “essential in enabling feminine normativity” (2). This may be reflected in the way best friendship is mobilised as a brand for WSWCM. At its inception, WSWCM only used the “Minimalist” theme for its layout, a free theme offered by Tumblr, which is still visible in the formats of some of the meme blogs. Fig. 1A: “Screenshot of Minimalist Theme in follower blog.” Twodumbgirls.tumblr.com, 16 Feb. 2015.Fig. 1B: “Screenshot of Minimalist Theme in follower blog.” Whatshouldwecollegeme.tumblr.com, 16 Feb. 2015. However, in early 2014 the bloggers changed to a different header to distinguish their site. I suggest this can be understood as a response to establish originality and authenticity through a best friendship brand, in opposition to the other meme blogs, which had also adopted the founder theme. The WSWCM header features cartoonish depictions of the two bloggers, one in New York with the silhouette of skyscrapers behind her, and one on a beach with an open laptop, the blog visible on her screen. Fig. 2: “WhatShouldWeCallMe Header.” Whatshouldwecallme.tumblr.com, 17 Feb. 2015. This header clearly alludes to the fact that the bloggers are separated, in different places, but links them by depicting them as virtually identical. Somewhat similar to “Bratz” dolls, they are both represented with oversized heads, tiny bodies, long hair, and large eyes, with the only differences being that one is blonde with pale skin and blue eyes, the other brunette with tanned skin and green eyes. I suggest that what is striking about this cartoonish image is the way it fits into a commercial genre of representation of “girlfriends”. Further, whilst girlfriends are often positioned as differing, their differences are often positioned as complementary, to strengthen a united co-brand (Winch). The differences here are noticeably nominal, skin-deep—the slight variation in hair, eye and skin colour hint at “‘tantalising differences within a normative paradigm” (Winch 46). I am not suggesting here that the best friendship of the bloggers is artificial or purely commercial, but rather, that this production of digital best friendship coincides with strategies to achieve authentic individuality recognisable in postfeminist digital cultures. The best friend is thus crucial to the performance of authenticity in the original blog. It is important to note, however, that these practices exceed postfeminist self-branding in certain ways. Given that WSWCM has indeed inspired follower memes keyed in a self-representative register, this suggests possibilities of broader connection and a sense of intimacy through recognisability of shared femininity. From one form of insider practice—the WSWCM best girlfriendship—to another, other Tumblr bloggers through follower meme texts have also signalled their insider status, as young women able to narrate forms of feminine experience held out as representative and legitimate. The Follower Meme Blogs: Connective Differentiation In contrast to the founder’s production of authenticity through claims to originality, and through a relationship, which is held out as distinct from the desires to gain Internet followers, authenticity is practised differently in the follower memes. Authentic individuality is decentred; rather, the follower blogs appear to foreground the importance of authentic belonging. This becomes clear in the followers’ imitation of the founder in their positioning as similar, but slightly different. For example, in the blog WhatShouldBetchesCallMe, the blogging subject still narrates quotidian feminine trials and tribulations, but is much more knowingly confident and sassy; in WhatShouldWeCollegeMe, the blog focuses more on the experience of being at university than the founder meme. Shifman foregrounds the process of repackaging and imitation in the adaptation of memes; I suggest that what also must be considered in this meme set is connective differentiation, which repositions this repackaging as simultaneously a form of distancing and connection. Here, the connective differentiation of the follower blogs is a way of citing one’s knowledge and understanding of youthful feminine experience. By creating a self-representative, knowingly derivative but different follower blog in this meme set, this subsequent variation demonstrates one’s legitimate belonging in the feminine public sphere of WSWCM readership. I suggest Berlant’s conceptualisation of intimate publics is useful here in explaining how slight variations on an original theme play out in a culture in which authenticity is held up as essential. Berlant argues that women’s culture in the West, centrally shaped by relations to commodities, creates expectations of both normativity and commonality whereby the market claims to offer texts and objects which are true to women’s “particular core interests and desires” (5). This provides a “generic-but-unique” femininity (6) through which women can expect to be recognisable in this public. Arguably, what the memes opt into—through being recognised as derivative—is a form of recognition in an intimate feminine public. Thus, the follower memes adhere to these rules of recognisability in order to be seen. Recognition as belonging in this intimate public through social knowledge becomes more useful for the follower memes, which cannot rely on the status of originality of the founder meme. What this practice of discerning, connective differentiation may signal is a configuration of authenticity which manages the tension in demands of digital culture— signalling one’s individuality yet demonstrating one’s social embeddedness. As O’Brien (1998) notes in relation to early online social interaction, if one wants to be recognised and recognisable, one must draw on established social, cultural codes. Notably, many of the situations which are put forward in blog posts of the follower memes are not necessarily easily distinguishable in genre or content from the blog posts of the founder memes. Though the founder meme text places particular emphasis on best friendship, other forms of youthful, feminine (middle class) experience are recycled and re-adapted for circulation. Many of the situations which are put forward in the meme set, while creatively assembled, are ultimately generic so that they can be circulated on Tumblr to connect with others. Consequently, posts abound about social rituals of excessive drinking, struggling through university, and inadequacies in flirting technique. However, I note that these generic posts are still specific at the same time, requiring a highly discerning ability to capture and narrativise affective moments from diverse, miscellaneous pop culture material. The well-chosen GIF articulating one’s despondency as a single girl demonstrates a level of cultural and affective awareness of the semiotic intelligibility of the GIF, and the recognisable trials and tribulations of youthful feminine experience. Fig. 3: “When I’m depressed and have too much to drink.” 2ndhand-embarrassment.tumblr.com, 11 Feb. 2015. Thus, showing one’s specific knowledge of shared experience demonstrates an affective authenticity of connection and belonging. This authenticity works to prove one’s digital authority to micro-broadcast one’s life in a youthful feminine public, through showing one’s knowledge of the recognisable pitfalls, idiosyncrasies and experiences of being a young woman. I emphasise that it is this situated knowingness that comes through in the meme set in general, particularly in the follower memes. Given the generic nature of the content of posts across the meme set, the importance of “true” emotion is decentred—rather, what is vital is knowing which affective situations have the capacity to connect and be recognisable. Whilst the revelation of inner emotional truths have otherwise been considered key in the practice of authenticity in celebrity culture (Biressi and Nunn; Hesmondalgh and Baker), I propose that in the context in which this meme set is situated, this is not necessarily the most useful form of social currency. In these remix digital cultures, I suggest the interpretive premise of the digital audience is not that these products of remix literally speak to one’s experiences. Rather, remix cultures provide a means of demonstrating insider knowledge, which connects other insiders—a form of authentic belonging. Conclusion This paper has traced differing practices of feminine authenticity visible in the intersection of social network and remix cultures on Tumblr by examining the WSWCM meme set. I have suggested that the founder meme employs particular strategies of maintaining authentic individuality, such as resorting to the performance of an exclusive, “original” best girlfriendship brand. In contrast, the follower memes perform cultural and affective knowingness of youthful femininity, to assert their digital insider status—and right to belong. This meme set presents some productive questions through which to think through authenticity in digital cultures. Could striving for authentic belonging constitute one strategy of responding to a media-saturated culture, where authentic individuality is constantly elevated yet (perhaps) harder to achieve? These blogs demonstrate how the significance and practice of authenticity transforms in managing different configurations of social desires to belong, or be recognised as individual and original in (postfeminist) digital cultures. References Banet-Weiser, Sarah. Authentic TM. New York, NY: New York UP, 2012. Beer, David, and Roger Burrows. “Popular Culture, Digital Archives and the New Social Life of Data.” Theory, Culture & Society 30.4 (2013): 47–71. Berlant, Lauren Gail. The Female Complaint. Durham: Duke UP, 2008. Burkhalter, Byron. "Reading Race Online: Discovering Racial Identity in Usenet Discussions." Communities in Cyberspace. Eds. Marc A. Smith and Peter Kollock. London: Routledge, 1999. 59–74. Casserly, Meghan. “#Whatshouldwecallme Revealed: The 24-Year Old Law Students behind the New Tumblr Darling.” Forbes 29 Mar 2012: n.p. 23 Dec. 2014 ‹http://www.forbes.com/sites/meghancasserly/2012/03/29/whatshouldwecallme-revealed-24-year-old-law-students-tumblr-darling/›. Cover, Rob. “Performing and Undoing Identity Online: Social Networking, Identity Theories and the Incompatibility of Online Profiles and Friendship Regimes.” Convergence: The International Journal of Research into New Media Technologies 18.2 (2012): 177–93. Dobson, Amy Shields. “Performative Shamelessness on Young Women's Social Network Sites: Shielding the Self and Resisting Gender Melancholia.” Feminism & Psychology 24.1 (2013): 97–114. Dobson, Amy Shields. “'Individuality is Everything': 'Autonomous Femininity' in Myspace Mottos and Self–Descriptions.” Continuum 26.3 (2012): 371–83. Donath, Judith. "Identity and Deception in the Virtual Community." Communities in Cyberspace. Eds. Marc A. Smith and Peter Kollock. London: Routledge, 1999. 27–57. Fink, Marty, and Quinn Miller. “Trans Media Moments: Tumblr, 2011–2013.” Television & New Media 15.7 (2013): 611–26. Gill, Rosalind. Gender and the Media. Cambridge, UK: Polity, 2007. Hesmondhalgh, David, and Sarah Baker. Creative Labour. London: Routledge, 2011. Keller, Jessalynn Marie. “Fiercely Real?: Tyra Banks and the Making of New Media Celebrity.” Feminist Media Studies 14.1 (2012): 147–64. Lessig, Lawrence. Remix. New York: Penguin P, 2008. Lunden, Ingrid. “Tumblr Overtakes Instagram as Fastest-Growing Social Platform, Snapchat Is the Fastest-Growing App.” TechCrunch 25 Nov. 2014: n.p. 23 Dec. 2014 ‹http://techcrunch.com/2014/11/25/tumblr-overtakes-instagram-as-fastest-growing-social-platform-snapchat-is-the-fastest-growing-app/›. McRobbie, Angela. The Aftermath of Feminism. London: SAGE Publications, 2009. Miller, Vincent. Understanding Digital Culture. London: SAGE Publications, 2011. Negra, Diane. What a Girl Wants? Fantasising the Reclamation of Self in Postfeminism. London: Routledge, 2009. Nunn, Heather, and Anita Biressi. “'A Trust Betrayed': Celebrity and the Work Of Emotion.” Celebrity Studies 1.1 (2010): 49–64. O’Brien, Jodi. "Writing in the Body: Gender (Re)production in Online Interaction." Communities in Cyberspace. Eds. Marc A. Smith and Peter Kollock. London: Routledge, 1999. 75–103. Papacharissi, Zizi. A Networked Self. New York: Routledge, 2011. Ringrose, Jessica, and Katarina Eriksson Barajas. “Gendered Risks and Opportunities? Exploring Teen Girls’ Digitized Sexual Identities in Postfeminist Media Contexts.” International Journal of Media & Cultural Politics 7.2 (2011): 121–38. Shifman, Limor. Memes in Digital Culture. Cambridge, Massachusetts: MIT P, 2014. Van Doorn, Niels, Sally Wyatt, and Liesbet van Zoonen. “A Body of Text.” Feminist Media Studies 8.4 (2008): 357–74. Van Zoonen, Liesbet. “From Identity to Identification: Fixating the Fragmented Self.” Media, Culture & Society 35.1 (2013): 44­–51. Walker, Rob. “Can Tumblr’s™ David Karp Embrace Ads without Selling Out?” New York Times 12 July 2012: n.p. 23 Dec. 2014 ‹http://www.nytimes.com/2012/07/15/magazine/can-tumblrs-david-karp-embrace-ads-without-selling-out.html?pagewanted=all&_r=0›. Winch, Alison. Girlfriends and Postfeminist Sisterhood. Basingstoke: Palgrave Macmillan, 2013.
APA, Harvard, Vancouver, ISO, and other styles
8

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
9

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "HT. Web 2.0, Social networks"

1

Sankar, Krishna, and Susan Bouchard. Enterprise Web 2. 0 Fundamentals. Cisco Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sankar, Krishna, and Susan Bouchard. Enterprise Web 2. 0 Fundamentals. Pearson Education, Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsekeris, Charalambos, and Ioannis Katerelos. Social Dynamics of Web 2. 0: Interdisciplinary Perspectives. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tsekeris, Charalambos, and Ioannis Katerelos. Social Dynamics of Web 2. 0: Interdisciplinary Perspectives. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brennenstuhl, Jan. Web 2 0 und Politische Partizipation. GRIN Verlag GmbH, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arora, Payal. Leisure Commons: A Spatial History of Web 2. 0. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arora, Payal. Leisure Commons: A Spatial History of Web 2. 0. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Arora, Payal. Leisure Commons: A Spatial History of Web 2. 0. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Dinesh, and Réjean Savard. Marketing Libraries in a Web 2. 0 World. de Gruyter GmbH, Walter, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Dinesh K., and R. Savard. Marketing Libraries in a Web 2. 0 World. De Gruyter, Inc., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography