Journal articles on the topic 'Internet pornography – Social aspects – Australia'

To see the other types of publications on this topic, follow the link: Internet pornography – Social aspects – Australia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet pornography – Social aspects – Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

George, Manju, Shreemit Maheshwari, Suhas Chandran, and T. S. Sathyanarayana Rao. "Psychosocial Aspects of Pornography." Journal of Psychosexual Health 1, no. 1 (January 2019): 44–47. http://dx.doi.org/10.1177/2631831818821535.

Full text
Abstract:
Introduction: Pornography is the term given for non-relational sex without any requirements for relational intimacy. It has appeared in all cultures and civilizations over centuries. Research into the area of addictive sexual behaviors on the Internet incorporates the various constructs surrounding compulsive sexual behavior. Pornography and society: Excess viewing of pornography has been said to be associated with psychiatric comorbidities such as anxiety and depression, and even sexual dysfunction. Individuals with pornography addiction have lower degrees of social integration, increase in conduct problems, higher levels of delinquent behavior, higher incidence of depressive symptoms, and decreased emotional bonding with caregivers. Pornography is an expression of fantasies and is said to have the potential to rewire pleasure centers of the brain and alter structures and function. Conclusion: Pornography can bring about significant changes in the brain similar to what can be seen in drug addictions. Owing to the boom of technology and easy access to such material, it is imperative to provide specifically designed pornography addiction education programs to educate students about the adverse effects of pornography.
APA, Harvard, Vancouver, ISO, and other styles
2

Madden, Gary, and Scott J. Savage. "Some Economic and Social Aspects of Residential Internet Use in Australia." Journal of Media Economics 13, no. 3 (July 2000): 171–85. http://dx.doi.org/10.1207/s15327736me1303_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.

Full text
Abstract:
This paper examines the users’ perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the technological and industrial approaches to security. The user-centered research on banking was conducted at the Royal Melbourne University of Technology University and Griffith University, both of which are part of the Smart Internet Technology Cooperative Research Centre. We conclude that the most effective way to increase the perception of Internet banking security is to increase ease of use, convenience, personalisation and trust. Without the perception of security, there will be little trust in banking and transactions on the Internet. This will impede the use of Internet banking and e-commerce which are increasingly important aspects of the nation’s critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
4

Holilulloh, Andi, and Ben-Naouar Youssef. "THE LEARNING PROCESS THROUGH SOCIAL MEDIA FOR CHILDREN: THE ISSUES AND CHALLENGES OF CHILDREN’S FUTURE." SCAFFOLDING: Jurnal Pendidikan Islam dan Multikulturalisme 2, no. 1 (April 3, 2020): 58–67. http://dx.doi.org/10.37680/scaffolding.v2i1.261.

Full text
Abstract:
The paper focuses on the influences of Social Media for human’s life which becomes literally hot news between impact and its importance, the children get to communicate freely and also they can feel all aspects from social media. In this globalization era, if social media is usually used without controlling, especially for children, the children are actually victims of social media, although they are mostly smart students and they are studying lots of sciences through high technology that started from elementary school until university level, they would be an educated people. The Technology is normally more suitable that can be used by adult people, both mobile phone or laptop which are easily connected into social media, by using of application and also access which are easy to connect all access around the world until Social Media could change directly the positive mentality of children into negative aspect. The value of this study indicates that social media could give positive impacts such as giving and sharing knowledge, information and learning aspects, but it could give negative impacts at the same time such as making the children anti-social, spreading hoax news, pornography, unkind news and negative information. The survey from APJII (Asosiasi Pengguna Jasa Internet Indonesia) shows that the user of internet within high intensity is to get a better quality of education level. It means that high educated person will always access internet constantly and goodly. Kandell said the students are the community that are greedy to have the internet access compared other communities because the students are in emerging adulthood level that young people get puberty era and change into mature time and they will experience psychological dynamics.
APA, Harvard, Vancouver, ISO, and other styles
5

Caponnetto, Pasquale, Marilena Maglia, Graziella Chiara Prezzavento, and Concetta Pirrone. "Sexual Addiction, Hypersexual Behavior and Relative Psychological Dynamics during the Period of Social Distancing and Stay-at-Home Policies Due to COVID-19." International Journal of Environmental Research and Public Health 19, no. 5 (February 25, 2022): 2704. http://dx.doi.org/10.3390/ijerph19052704.

Full text
Abstract:
During the COVID-19 pandemic, increased stress factors affected people’s motivations to engage in potentially addictive behaviors. Sexuality, understood as one of the psychological aspects to be investigated to explore the level of psychological well-being of a person, has suffered considerable repercussions due to the pandemic. A growing body of evidence suggests an unprecedented increase in Internet use and online pornography consumption during the pandemic. Since March 2020, during the lockdown period, Pornhub has seen a worldwide increase in pornography use of 11.6% compared to the previous average days. This research was conducted with the aim of exploring the possible increasing use of pornographic material during the lockdown period, in order to assess whether dysfunctional behaviors, such as compulsive behaviors, and thoughts of sex-related obsessives can lead to hypersexual behavior or a more severe Sexual Addiction. The individuals who participated in our research were 18 years of age or older (mean 23.1, s.d. 5.8), and 48% male and 52% females and were recruited online to complete a self-report questionnaire in the period between April 2020 and April 2021. The questionnaires were delivered via main social networks. The tool used for our survey was the SAST (Sexual Addiction Screening Test), a questionnaire including socio-demographic data and data relating to sexual practices, such as sexual orientation and time spent on the Internet for sexual activities. The results revealed significant differences concerning the various factors investigated such as loss of control, addictive symptoms and hide score.
APA, Harvard, Vancouver, ISO, and other styles
6

Vilapakkam Nagarajan, Karthik. "A study of Internet service provider industry stakeholder collaboration in Australia." Journal of Information, Communication and Ethics in Society 12, no. 3 (August 5, 2014): 245–67. http://dx.doi.org/10.1108/jices-02-2014-0010.

Full text
Abstract:
Purpose – The purpose of this paper is to examine institutional influences on the customer service (CS) and complaints handling (CH) practices of the Australian Internet industry. Design/methodology/approach – The study adopted a qualitative research methodology using semi-structured interview as a research method. The study was informed by constructivist/interpretive research paradigm approaches to knowledge. Eleven senior executives from key Internet industry stakeholder organizations were interviewed. Findings – Using the neo-institutional theory lens, this study found that the institutional forces (regulatory, customer and competition pressures) played a pivotal role in bringing all Internet industry stakeholders together to address CS/CH shortcomings in the old Telecommunications Consumer Protection (TCP) Code 2007. This led to significant changes to the CS/CH practices detailed in the revised TCP Code 2012. The study findings revealed that frequent and fateful collaborations between central institutional actors have led to the emergence of organizational fields. The actors identified in the emerging organizational fields actively influence the CS/CH practices and the subsequent implementation of the practices in vLISPs. Research limitations/implications – The study focused on the functional aspects of service quality (SQ). Technical aspects of SQ is equally important, and future research needs to consider both aspects of SQ when assessing overall performance of vLISPs. Practical implications – The study findings encourage vLISP managers to continue collaboration with external stakeholders and develop customer-friendly practices that deliver desirable CS/CH outcomes. Social implications – The study findings revealed that when all vLISP industry stakeholders collaborate with each other on a focal issue, there is noticeable progress towards development of CS practices that will contribute to a better CS experience. Originality/value – An evidence-based approach was used towards understanding and explaining how and why institutional actors of technology-based service organizations act together. A significant contribution arising from this study is the identification and discussion of emerging organizational fields comprising the central actors in the Internet industry. These emerging organizational fields have the potential to develop into mature organizational fields and inform future CS/CH practices and consumer protection policies in the Australian Internet industry.
APA, Harvard, Vancouver, ISO, and other styles
7

Kuan, Hio Tong, Charlene Y. Senn, and Donna M. Garcia. "The Role of Discrepancies Between Online Pornography Created Ideals and Actual Sexual Relationships in Heterosexual Men’s Sexual Satisfaction and Well-Being." SAGE Open 12, no. 1 (January 2022): 215824402210799. http://dx.doi.org/10.1177/21582440221079923.

Full text
Abstract:
Contemporary sexually explicit Internet materials (SEIM) are commonly unrealistic. Following from self-discrepancy theory, we proposed that discrepancies between ideal and actual sexual experiences depicted in SEIM (ideal-actual sexual discrepancy; IASD) may be important in understanding the association between SEIM consumption, sexual satisfaction, and general well-being for heterosexual men. Participants from a general online community ( n = 195) were assessed via an online survey. Path analysis showed that the relationships between SEIM consumption and outcomes were not homogenous across age cohorts. While SEIM consumption and IASD contributed to sexual dissatisfaction for men in their 20s, only IASD had a direct relationship for men in their 30s. Higher IASD accounted for lower sexual satisfaction for men across age cohorts, suggesting that IASD may be a more stable factor as compared to quantity of consumption alone for explaining the negative association between SEIM consumption, sexual satisfaction, and all measured aspects of well-being.
APA, Harvard, Vancouver, ISO, and other styles
8

McLelland, Mark. "‘Not in front of the parents!’ Young people, sexual literacies and intimate citizenship in the internet age." Sexualities 20, no. 1-2 (August 1, 2016): 234–54. http://dx.doi.org/10.1177/1363460716645791.

Full text
Abstract:
Clause 13 of the United Nations Convention on the Rights of the Child states that children have the right ‘to seek, receive or impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in art or in any other media of the child's voice’. However, there is one area in which this directive is constrained in various countries by domestic regulations curtailing children's access to information. That area is human sexuality. The arguments for and against children's access to sex education are well rehearsed. In this article, the author pursues a different angle, looking instead at the increasing restrictions placed upon young people's ability to imagine and communicate with each other about sexual issues, particularly in online settings. The advent of the internet and a range of social networking sites have not only enabled young people to access previously quarantined information about sexuality, but also to actively engage in forms of ‘intimate citizenship’ online. In this article, the author focuses on young people's online fan communities which use characters from popular culture such as Harry Potter or a range of Japanese manga and animation to imagine and explore sexual issues. ‘Child abuse publications legislation’ in Australia and elsewhere now criminalizes the representation of even imaginary characters who are or may only ‘appear to be’ under the age of 18 in sexual scenarios. Hence these children and young people are in danger of being charged with the offence of manufacturing and disseminating child pornography. Despite research into these fandoms that indicates that they are of positive benefit to young people in developing ‘sexual literacies’, there is increasingly diminishing space for young people under the age of 18 to imagine or communicate about sexuality, even in the context of purely fictional scenarios.
APA, Harvard, Vancouver, ISO, and other styles
9

Korobko, M. I. "INFORMATION ETHICS AS A NECESSARY ELEMENT OF THE REGULATION OF THE MODERN INFORMATION SOCIETY." UKRAINIAN CULTURAL STUDIES, no. 1 (8) (2021): 46–50. http://dx.doi.org/10.17721/ucs.2021.1(8).10.

Full text
Abstract:
The article is devoted to the analysis of the importance of information ethics in the active development of information and communication technologies. Active research on the issues of cyberspace has been conducted since the second half of the ХХth century. These studies are becoming more intensive every year. Many scientists are interested in analysis of these issues because communication plays the fundamental role in our dynamic modern world. Modern telecommunication technologies and, first of all, the global Internet, are one of the most important factors in the development of the world community, which has a decisive influence on the social, political, economic and socio-cultural spheres. And the global pandemic Covid-19 since 2020 has brought these issues to the forefront of socio-humanitarian research. The information space of the Internet, which has already become the main infrastructure of social communication at the local and global levels, is a relatively new cultural phenomenon. It is obvious that a clear and effective system of moral regulation in this area has not yet developed. This space provides a person with unprecedented opportunities in terms of personal freedom, challenging traditional moral attitudes. Of course, this raises many ethical issues, both general and applied, related to the spread of coercive and aggressive Internet advertising, pornography, violence, intrusion, privacy, and many other aspects. Computer technologies are not neutral. They are filled with human, cultural and social values. These values can be predicted and taken into account, they can appear and evolve after many trials and errors. In our multicultural world conflicting value system can often arise. Future research needs to do as much as possible to create a broader and more promising concept of what it means to be human in the stream of transformations that exist today. The solution of certain problems in information ethics is different depending on who solves these problems. All dilemmas and problems within the framework of the considered direction of applied ethics are open, and no one can give an exact answer to the questions yet. Thus, since in the modern information society there is a direct relationship between the intensity of technological development and the growth of crises in the field of moral values and spiritual culture, information ethics already makes a serious claim to the moral regulation of human behaviour.
APA, Harvard, Vancouver, ISO, and other styles
10

Bamforth, Jill, Charles Jebarajakirthy, and Gus Geursen. "Undergraduates’ responses to factors affecting their money management behaviour: some new insights from a qualitative study." Young Consumers 18, no. 3 (August 21, 2017): 290–311. http://dx.doi.org/10.1108/yc-11-2016-00645.

Full text
Abstract:
Purpose The money management behaviour of undergraduates is a noteworthy study for many stakeholders, as these students are more likely to carry forward this behaviour into later life. The literature on student money management behaviour heavily focuses on financial literacy. However, economic, social and psychological factors also affect undergraduates’ money management behaviour. Therefore, the purpose of this study is to empirically investigate how undergraduates respond to and account for these factors in their money management behaviour. Design/methodology/approach This study was carried out in Australia. This study adopted a qualitative exploratory approach. The data were collected using six focus group discussions (FGDs) held in one Australian university, in which 40 undergraduates participated. Findings The key themes identified from the thematic analysis include undergraduates’ understanding of money management and managing economic, social and psychological aspects relating to undergraduates’ money management behaviour. Several subthemes were identified under each theme, which specifically showed how undergraduates manage and respond to each of these factors relating to their money management behaviour. Research limitations/implications This study was conducted with the data collected from a relatively small sample of respondents and was limited only to undergraduates. Moreover, this study was conducted in Australia, indicating that some of the results might be specific to the Australian context. Practical implications The authors have suggested promoting multiple payment methods and internet usage to undergraduates, and providing them with stress management programmes will help them maintain prudent money management behaviour. Originality/value The extant literature on undergraduates’ money management behaviour tends to focus on financial literacy. This study extends the scope of the literature beyond financial literacy and has shown how undergraduates respond to economic, social and psychological aspects relating to money management behaviour. This study has applied a qualitative exploratory approach, in contrast to quantitative methods which have generally been applied for studies relating to undergraduates’ money management behaviour.
APA, Harvard, Vancouver, ISO, and other styles
11

Lupton, Deborah, and Mike Michael. "“For Me, the Biggest Benefit Is Being Ahead of the Game”:The Use of Social Media in Health Work." Social Media + Society 3, no. 2 (April 2017): 205630511770254. http://dx.doi.org/10.1177/2056305117702541.

Full text
Abstract:
Using social media in the workplace raises a number of issues for any occupation. In this article, we report the findings of a study that investigated how social media are used in a field of health work. The study uses semi-structured interviews conducted by telephone with 15 participants working in communicable disease in Australia. We identified several key features shaping the use of social media. These included the sociomaterial aspects of the workplace (to what extent employees were provided with access to and allowed to use the Internet), the affordances of social media technologies (fast and real-time communication and sharing, opportunities to easily connect with peers as well as the public, and the casual tone of interactions), tacit norms and assumptions about professional behavior and social media (whether social media are considered to be appropriate tools to use for work and how they should best be used), the specific nature of people’s work (how sensitive, stigmatized, contentious, or political were the diseases they focused on), and the nature of people’s own experiences (how other social media users responded to them, what value they perceived they gained from using social media for work, and the types of networks they were able to establish). The findings of this study highlight the importance of context when considering how people use social media in the workplace.
APA, Harvard, Vancouver, ISO, and other styles
12

Marzban, Samin, Iva Durakovic, Christhina Candido, and Martin Mackey. "Learning to work from home: experience of Australian workers and organizational representatives during the first Covid-19 lockdowns." Journal of Corporate Real Estate 23, no. 3 (June 7, 2021): 203–22. http://dx.doi.org/10.1108/jcre-10-2020-0049.

Full text
Abstract:
Purpose This paper aims to provide a snapshot of workers’ experience while working from home (WFH) during the Australian lockdown in the middle of the Covid-19 pandemic. It focuses on lessons to inform organizations, employees and the design of the workspaces post-2020, human, organizational and environmental considerations may affect satisfaction, productivity and health. Design/methodology/approach Two separate surveys were designed for this study to target Australian organizations and knowledge workers. Participants included 28 organizations and 301 employees, and descriptive and correlational analyses were conducted. Findings Organizations stated productivity losses, maintaining culture and workplace health and safety concerns with WFH setup while employees were more concerned about their social interactions, internet connectivity and increased workload. Employees also found the social aspects of WFH challenging and disclosed that face-to-face interactions with their colleagues was the most important reason they wanted to return to the office. High level of trust and value was reported amongst the organizations and workers. Originality/value In the scarcity of academic literature around negative and positives of the WFH experiment during the COVID-19 pandemic, the main sources of information have been industry-focused reports. This study aims to contribute to this knowledge gap by identifying positives and negative aspects of WFH during the first wave of lockdowns in Australia in 2020 from the organization and workers’ perspective, including human, organizational and environmental considerations.
APA, Harvard, Vancouver, ISO, and other styles
13

Lanson, Klare. "TouchOn/TouchOff." Digital Culture & Society 5, no. 1 (December 1, 2019): 165–82. http://dx.doi.org/10.14361/dcs-2019-0110.

Full text
Abstract:
Abstract This article reflects upon a mobile art ethnography that sought to understand and rethink some of the tensions around regional/rural experiences of the digital. Using creative practice-based methods, it provides new insights into this regional/urban divide through the motif of working mother commuter as digital wayfarer, a term used to define on/offline digital entanglement through the lived experience of quotidian wayfaring. It contributes to debates around mobile communication and mobile media studies by connecting conceptual analysis of mobilities and its relationship to regional commuting with a creative approach to movement, play and a sense of place. Much of the academic research on mobile media and internet studies stems from an urban focus rather than engaging in the unevenness of the online as is much of the experience in the rural region of North Central Victoria, Australia. Being a working mother commuter for almost a decade, the researcher also took an autobiographical approach to aspects of this project through the lens of digital wayfaring. The artefact used ethnographic case study methods and is a creative non/ fiction sound and moving imagery work made using the mobile phone, within the context of the regional Vline train. Utilising sonified global positioning system (GPS) data as part of the soundscape, it addressed problems in the production of this train activity (i. e. work, creativity, play, rest and playbour) regarding social and material participation of the commute infrastructure and overlaid internet connections. It showed how multisensorial art-making highlights the commute to be a journey to and from - and of - work, within the ecology of the Vline train, and therefore provides new ways of perceiving this copresent, mediated and entangled digital experience.
APA, Harvard, Vancouver, ISO, and other styles
14

Bennett, Andy, and Catherine Strong. "Popular Music Heritage, Grass-Roots Activism and Web 2.0: The Case of the ‘Save the Palace’ Campaign." Cultural Sociology 12, no. 3 (July 12, 2018): 368–83. http://dx.doi.org/10.1177/1749975518762569.

Full text
Abstract:
Although the study of popular music heritage is rapidly becoming an established aspect of academic research, little attention has been focused on attempts made by groups of music fans to preserve aspects of their local popular music heritage when these are seen to come under threat. This article examines the ‘Save the Palace’ campaign in Melbourne, Australia, and argues that it provides an important illustration of the tenacity of local music fans when faced with the closure of an important venue, and their capacity to organise themselves into a cohesive campaign through social media technology. Through its examination of the online interactions that characterised the Save the Palace campaign, the article also facilitates an extension of the concept of the virtual scene beyond its more conventionally understood definition as a platform for fan discussion dedicated to a specific artist, genre or place. In the case of Save the Palace, a different manifestation of a scene is observed whereby fans of a broad range of artists and genres temporarily join forces online to protest against the threat to a specific aspect of their shared local music heritage. In this sense, Save the Palace also sheds significant light on how social media assist in giving a voice to competing discourses of cultural value. Thus, even as the Palace and countless other local music landmarks like it across the world are demolished to make way for new developments, their significance as important markers of local generational identity and belonging, and of emotionally inscribed urban identity, remains. Through their online sharing of personalised memories of the Palace as an iconic music venue, supporters of the Save the Palace campaign serve as a further example of how the internet has worked to broaden our understanding of the definition, nature and function of popular music heritage.
APA, Harvard, Vancouver, ISO, and other styles
15

Khomenko, Liliya, and Lydmila SAHER. "SEMIOTIC ANALYSIS OF LOGOS AS A MARKETING PROMOTION TOOL FOR BLOOD SERVICE ENTERPRISES." HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 298, no. 5 Part 1 (October 4, 2021): 111–17. http://dx.doi.org/10.31891/2307-5740-2021-298-5(1)-19.

Full text
Abstract:
The article conducted a comparative analysis of the blood services’ logos, identified the features of their constituent elements for the new logo’s development or existing logo’s rebranding, and suggested ways to increase their efficiency. It was found 100 logos of various blood service establishments on the Internet, in particular on the official websites of the establishments and official pages on social networks, 43 of them – Europe (12 of them – Ukraine), 13 – Asia, 19 – South and North America, 15 – Africa, 10 – Australia and Oceania. There were explored the following aspects: symbolic and font elements in the logo, the colors used and their quantity, the main messages of identity, and regional differences. There were used general scientific analytical methods and analogies and prototypes to obtain practical results during the study. This study indicates that most blood establishments in the region are characterized by combined compositions in logos – a combination of the font with a visual component but with a fairly direct connotation. The most popular colors in the blood service are red, blue, black, and white font. Logos most often use 2 colors (except white), less often 1 or 3. The following blood service symbols are most often used: a drop of blood, heart, cross, person, and hands. There is also a circle, a crescent moon, a pelican, a star, and a butterfly. They stimulate a certain type of behavior and affect feelings. The results of this research allow to create a good separation from competitors and several times increase the marketing performance of the newly formed organization or existing. Blood service institutions can use this study’s results to rebrand the organization and organizations’ owners to develop the future brand’s identity.
APA, Harvard, Vancouver, ISO, and other styles
16

Lal, Shalini, John Gleeson, Lysanne Rivard, Simon D'Alfonso, Ridha Joober, Ashok Malla, and Mario Alvarez-Jimenez. "Adaptation of a Digital Health Innovation to Prevent Relapse and Support Recovery in Youth Receiving Services for First-Episode Psychosis: Results From the Horyzons-Canada Phase 1 Study." JMIR Formative Research 4, no. 10 (October 29, 2020): e19887. http://dx.doi.org/10.2196/19887.

Full text
Abstract:
Background Developing a digital health innovation can require a substantial amount of financial and human resource investment before it can be scaled for implementation across geographical, cultural, and health care contexts. As such, there is an increased interest in leveraging eHealth innovations developed and tested in one country or jurisdiction and using these innovations in local settings. However, limited knowledge exists on the processes needed to appropriately adapt digital health innovations to optimize their transferability across geographical, cultural, and contextual settings. Objective We report on the results of an adaptation study of Horyzons, a digital health innovation originally developed and tested in Australia. Horyzons is designed to prevent relapses and support recovery in young people receiving services for first-episode psychosis (FEP). The aim of this study is to assess the initial acceptability of Horyzons and adapt it in preparation for pilot testing in Canada. Methods This research took place in 2 specialized early intervention clinics for FEP, located in 1 urban and 1 urban-rural setting, in 2 Canadian provinces. A total of 26 participants were recruited: 15 clinicians (age range 26-56 years) and 11 patients (age range 19-37 years). Following the digital health adaptation framework developed by our team, we used a mixed methods approach, combining descriptive quantitative and qualitative methods across 3 stages of data collection (focus groups, interviews, and consultations), analysis, and adaptations. Results Overall, patients and clinicians appreciated the strengths-based approach and social media features of Horyzons. However, participants expressed concerns related to implementation, especially in relation to capacity (eg, site moderation, crisis management, internet speed in rural locations). They also provided suggestions for adapting content and features, for example, in relation to community resources, volume of text, universal accessibility (eg, for individuals with limitations in vision), and optimization of platform accessibility through mobile devices. Additional aspects of the innovation were flagged for adaptation during the final stages of preparing it for live implementation. These included terms of use, time zone configuration to reflect local time and date, safety and moderation protocols, the need help now feature, and the list of trigger words to flag posts indicative of potential risk. Conclusions In the context of the COVID-19 pandemic and public health guidelines for social distancing, there is an increasing interest and need to leverage the internet and mobile technologies for delivering youth mental health services. As countries look to one another for guidance on how to navigate changing social dynamics, knowledge on how to utilize and adapt existing innovations across contexts is now more important than ever. Using a systematic approach, this study illustrates the methods, processes, results, and lessons learned on adapting a digital health innovation to enhance its local acceptability. International Registered Report Identifier (IRRID) RR2-10.2196/resprot.8810
APA, Harvard, Vancouver, ISO, and other styles
17

Wilson, Martin R. "Medical, legal and social science aspects of child sexual exploitation—a comprehensive review of pornography, prostitution and internet crime edited by Sharon Cooper, Richard Estes, Angelo Giardino, Nancy Kellog and Victor Vieth, GW Medical Publishing Inc, Missouri, 2005. 1200pp. ISBN 1-878060-37-6 (Volume 1 and 2 Casebound), £175.99." Child Abuse Review 16, no. 4 (2007): 274–76. http://dx.doi.org/10.1002/car.992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Dangor, Suleman. "An Interfaith Perspective on Globalization for the Common Good." American Journal of Islam and Society 21, no. 3 (July 1, 2004): 185–88. http://dx.doi.org/10.35632/ajis.v21i3.1790.

Full text
Abstract:
The third Annual International Conference on Globalization for theCommon Good was held on 27-31 March 2004 at the Bustan Rotana hotel, Dubai, the United Arab Emirates. More than thirty participants, representingacademics, peace activists, theologians, environmentalists, and businessmenfrom the United States, Europe, Japan, the Gulf region, Australia,and South Africa attended the eleven plenary sessions. These were dividedunder the following headings: Muslim-Christian Dialogue for the CommonGood; Religions and Social Justice; Profit and the Common Good: Conflictor Convergence?; Religions and the Common Good; Urbanization andCities in a Global Age; Globalization and Civilizations; EthicalPerspectives on Globalization; Interfaith Dialogue and Peace-building;Natural Resources, Ecology and Development; Youth in a Global Age; andScience and Technology in a Global Age. The conference was officiallyopened by the founder and chief convenor of the Interfaith Perspective onGlobalization for the Common Good, Dr Kamran Mofid of the UnitedKingdom.Dr William Lesher (Lutheran School of Theology, Chicago) in his“Pathways to Peace” identified the major factors supporting globalizationand showed how global trends become indigenized through the process ofglocalization. Sister Beatrice Mariotti’s (St. Mary’s Catholic HighSchool, Dubai) “Globalization and Christian-Muslim Spiritual Dialoguein Dubai” dealt with three challenges to cultural identity: consumerism,the Internet, and isolationism. Markus Glatz-Schmallegger (CatholicSocial Academy of Austria) argued in his “Religions Acting for ‘Bridgingand Linking Social Capital’ in the Context of Globalization,” that religion,as an organ of civil society, can contribute significantly to socialcapital.In the session on “Profit and the Common Good: Conflict or Convergence?”Kamran Mofid outlined both the negative and positive aspects ofglobalization. This was followed by a lively discussion on how globalization’sbenefits could be extended to all and not confined to a minority ofindividuals, multinationals, and states. Suleman Dangor (University ofKwazulu-Natal, South Africa) outlined the positive and negative featuresof globalization, and then elaborated on the role that religions could playin ensuring that its benefits are spread equitably while developing nationsare protected from its negative impact.Jakob von Uexkull (The Right Livelihood Awards, London, UK), in his“Global Values and Global Stability,” made a case for equitable access tothe world’s natural resources. The possibility of this happening is greaternow that we are moving to a post-secular world. Keyvan Tabari emphasizedthe importance of national sovereignty. Since the demise of the USSR ...
APA, Harvard, Vancouver, ISO, and other styles
19

Salter, Michael. "Child Sexual Abuse and Exploitation: Guest Editor’s Introduction." International Journal for Crime, Justice and Social Democracy 4, no. 2 (July 1, 2015): 1–3. http://dx.doi.org/10.5204/ijcjsd.v4i2.240.

Full text
Abstract:
One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014). Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013). These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures. This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative relationships between sexual abuse and the contexts in which it takes place. The contributions to this special issue examine how the diversity and dynamics of abuse unfold at the individual, community and social level, and across time. The issue is focused on emerging or under-recognised forms of child sexual abuse, such as organised abuse and sexual exploitation, which illustrate recent shifts in the knowledge base and require new and innovative criminological thinking.Download the PDF file from this page to find out more about this special edition.
APA, Harvard, Vancouver, ISO, and other styles
20

Palmer, Jeanne M., Carolyn Mead-Harvey, Claire Harrison, Amylou C. Dueck, Ryan Eckert, Heidi E. Kosiorek, Pablo Muxi, et al. "Impact of COVID19 Pandemic on an International MPN Patient Population: Survey Results from 1560 MPN Patients." Blood 136, Supplement 1 (November 5, 2020): 1–3. http://dx.doi.org/10.1182/blood-2020-138953.

Full text
Abstract:
Background: The COVID pandemic has resulted in significant changes many aspects of daily living. To understand the impact that COVID-19 has had on the myeloproliferative neoplasm (MPN) patient population, we conducted an internet based survey. Methods: Survey: This survey was hosted Mayo Clinic's secured REDCap system for online surveys with a link to the survey alongside a brief description posted via the www.mpnqol.com website, as well as other MPN organizational partners. Survey responses were completely anonymous. Questions included MPN-Total symptom score (TSS), NCCN distress thermometer (NCCN-DT), questions regarding impact on medical care, and questions from CDC COVID-19 community survey question bank regarding the impact of social distancing as well as changes in health behaviors. Distress thermometer, MPN-TSS, and/or questions related to the impact of COVID-19 on MPN treatment were analyzed by: MPN diagnosis, among those with ET, PV, or MF diagnoses; medication status; stay at home order; community spread; and country. Associations were tested using Kruskal-Wallis or Wilcoxon rank sum tests (for continuous variables) or Fisher Exact tests (for categorical variables). Analysis: Results: Patient Demographics (Table 1): 1560 people responded to the survey, 1217 were eligible for analysis. Median age was 62 (range: 21-93), and 298 (24.6%) respondents were male. There were respondents from USA, Australia, Canada, Netherlands, Ireland, and UK. 233 patients (19.2%) have myelofibrosis, 419 (34.6%) polycythemia vera and 543 (44.8%) essential thrombocythemia. At the time of the COVID outbreak, 1026 (84.3%) were on MPN directed medical therapy, including ruxolitinib (15.3%), interferon (14.7%), hydroxyurea (42.7%) and ASA (47.7%). 165 (13.6%) respondents received COVID testing, of which 5 had positive tests. Impact on MPN Care (Table 2): We sought to understand how patient's clinical care changed. Over half respondents who spoke to their MPN doctor had a telemedicine visit after COVID19 (57.1%). 422 (36.5%) patients spaced out visits, of which 99 (22.7%) felt there were consequences. A change in therapy due to COVID-1 occurred in only 5.4% of patients. MPN Symptom Burden and QoL: Data captured on the NCCN-DT had a median of 4 (0-10). MPN-SAF-TSS composite score was collected in 1150 respondents, median score was 26 (0-90). These scores are higher than those previously reported. Pandemic Impact on Lifestyle (Table 1): 595 (49.5%) of patients report living in a community where there is significant COVID-19 spread. 946 (78.9%) reported that COVID-19 has impacted their day to day life. 198 (17.2%) of patients agreed, or strongly agreed that COVID had a significant impact on their finances. 799 (67.8%) had a stay at home order. Of those who quarantined (112), the median duration was 30d (1-120). The majority of people increased hand-washing, and cleaning habits. 954 (81.7%) respondents reported wearing masks in public. 908 (76.8%) reported increased stress from social distancing. The majority of respondents report using healthy coping habits, such as reaching out to friends/loved ones, breathing and relaxation, as well as healthy diet. Less than 15% of patients report unhealthy coping strategies, such as use of opioids, benzodiazepines, alcohol, or cannabis Factors associated with response: There were no differences in responses based on type of MPN. If a patient was on medication, they were more likely to have spoken to their provider (p<0.001). If there was a stay at home order in place, there was a higher MPN-TSS score (p<0.001). If the respondent lived in an area of high community spread, they had a higher NCCN-DT score (p<0.001). Patients in the USA had a higher NCCN-DT score (p=0.001), were more likely to stretch out the duration of time between visits (p<0.001) and less likely to have a telemedicine visit (p<0.001). Although fewer respondents in the USA thought COVID-19 was a serious disease (p=0.02), a higher percentage of respondents wore masks (p <0.001). Conclusions: In our survey of MPN patients, there were many changes noted in clinical care. The use of telemedicine was common, and at least a third had significant changes in their care. Most experienced increased stress, however, employed healthy coping strategies. Only a minority of patients had a COVID test, and only 5 were positive, further data will be needed to understand the impact of COVID infection. Figure 1 Disclosures Harrison: Roche: Honoraria; Incyte Corporation: Speakers Bureau; Celgene: Honoraria, Research Funding, Speakers Bureau; Sierra Oncology: Honoraria; Promedior: Honoraria; Shire: Honoraria, Speakers Bureau; AOP Orphan Pharmaceuticals: Honoraria; Novartis: Honoraria, Research Funding, Speakers Bureau; Janssen: Speakers Bureau; Gilead Sciences: Honoraria, Speakers Bureau; CTI Biopharma Corp: Honoraria, Speakers Bureau. Pemmaraju:Affymetrix: Other: Grant Support, Research Funding; Plexxikon: Research Funding; Incyte Corporation: Honoraria; Roche Diagnostics: Honoraria; Blueprint Medicines: Honoraria; Novartis: Honoraria, Research Funding; SagerStrong Foundation: Other: Grant Support; DAVA Oncology: Honoraria; Samus Therapeutics: Research Funding; Cellectis: Research Funding; Daiichi Sankyo: Research Funding; Celgene: Honoraria; AbbVie: Honoraria, Research Funding; Stemline Therapeutics: Honoraria, Research Funding; MustangBio: Honoraria; LFB Biotechnologies: Honoraria; Pacylex Pharmaceuticals: Consultancy. Vannucchi:Novartis: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; Incyte: Membership on an entity's Board of Directors or advisory committees; Blueprint: Membership on an entity's Board of Directors or advisory committees; Celgene/BMS: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; AbbVie: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau. Gupta:Novartis: Consultancy, Honoraria, Membership on an entity's Board of Directors or advisory committees, Research Funding; Sierra Oncology: Consultancy, Membership on an entity's Board of Directors or advisory committees; Bristol MyersSquibb: Honoraria, Membership on an entity's Board of Directors or advisory committees; Incyte: Honoraria, Research Funding; Pfizer: Consultancy. Mascarenhas:Celgene, Prelude, Galecto, Promedior, Geron, Constellation, and Incyte: Consultancy; Incyte, Kartos, Roche, Promedior, Merck, Merus, Arog, CTI Biopharma, Janssen, and PharmaEssentia: Other: Research funding (institution). Shimoda:Kyowa Hakko Kirin Co., Ltd.: Research Funding; Pfizer Inc.: Research Funding; Otsuka Pharmaceutical: Research Funding; Celgene: Honoraria; Perseus Proteomics: Research Funding; PharmaEssentia Japan: Research Funding; AbbVie Inc.: Research Funding; Astellas Pharma: Research Funding; Merck & Co.: Research Funding; CHUGAI PHARMACEUTICAL CO., LTD.: Research Funding; Bristol-Myers Squibb: Honoraria; Takeda Pharmaceutical Company: Honoraria; Novartis: Honoraria, Research Funding; Shire plc: Honoraria; Asahi Kasei Medical: Research Funding; Japanese Society of Hematology: Research Funding; The Shinnihon Foundation of Advanced Medical Treatment Research: Research Funding. Kiladjian:AOP Orphan: Membership on an entity's Board of Directors or advisory committees; Novartis: Membership on an entity's Board of Directors or advisory committees; Abbvie: Membership on an entity's Board of Directors or advisory committees; BMS: Membership on an entity's Board of Directors or advisory committees. Komatsu:AbbVie: Other: member of safety assessment committee in M13-834 clinical trial.; Otsuka Pharmaceutical Co., Ltd., Shire Japan KK, Novartis Pharma KK, PharmaEssentia Japan KK, Fuso Pharmaceutical Industries, Ltd., Fujifilm Wako Pure Chemical Corporation, Chugai Pharmaceutical Co., Ltd., Kyowa Hakko Kirin Co., Ltd., Takeda Pharmaceutica: Research Funding; Meiji Seika Pharma Co., Ltd.: Patents & Royalties: PCT/JP2020/008434, Research Funding; PPMX: Consultancy, Research Funding; Otsuka Pharmaceutical Co., Ltd., PharmaEssentia Japan KK, AbbVie GK, Celgene KK, Novartis Pharma KK, Shire Japan KK, Japan Tobacco Inc: Consultancy; Takeda Pharmaceutical Co., Ltd, Novartis Pharma KK, Shire Japan KK: Speakers Bureau. Abello:Takeda: Honoraria, Research Funding; Novartis: Consultancy, Honoraria; Amgen: Consultancy, Research Funding; Dr. Reddy's: Consultancy, Research Funding; Abbvie: Consultancy, Research Funding. Gomez-Almaguer:Amgen: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; Novartis: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; AbbVie: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; Janssen: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; Celgene/BMS: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; AstraZeneca: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; Pfizer: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau; Roche: Membership on an entity's Board of Directors or advisory committees, Speakers Bureau. Scherber:Incyte Corporation: Current Employment, Current equity holder in publicly-traded company. Mauro:Novartis: Consultancy, Honoraria, Other: Travel, Accommodation, Expenses, Research Funding; Bristol-Myers Squibb: Consultancy, Honoraria, Other: Travel, Accommodation, Expenses, Research Funding; Sun Pharma/SPARC: Research Funding; Takeda: Consultancy, Honoraria, Other: Travel, Accommodation, Expenses, Research Funding; Pfizer: Consultancy, Honoraria, Other: Travel, Accommodation, Expenses, Research Funding. Mesa:Samus Therapeutics: Research Funding; Novartis: Consultancy; Genentech: Research Funding; Incyte: Research Funding; Bristol Myers Squibb: Research Funding; AbbVie: Research Funding; CTI BioPharma: Research Funding; Sierra Oncology: Consultancy; LaJolla Pharmaceutical Company: Consultancy; Promedior: Research Funding.
APA, Harvard, Vancouver, ISO, and other styles
21

Döring, Nicola, and Dan J. Miller. "Performer Bodily Appearance (Portrayals of Sexuality in Pornography)." DOCA - Database of Variables for Content Analysis, October 24, 2022. http://dx.doi.org/10.34778/5p.

Full text
Abstract:
Pornography is a fictional media genre that depicts sexual fantasies and explicitly presents naked bodies and sexual activities for the purpose of sexual arousal (Williams, 1989; McKee et al., 2020). Regarding media ethics and media effects, pornography has traditionally been viewed as highly problematic. Pornographic material has been accused of portraying sexuality in unhealthy, morally questionable and often sexist ways, thereby harming performers, audiences, and society at large. In the age of the Internet, pornography has become more diverse, accessible, and widespread than ever (Döring, 2009; Miller et al., 2020). Consequently, the depiction of sexuality in pornography is the focus of a growing number of content analyses of both mass media (e.g., erotic and pornographic novels and movies) and social media (e.g., erotic and pornographic stories, photos and videos shared via online platforms). Typically, pornography’s portrayals of sexuality are examined by measuring the prevalence and frequency of sexual practices or relational dynamics and related gender roles via quantitative content analysis (for research reviews see Carrotte et al., 2020; Miller & McBain, 2022). This entry focuses on the representation of performer bodily appearance as one of eight important dimensions of the portrayals of sexuality in pornography. Field of application/theoretical foundation: In the field of pornographic media content research, different theories are used, mainly 1) general media effects theories, 2) sexual media effects theories, 3) gender role, feminist and queer theories, 4) sexual fantasy and desire theories, and different 5) mold theories versus mirror theories. The DOCA entry “Conceptual Overview (Portrayals of Sexuality in Pornography)” introduces all these theories and explains their application to pornography. The respective theories are applicable to the analysis of the depiction of performer bodily appearance as one dimension of the portrayals of sexuality in pornography. References/combination with other methods of data collection: Manual quantitative content analyses of pornographic material can be combined with qualitative (e.g., Keft-Kennedy, 2008) as well as computational (e.g., Seehuus et al., 2019) content analyses. Furthermore, content analyses can be complemented with qualitative interviews and quantitative surveys to investigate perceptions and evaluations of the portrayals of sexuality in pornography among pornography’s creators and performers (e.g., West, 2019) and audiences (e.g., Cowan & Dunn, 1994; Hardy et al., 2022; Paasoonen, 2021; Shor, 2022). Additionally, experimental studies are helpful to measure directly how different dimensions of pornographic portrayals of sexuality are perceived and evaluated by recipients, and if and how these portrayals can affect audiences’ sexuality-related thoughts, feelings, and behaviors (e.g., Kohut & Fisher, 2013; Miller et al., 2019). Example studies for manual quantitative content analyses: Common research hypotheses state that performers in pornography are mainly selected and presented to conform to gendered norms of sexual attractiveness but also potentially unhealthy beauty standards or current beauty trends. To test such hypotheses and code pornographic material accordingly, it is necessary to clarify the concept of “performer bodily appearance” and use valid and reliable measures for different aspects of appearance. In addition, it is necessary to code the sex/gender of the persons depicted. Two different approaches to coding are available: Direct coding based on the performer’s appearance (e.g., breast size) versus indirect coding based on meta-information about the material, such as the sub-genre pornography category the material belongs to (e.g., the “big tits”, “BBW” [big beautiful women], “tattoed women” categories on PornHub) or statistics provided as part of performer profiles published on online platforms (e.g., height, weight, bra or penis size). Coding Material Measure Operationalization (excerpt) Reliability Source Performer Bodily Appearance: Among the many aspects of performer appearance, those conventionally related to sexual attractiveness are measured most often in the context of pornography research. Researchers may also measure variables related to general beauty trends in society (e.g., shaving of pubic and body hair) or assess aspects of performer appearance which could be consider to promote unhealthy/unrealistic beauty standards (e.g., performers being unhealthily underweight or extremely muscular). Apart from issues of performer health protection, unhealthy standards of beauty and sexual attractiveness are also regarded as relevant in terms of modelling behaviors for audiences. N=50 best-selling pornographic videos and DVDs in Australia in 2003 with 838 sexual scenes Performer body type Performer body type. Polytomous coding (1: unhealthy underweight; 2: slim / undertoned; 3: average (untoned); 4: average (toned); 5: bulked up / very muscular; 6: overweight). Not available McKee et al. (2008) Performer breast size Performer breast size. Polytomous coding (1: smaller than average breasts; 2: average-sized breasts; 3: larger than average breasts). Performer breast surgery Performer breast surgery is obvious. Polytomous coding (1: yes; 2: no; 3: unsure). Performer penis size Performer penis size. Polytomous coding (1: smaller than average penis; 2: average-sized penis; 3: larger than average penis). N > 6,900 performer profiles from 10 gay male adult websites Performer penis size Performer penis size (as listed in performer profile). Polytomous coding (1: 5–6.5 inches; 2: 7–8 inches, 3: 8.5–10 inches, 4: 10.5–13 inches) Not available Brennan (2018) N=50 MILF [“Mother I’d like to fuck” sub-genre category] and 50 “Teen” pornographic videos randomly selected from 10 different adult websites (10 videos per website) Performer pubic hair Performer pubic hair. Polytomous coding (1: none; 2. groomed; 3: natural). Percentage agreement across all variables in codebook: 90.3% Vannier et al. (2014) References Brennan, J. (2018). Size matters: Penis size and sexual position in gay porn profiles. Journal of Homosexuality, 65(7), 912-933. https://doi.org/10.1080/00918369.2017.1364568 Carrotte, E. R., Davis, A. C., & Lim, M. S. (2020). Sexual behaviors and violence in pornography: Systematic review and narrative synthesis of video content analyses. Journal of Medical Internet Research, 22(5), Article e16702. https://doi.org/10.2196/16702 Cowan, G., & Dunn, K. F. (1994). What themes in pornography lead to perceptions of the degradation of women? Journal of Sex Research, 31(1), 11–21. https://doi.org/10.1080/00224499409551726 Döring, N. (2009). The Internet’s impact on sexuality: A critical review of 15 years of research. Computers in Human Behavior, 25(5), 1089–1101. https://doi.org/10.1016/j.chb.2009.04.003 Hardy, J., Kukkonen, T., & Milhausen, R. (2022). Examining sexually explicit material use in adults over the age of 65 years. The Canadian Journal of Human Sexuality, 31(1), 117–129. https://doi.org/10.3138/cjhs.2021-0047 Keft-Kennedy, V. (2008). Fantasising masculinity in Buffyverse slash fiction: Sexuality, violence, and the vampire. Nordic Journal of English Studies, 7(1), 49–80. Kohut, T., & Fisher, W. A. (2013). The impact of brief exposure to sexually explicit video clips on partnered female clitoral self-stimulation, orgasm and sexual satisfaction. The Canadian Journal of Human Sexuality, 22(1), 40–50. https://doi.org/10.3138/cjhs.935 McKee, A., Albury, K., & Lumby, C. (2008). The porn report. Melbourne University Press. McKee, A., Byron, P., Litsou, K., & Ingham, R. (2020). An interdisciplinary definition of pornography: Results from a global Delphi panel. Archives of Sexual Behavior, 49(3), 1085–1091. https://doi.org/10.1007/s10508-019-01554-4 Miller, D. J., & McBain, K. A. (2022). The content of contemporary, mainstream pornography: A literature review of content analytic studies. American Journal of Sexuality Education, 17(2), 219–256. https://doi.org/10.1080/15546128.2021.2019648 Miller, D. J., McBain, K. A., & Raggatt, P. T. F. (2019). An experimental investigation into pornography’s effect on men’s perceptions of the likelihood of women engaging in porn-like sex. Psychology of Popular Media Culture, 8(4), 365–375. https://doi.org/10.1037/ppm0000202 Miller, D. J., Raggatt, P. T. F., & McBain, K. (2020). A literature review of studies into the prevalence and frequency of men’s pornography use. American Journal of Sexuality Education, 15(4), 502–529. https://doi.org/10.1080/15546128.2020.1831676 Paasonen, S. (2021). “We watch porn for the fucking, not for romantic tiptoeing”: Extremity, fantasy and women’s porn use. Porn Studies, 1–14. https://doi.org/10.1080/23268743.2021.1956366 Seehuus, M., Stanton, A. M., & Handy, A. B. (2019). On the content of "real-world" sexual fantasy: Results from an analysis of 250,000+ anonymous text-based erotic fantasies. Archives of Sexual Behavior, 48(3), 725–737. https://doi.org/10.1007/s10508-018-1334-0 Shor, E. (2022). Who seeks aggression in pornography? Findings from interviews with viewers. Archives of Sexual Behavior, 51(2), 1237–1255. https://doi.org/10.1007/s10508-021-02053-1 Vannier, S. A., Currie, A. B., & O'Sullivan, L. F. (2014). Schoolgirls and soccer moms: A content analysis of free “teen” and “MILF” online pornography. Journal of Sex Research, 51(3), 253-264. https://doi.org/10.1080/00224499.2013.829795 West, C. (2019). Pornography and ethics: An interview with porn performer Blath. Porn Studies, 6(2), 264–267. https://doi.org/10.1080/23268743.2018.1505540 Williams, L. (1989). Hard Core: Power, pleasure, and the frenzy of the visible. University of California Press.
APA, Harvard, Vancouver, ISO, and other styles
22

Chen, Peter. "Community without Flesh." M/C Journal 2, no. 3 (May 1, 1999). http://dx.doi.org/10.5204/mcj.1750.

Full text
Abstract:
On Wednesday 21 April the Minister for Communications, Information Technology and the Arts introduced a piece of legislation into the Australian Senate to regulate the way Australians use the Internet. This legislation is presented within Australia's existing system of content regulation, a scheme that the Minister describes is not censorship, but merely regulation (Alston 55). Underlying Senator Alston's rhetoric about the protection of children from snuff film makers, paedophiles, drug pushers and other criminals, this long anticipated bill is aimed at reducing the amount of pornographic materials available via computer networks, a censorship regime in an age when regulation and classification are the words we prefer to use when society draws the line under material we want to see, but dare not allow ourselves access to. Regardless of any noble aspirations expressed by free-speech organisations such as Electronic Frontiers Australia relating to the defence of personal liberty and freedom of expression, this legislation is about porn. Under the Bill, Australia would proscribe our citizens from accessing: explicit depictions of sexual acts between consenting adults; mild non-violent fetishes; depictions of sexual violence, coercion or non-consent of any kind; depictions of child sexual abuse, bestiality, sexual acts accompanied by offensive fetishes, or exploitative incest fantasies; unduly detailed and/or relished acts of extreme violence or cruelty; explicit or unjustifiable depictions of sexual violence against non-consenting persons; and detailed instruction or encouragement in matters of crime or violence or the abuse of proscribed drugs. (OFLC) The Australian public, as a whole, favour the availability of sexually explicit materials in some form, with OFLC data indicating a relatively high degree of public support for X rated videos, the "high end" of the porn market (Paterson et al.). In Australia strict regulation of X rated materials in conventional media has resulted in a larger illegal market for these materials than the legalised sex industries of the ACT and Northern Territory (while 1.2 million X rated videos are legally sold out of the territories, 2 million are sold illegally in other jurisdictions, according to Patten). In Australia, censorship of media content has traditionally been based on the principles of the protection of society from moral harm and individual degradation, with specific emphasis on the protection of innocents from material they are not old enough for, or mentally capable of dealing with (Joint Select Committee on Video Material). Even when governments distanced themselves from direct personal censorship (such as Don Chipp's approach to the censorship of films and books in the late 1960s and early 1970s) and shifted the rationale behind censorship from prohibition to classification, the publicly stated aims of these decisions have been the support of existing community standards, rather than the imposition of strict legalistic moral values upon an unwilling society. In the debates surrounding censorship, and especially the level of censorship applied (rather than censorship as a whole), the question "what is the community we are talking about here?" has been a recurring theme. The standards that are applied to the regulation of media content, both online and off, are often the focus of community debate (a pluralistic community that obviously lacks "standards" by definition of the word). In essence the problem of maintaining a single set of moral and ethical values for the treatment of media content is a true political dilemma: a problem that lacks any form of solution acceptable to all participants. Since the introduction of the Internet as a "mass" medium (or more appropriately, a "popular" one), government indecision about how best to treat this new technology has precluded any form or content regulation other than the ad hoc use of existing non-technologically specific law to deal with areas of criminal or legally sanctionable intent (such as the use of copyright law, or the powers under the Crimes Act relating to the improper use of telecommunications services). However, indecision in political life is often associated with political weakness, and in the face of pressure to act decisively (motivated again by "community concern"), the Federal government has decided to extend the role of the Australian Broadcasting Authority to regulate and impose a censorship regime on Australian access of morally harmful materials. It is important to note the government's intention to censor access, rather than content of the Internet. While material hosted in Australia (ignoring, of course, the "cyberspace" definitions of non-territorial existence of information stored in networks) will be censored (removed from Australia computers), the government, lacking extraterritorial powers to compel the owners of machines located offshore, intends to introduce of some form of refused access list to materials located in other nations. What is interesting to consider in this context is the way that slight shifts of definitional paradigm alter the way this legislation can be considered. If information flows (upon which late capitalism is becoming more dependent) were to be located within the context of international law governing the flow of waterways, does the decision to prevent travel of morally dubious material through Australia's informational waterways impinge upon the riparian rights of other nations (the doctrine of fair usage without impeding flow; Godana 50)? Similarly, if we take Smith's extended definition of community within electronic transactional spaces (the maintenance of members' commitment to the group, monitoring and sanctioning behaviour and the production and distribution of resources), then the current Bill proposes the regulation of the activities of one community by another (granted, a larger community that incorporates the former). Seen in this context, this legislation is the direct intervention in an established social order by a larger and less homogeneous group. It may be trite to quote the Prime Minister's view of community in this context, where he states ...It is free individuals, strong communities and the rule of law which are the best defence against the intrusive power of the state and against those who think they know what is best for everyone else. (Howard 21) possibly because the paradigm in which this new legislation is situated does not classify those Australians online (who number up to 3 million) as a community in their own right. In a way the Internet users of Australia have never identified themselves as a community, nor been asked to act in a communitarian manner. While discussions about the value of community models when applied to the Internet are still divided, there are those who argue that their use of networked services can be seen in this light (Worthington). What this new legislation does, however, is preclude the establishment of public communities in order to meet the desires of government for some limits to be placed on Internet content. The Bill does allow for the development of "restricted access systems" that would allow pluralistic communities to develop and engage in a limited amount of self-regulation. These systems include privately accessible Intranets, or sites that restrict access through passwords or some other form of age verification technique. Thus, ignoring the minimum standards that will be required for these communities to qualify for some measure of self-regulatory freedom, what is unspoken here is that specific subsections of the Internet population may exist, provided they keep well away from the public gaze. A ghetto without physical walls. Under the Bill, a co-regulatory approach is endorsed by the government, favouring the establishment of industry codes of practice by ISPs and (or) the establishment of a single code of practice by the content hosting industry (content developers are relegated to yet undetermined complementary state legislation). However, this section of the Bill, in mandating a range of minimum requirements for these codes of practice, and denying plurality to the content providers, places an administrative imperative above any communitarian spirit. That is, that the Internet should have no more than one community, it should be an entity bound by a single guiding set of principles and be therefore easier to administer by Australian censors. This administrative imperative re-encapsulates the dilemma faced by governments dealing with the Internet: that at heart, the broadcast and print press paradigms of existing censorship regimes face massive administrative problems when presented with a communications technology that allows for wholesale publication of materials by individuals. Whereas the limited numbers of broadcasters and publishers have allowed the development of Australia's system of classification of materials (on a sliding scale from G to RC classifications or the equivalent print press version), the new legislation introduced into the Senate uses the classification scheme simply as a censorship mechanism: Internet content is either "ok" or "not ok". From a public administration perspective, this allows government to drastically reduce the amount of work required by regulators and eases the burden of compliance costs by ISPs, by directing clear and unambiguous statements about the acceptability of existing materials placed online. However, as we have seen in other areas of social policy (such as the rationalisation of Social Security services or Health), administrative expedience is often antipathetic to small communities that have special needs, or cultural sensitivities outside of mainstream society. While it is not appropriate to argue that public administration creates negative social impacts through expedience, what can be presented is that, where expedience is a core aim of legislation, poor administration may result. For many Australian purveyors of pornography, my comments will be entirely unhelpful as they endeavour to find effective ways to spoof offshore hosts or bone up (no pun intended) on tunnelling techniques. Given the easy way in which material can be reconstituted and relocated on the Internet, it seems likely that some form of regulatory avoidance will occur by users determined not to have their content removed or blocked. For those regulators given the unenviable task of censoring Internet access it may be worthwhile quoting from Sexing the Cherry, in which Jeanette Winterson describes the town: whose inhabitants are so cunning that to escape the insistence of creditors they knock down their houses in a single night and rebuild them elsewhere. So the number of buildings in the city is always constant but they are never in the same place from one day to the next. (43) Thus, while Winterson saw this game as a "most fulfilling pastime", it is likely to present real administrative headaches to ABA regulators when attempting to enforce the Bill's anti-avoidance clauses. The Australian government, in adapting existing regulatory paradigms to the Internet, has overlooked the informal communities who live, work and play within the virtual world of cyberspace. In attempting to meet a perceived social need for regulation with political and administrative expedience, it has ignored the potentially cohesive role of government in developing self-regulating communities who need little government intervention to produce socially beneficial outcomes. In proscribing activity externally to the realm in which these communities reside, what we may see is a new type of community, one whose desire for a feast of flesh leads them to evade the activities of regulators who operate in the "meat" world. What this may show us is that in a virtual environment, the regulators' net is no match for a world wide web. References Alston, Richard. "Regulation is Not Censorship." The Australian 13 April 1999: 55. Paterson, K., et. al. Classification Issues: Film, Video and Television. Sydney: The Office of Film and Literature Classification, 1993. Patten, F. Personal interview. 9 Feb. 1999. Godana, B.A. Africa's Shared Water Resources: Legal and Institutional Aspects of the Nile, Niger and Senegal River Systems. London: Frances Pinter, 1985. Howard, John. The Australia I Believe In: The Values, Directions and Policy Priorities of a Coalition Government Outlined in 1995. Canberra: Liberal Party, 1995. Joint Select Committee On Video Material. Report of the Joint Select Committee On Video Material. Canberra: APGS, 1988. Office of Film and Literature Classification. Cinema & Video Ratings Guide. 1999. 1 May 1999 <http://www.oflc.gov.au/classinfo.php>. Smith, Marc A. "Voices from the WELL: The Logic of the Virtual Commons." 1998. 2 Mar. 1999 <http://www.sscnet.ucla.edu/soc/csoc/papers/voices/Voices.htm>. Winterson, Jeanette. Sexing the Cherry. New York: Vintage Books. 1991. Worthington, T. Testimony before the Senate Select Committee on Information Technologies. Unpublished, 1999. Citation reference for this article MLA style: Peter Chen. "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/bill.php>. Chicago style: Peter Chen, "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]). APA style: Author. (1999) Community without flesh: first thoughts on the new broadcasting services amendment (online services) bill 1999. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
23

Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2602.

Full text
Abstract:
Introduction As the country with the fifth largest population in the world, Indonesia is a massive potential market for mobile technology adoption and development. Despite an annual per capita income of only $1,280 USD (World Bank), there are 63 million mobile phone users in Indonesia (Suhartono, sec. 1.7) and it is predicted to reach 80 million in 2007 (Jakarta Post 1). Mobile phones are not only a symbol of Indonesian modernity (Barendregt 5), but like other communication technology can become a platform through which to explore socio-political issues (Winner 28). In this article we explore the role mobile phone technology in contemporary forms of social, intimate, and sexual relationships in Indonesia. We argue that new forms of expression and relations are facilitated by the particular features of mobile technology. We discuss two cases from contemporary Indonesia: a mobile dating service (BEDD) and mobile phone pornography. For each case study, we first discuss the socio-political background in Indonesia, then describe the technological affordances of the mobile phone which facilitate dating and pornography, and finally give examples of how the mobile phone is effecting change in dating and pornographic practices. This study is placed at a time when social relations, intimacy, and sexuality in Indonesia have become central public issues. Since the end of the New Order whilst many people have embraced the new freedoms of reformasi and democratization, there is also a high degree of social anxiety, tension and uncertainty (Juliastuti 139-40). These social changes and desires have played out in the formations of new and exciting modes of creativity, solidarity, and sociality (Heryanto and Hadiz 262) and equally violence, terror and criminality (Heryanto and Hadiz 256). The diverse and plural nature of Indonesian society is alive with a myriad of people and activities, and it is into this diverse social body that the mobile phone has become a central and prominent feature of interaction. The focus of our study is dating and pornography as mediated by the mobile phone; however, we do not suggest that these are new experiences in Indonesia. Rather over the last decade social, intimate, and sexual relationships have all been undergoing change and their motivations can be traced to a variety of sources including the factors of globalization, democratization and modernization. Throughout Asia “new media have become a crucial site for constituting new Asian sexual identities and communities” (Berry, Martin, and Yue 13) as people are connecting through new communication technologies. In this article we suggest that mobile phone technology opens new possibilities and introduces new channels, dynamics, and intensities of social interaction. Mobile phones are particularly powerful communication tools because of their mobility, accessibility, and convergence (Ling 16-19; Ito 14-15; Katz and Aakhus 303). These characteristics of mobile phones do not in and of themselves bring about any particular changes in dating and pornography, but they may facilitate changes already underway (Barendegt 7-9; Barker 9). Mobile Dating Background The majority of Indonesians in the 1960s and 1970s had arranged marriages (Smith-Hefner 443). Education reform during the 70s and 80s encouraged more women to attain an education which in turn led to the delaying of marriage and the changing of courtship practices (Smith-Hefner 450). “Compared to previous generations, [younger Indonesians] are freer to mix with the opposite sex and to choose their own marriage,” (Utomo 225). Modern courtship in Java is characterized by “self-initiated romance” and dating (Smith-Hefner 451). Mobile technology is beginning to play a role in initiating romance between young Indonesians. Technology One mobile matching or dating service available in Indonesia is called BEDD (www.bedd.com). BEDD is a free software for mobile phones in which users fill out a profile about themselves and can meet BEDD members who are within 20-30 feet using a Bluetooth connection on their mobile devices. BEDD members’ phones automatically exchange profile information so that users can easily meet new people who match their profile requests. BEDD calls itself mobile social networking community; “BEDD is a new Bluetooth enabled mobile social medium that allows people to meet, interact and communicate in a new way by letting their mobile phones do all the work as they go throughout their day.” As part of a larger project on mobile social networking (Humphreys 6), a field study was conducted of BEDD users in Jakarta, Indonesia and Singapore (where BEDD is based) in early 2006. In-depth interviews and open-ended user surveys were conducted with users, BEDD’s CEO and strategic partners in order to understand the social uses and effects BEDD. The majority of BEDD members (which topped 100,000 in January 2006) are in Indonesia thanks to a partnership with Nokia where BEDD came pre-installed on several phone models. In management interviews, both BEDD and Nokia explained that they partnered because both companies want to help “build community”. They felt that Bluetooth technology such as BEDD could be used to help youth meet new people and keep in touch with old friends. Examples One of BEDD’s functions is to help lower barriers to social interaction in public spaces. By sharing profile information and allowing for free text messaging, BEDD can facilitate conversations between BEDD members. According to users, mediating the initial conversation also helps to alleviate social anxiety, which often accompanies meeting new people. While social mingling and hanging out between Jakarta teenagers is a relatively common practice, one user said that BEDD provides a new and fun way to meet and flirt. In a society that must balance between an “idealized morality” and an increasingly sexualized popular culture (Utomo 226), BEDD provides a modern mode of self-initiated matchmaking. While BEDD was originally intended to aid in the matchmaking process of dating, it has been appropriated into everyday life in Indonesia because of its interpretive flexibility (Pinch & Bjiker 27). Though BEDD is certainly used to meet “beautiful girls” (according to one Indonesian male user), it is also commonly used to text message old friends. One member said he uses BEDD to text his friends in class when the lecture gets boring. BEDD appears to be a helpful modern communication tool when people are physically proximate but cannot easily talk to one another. BEDD can become a covert way to exchange messages with people nearby for free. Another potential explanation for BEDD’s increasing popularity is its ability to allow users to have private conversations in public space. Bennett notes that courtship in private spaces is seen as dangerous because it may lead to sexual impropriety (154). Dating and courtship in public spaces are seen as safer, particularly for conserving the reputation young Indonesian women. Therefore Bluetooth connections via mobile technologies can be a tool to make private social connections between young men and women “safer”. Bluetooth communication via mobile phones has also become prevalent in more conservative Muslim societies (Sullivan, par. 7; Braude, par. 3). There are, however, safety concerns about meeting strangers in public spaces. When asked, “What advice would you give a first time BEDD user?” one respondent answered, “harus bisa mnilai seseorang krn itu sangat penting, kita mnilai seseorang bukan cuma dari luarnya” (translated: be careful in evaluating (new) people, and don’t ever judge the book by its cover”). Nevertheless, only one person participating in this study mentioned this concern. To some degree meeting someone in a public may be safer than meeting someone in an online environment. Not only are there other people around in public spaces to physically observe, but co-location means there may be some accountability for how BEDD members present themselves. The development and adoption of matchmaking services such as BEDD suggests that the role of the mobile phone in Indonesia is not just to communicate with friends and family but to act as a modern social networking tool as well. For young Indonesians BEDD can facilitate the transfer of social information so as to encourage the development of new social ties. That said, there is still debate about exactly whom BEDD is connecting and for what purposes. On one hand, BEDD could help build community in Indonesia. One the other hand, because of its privacy it could become a tool for more promiscuous activities (Bennett 154-5). There are user profiles to suggest that people are using BEDD for both purposes. For example, note what four young women in Jakarta wrote in the BEDD profiles: Personal Description Looking For I am a good prayer, recite the holy book, love saving (money), love cycling… and a bit narcist. Meaning of life Ordinary gurl, good student, single, Owen lover, and the rest is up to you to judge. Phrenz ?! Peace?! Wondeful life! I am talkative, have no patience but so sweet. I am so girly, narcist, shy and love cute guys. Check my fs (Friendster) account if you’re so curious. Well, I am just an ordinary girl tho. Anybody who wants to know me. A boy friend would be welcomed. Play Station addict—can’t live without it! I am a rebel, love rock, love hiphop, naughty, if you want proof dial 081********* phrenz n cute guyz As these profiles suggest, the technology can be used to send different kinds of messages. The mobile phone and the BEDD software merely facilitate the process of social exchange, but what Indonesians use it for is up to them. Thus BEDD and the mobile phone become tools through which Indonesians can explore their identities. BEDD can be used in a variety of social and communicative contexts to allow users to explore their modern, social freedoms. Mobile Pornography Background Mobile phone pornography builds on a long tradition of pornography and sexually explicit material in Indonesia through the use of a new technology for an old art and product. Indonesia has a rich sexual history with a documented and prevalent sex industry (Suryakusuma 115). Lesmana suggests that the country has a tenuous pornographic industry prone to censorship and nationalist politics intent on its destruction. Since the end of the New Order and opening of press freedoms there has been a proliferation in published material including a mushrooming of tabloids, men’s magazines such as FHM, Maxim and Playboy, which are often regarded as pornographic. This is attributed to the decline of the power of the bureaucracy and government and the new role of capital in the formation of culture (Chua 16). There is a parallel pornography industry, however, that is more amateur, local, and homemade (Barker 6). It is into this range of material that mobile phone pornography falls. Amongst the myriad forms of pornography and sexually explicit material available in Indonesia, the mobile phone in recent years has emerged as a new platform for production, distribution, and consumption. This section will not deal with the ethics of representation nor engage with the debate about definitions and the rights and wrongs of pornography. Instead what will be shown is how the mobile phone can be and has been used as an instrument/medium for the production and consumption of pornography within contemporary social relationships. Technology There are several technological features of the mobile phone that make pornography possible. As has already been noted the mobile phone has had a large adoption rate in Indonesia, and increasingly these phones come equipped with cameras and the ability to send data via MMS and Bluetooth. Coupled with the mobility of the phone, the convergence of technology in the mobile phone makes it possible for pornography to be produced and consumed in a different way than what has been possible before. It is only recently that the mobile phone has been marketed as a video camera with the release of the Nokia N90; however, quality and recording time are severely limited. Still, the mobile phone is a convenient and at-hand tool for the production and consumption of individually made, local, and non-professional pieces of porn, sex and sexuality. It is impossible to know how many such films are in circulation. A number of websites that offer these films for downloads host between 50 and 100 clips in .3gp file format, with probably more in actual circulation. At the very least, this is a tenfold increase in number compared to the recent emergence of non-professional VCD films (Barker 3). This must in part be attributed to the advantages that the mobile phone has over standard video cameras including cost, mobility, convergence, and the absence of intervening data processing and disc production. Examples There are various examples of mobile pornography in Indonesia. These range from the pornographic text message sent between lovers to the mobile phone video of explicit sexual acts (Barendregt 14-5). The mobile phone affords privacy for the production and exchange of pornographic messages and media. Because mobile devices are individually owned, however, pornographic material found on mobile phones can be directly tied to the individual owners. For example, police in Kotabaru inspected the phones of high school students in search of pornographic materials and arrested those individuals on whose phones it was found (Barendregt 18). Mobile phone pornography became a national political issue in 2006 when an explicit one-minute clip of a singer and an Indonesian politician became public. Videoed in 2004, the clip shows Maria Eva, a 27 year-old dangdut singer (see Browne, 25-6) and Yahya Zaini, a married 42 year-old who was head of religious affairs for the Golkar political party. Their three-year affair ended in 2005, but the film did not become public until 2006. It spread like wildfire between phones and across the internet, however, and put an otherwise secret relationship into the limelight. These types of affairs and relationships were common knowledge to people through gossip, exposes such as Jakarta Undercover (Emka 93-108) and stories in tabloids; yet this culture of adultery and prostitution continued and remained anonymous because of bureaucratic control of evidence and information (Suryakusuma 115). In this case, however, the filming of Maria Eva once public proves the identities of those involved and their infidelity. As a result of the scandal it was further revealed that Maria Eva had been forced by Yayha Zaini and his wife to have an abortion, deepening the moral crisis. Yahya Zaini later resigned as his party’s head of Religious Affairs (Asmarani, sec. 1-2), due to what was called the country’s “first real sex scandal” (Naughton, par. 2). As these examples show, there are definite risks and consequences involved in the production of mobile pornography. Even messages/media that are meant to be shared between two consenting individuals can eventually make their way into the public mobile realm and have serious consequences for those involved. Mobile video and photography does, however, represent a potential new check on the Indonesian bureaucratic elite which has not been previously available by other means such as a watchdog media. “The role of the press as a control mechanism is practically nonexistent [in Jakarta], which in effect protects corruption, nepotism, financial manipulation, social injustice, and repression, as well as the murky sexual life of the bureaucratic power elite,” (Suryakusuma 117). Thus while originally a mobile video may have been created for personal pleasure, through its mass dissemination via new media it can become a means of sousveillance (Mann, Nolan and Wellman 332-3) whereby the control of surveillance is flipped to reveal the often hidden abuses of power by officials. Whilst the debates over pornography in Indonesia tend to focus on the moral aspects of it, the broader social impacts of technology on relationships are often ignored. Issues related to power relations or even media as cultural expression are often disregarded as moral judgments cast a heavy shadow over discussions of locally produced Indonesian mobile pornography. It is possible to move beyond the moral critique of pornographic media to explore the social significance of its proliferation as a cultural product. Conclusion In these two case studies we have tried to show how the mobile phone in Indonesia has become a mode of interaction but also a platform through which to explore other current issues and debates related to dating, sexuality and media. Since 1998 and the fall of the New Order, Indonesia has been struggling with blending old and new, a desire of change and nostalgia for past, and popular desire for a “New Indonesia” (Heryanto, sec. Post-1998). Cultural products within Indonesia have played an important role in exploring these issues. The mobile phone in Indonesia is not just a technology, but also a product in and through which these desires are played out. Changes in dating and pornography practices have been occurring in Indonesia for some time. As people use mobile technology to produce, communicate, and consume, the device becomes intricately related to identity struggle and cultural production within Indonesia. It is important to keep in mind, however, that while mobile technology adoption within Indonesia is growing, it is still limited to a particular subset of the population. As has been previously observed (Barendregt 3), it is wealthier, young people in urban areas who are most intensely involved in mobile technology. As handset prices decrease and availability in rural areas increases, however, no longer will mobile technology be so demographically confined in Indonesia. The convergent technology of the mobile phone opens many possibilities for creative adoption and usage. As a communication device it allows for the creation, sharing, and viewing of messages. Therefore, the technology itself facilitates social connections and networking. As demonstrated in the cases of dating and pornography, the mobile phone is both a tool for meeting new people and disseminating sexual messages/media because it is a networked technology. The mobile phone is not fundamentally changing dating and pornography practices, but it is accelerating social and cultural trends already underway in Indonesia by facilitating the exchange and dissemination of messages and media. As these case studies show, what kinds of messages Indonesians choose to create and share are up to them. The same device can be used for relatively innocuous behavior as well as more controversial behavior. With increased adoption in Indonesia, the mobile will continue to be a lens through which to further explore modern socio-political issues. References Asmarani, Devi. “Indonesia: Top Golkar Official Quits over Sex Video.” The Straits Times 6 Dec. 2006. Barendregt, Bart. “Between M-Governance and Mobile Anarchies: Pornoaksi and the Fear of New Media in Present Day Indonesia.” European Association of Social Anthropologists Media Anthropology Network e-Seminar Series, 2006. Barker, Thomas. “VCD Pornography of Indonesia.” Asian Studies Association of Australia, Wollongong, 2006. BEDD Press Release. “World’s First Mobile Communities Software Is Bringing People Together in Singapore.” 8 June 2004. Bennett, Linda Rae. Women, Islam and Modernity: Single Women, Sexuality and Reproductive Health in Contemporary Indonesia. London: Routledge Curzon, 2005. Berry, Chris, Fran Martin, and Audrey Yue, eds. Mobile Cultures: New Media in Queer Asia. Durham, NC: Duke UP, 2003. Braude, Joseph. “How Bluetooth Helps Young Kuwaitis Get It On.” The New Republic Online 14 Sep. 2006. Browne, Susan. “The Gender Implications of Dangdut Kampungan: Indonesian ‘Low Class’ Popular Music.”* *Working Paper 109, Centre of Southeast Asian Studies, Monash University. 2000. Chua, Beng-Huat. “Consuming Asians: Ideas and Issues.” Consumption in Asia: Lifestyles and Identities. Ed. Beng-Huat Chua. London: Routledge, 2003. 1-34. Emka, Moammar. Jakarta Undercover: Sex n’ the City. Yogyakarta: Galang Press, 2002. Heryanto, Ariel. “New Media and Pop Cultures in(ter) Asia.” Soft Power and Spheres of Influence in South and Southeast Asia. National University of Singapore, 2006. Heryanto, Ariel, and Vedi Hadiz. “Post-Authoritarian Indonesia: A Comparative Southeast Asian Perspective.” Critical Asian Studies 37.2 (2005): 251-75. Humphreys, Lee. “Mobile Devices and Social Networking.” Mobile Pre-Conference at the International Communication Association. Erfurt, Germany, 2006. Ito, Mizuko. “Introduction: Personal, Portable, Pedestrian.” Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. Eds. Mizuko Ito, Diasuke Okabe, and Misa Matsuda. Cambridge, MA: MIT Press, 2005. 1-16. JakartaPost.com. “Cell-Phone Users May Reach 80m This Year.” 6 Jan. 2006. http://www.thejakartapost.com/detailheadlines.asp? fileid=20070106.@02&irec=1>. Juliastuti, Nuraini. “Whatever I Want: Media and Youth in Indonesia before and after 1998.” Inter-Asia Cultural Studies 7 (2006): 1. Katz, James E., and Mark Aakhus, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. New York: Cambridge UP, 2002. Lesmana, Tjipta. Pornografi dalam Media Massa. Jakarta: Puspa Swara, 1994. Ling, Richard. The Mobile Connection: The Cell Phone’s Impact on Society. San Francisco, CA: Morgan Kaufmann, 2004. Mann, Steve, Jason Nolan, and Barry Wellman. “Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.” Surveillance and Society 1.3 (2003): 331-55. Naughton, Philippe. “Video Sex Scandal Claims Indonesian MP.” The Times Online 8 Dec. 2006. Pinch, Trevor J., and Wiebe E. Bijker. “The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” The Social Construction of Technological Systems: New Direction in the Sociology and History of Technology. Eds. W. E. Bijker, T. P. Hughes and T.J. Pinch. Cambridge, MA: MIT Press, 1987. 17-51. Smith-Hefner, Nancy J. “The New Muslim Romance: Changing Patterns of Courtship and Marriage among Educated Javanese Youth.” Journal of Southeast Asian Studies 36.3 (2005): 441-59. Suhartono, Harry. “Mobile Penetration to Drive Market Leader’s Profit Gain.” Reuters News 27 Oct. 2006. Sullivan, Kevin. “Saudi Youth Use Cellphone Savvy to Outwit the Sentries of Romance.” The Washington Post 6 Aug. 2006: A01. Suryakusuma, Julia. “The State and Sexuality in New Order Indonesia.” Fantasizing the Feminine in Indonesia. Ed. Laurie J. Sears. Durham, NC: Duke UP, 1996. 92-119. Utomo, Iwu Dwisetyani. “Sexual Values and Early Experiences among Young People in Jakarta: Youth, Courtship and Sexuality.” Coming of Age in South and Southeast Asia. Eds. Lenore Manderson and Pranee Liamputtong. Surey: Curzon, 2002. 207-27. Winner, Langdon. “Do Artifacts Have Politics?” Social Shaping of Technology. 2nd ed. Eds. Donald MacKenzie and Judy Wajcman. Buckingham, UK: Open UP, 2002. 28-40. World Bank. 2004 Indonesia Data & Statistics. 4 Jan. 2006. http://web.worldbank.org/WBSITE/EXTERNAL/COUNTRIES/ EASTASIAPACIFICEXT/INDONESIAEXTN/0,,menuPK:287097~pagePK: 141132~piPK:141109~theSitePK:226309,00.html>. Citation reference for this article MLA Style Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>. APA Style Humphreys, L., and T. Barker. (Mar. 2007) "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>.
APA, Harvard, Vancouver, ISO, and other styles
24

Brennan, Joseph. "Slash Manips: Remixing Popular Media with Gay Pornography." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.677.

Full text
Abstract:
A slash manip is a photo remix that montages visual signs from popular media with those from gay pornography, creating a new cultural artefact. Slash (see Russ) is a fannish practice that homoeroticises the bonds between male media characters and personalities—female pairings are categorised separately as ‘femslash’. Slash has been defined almost exclusively as a female practice. While fandom is indeed “women-centred” (Bury 2), such definitions have a tendency to exclude male contributions. Remix has been well acknowledged in discussions on slash, most notably video remix in relation to slash vids (Kreisinger). Non-written slash forms such as slash vids (see Russo) and slash fanart (see Dennis) have received increased attention in recent years. This article continues the tradition of moving beyond fiction by considering the non-written form of slash manips, yet to receive sustained scholarly attention. Speaking as a practitioner—my slash manips can be found here—I perform textual analysis from an aca–fan (academic and fan) position of two Merlin slash manips by male Tumblr artist wandsinhand. My textual analysis is influenced by Barthes’s use of image semiotics, which he applies to the advertising image. Barthes notes that “all images are polysemous”, that underlying their signifiers they imply “a ‘floating chain’ of signifieds, the reader able to choose some and ignore others” (274). That said, the advertising image, he argues, constructs an “undoubtedly intentional […] signification”, making it ideally suited for analysis (270). By supplementing my analysis with excerpts from two interviews I conducted with wandsinhand in February and April 2013 (quoted here with permission), I support my readings with respect to the artist’s stated ‘intentional reading’. I then contextualise these readings with respect to canon (Merlin) representations and gay pornography—via the chosen sexual acts/positions, bukkake and doggystyle, of the pornographic base models, as selected by the artist. This approach allows me to examine the photo remix qualities of slash manips with respect to the artist’s intentions as well as how artistic choices of inclusion function to anchor meaning in the works. I describe these choices as the ‘semiotic significance of selection’. Together the readings and interviews in this article help illustrate the value of this form and the new avenues it opens for slash scholars, such as consideration of photo remix and male production, and the importance of gay pornography to slash. My interviews also reveal, via the artist’s own assessment of the ‘value’ of his practice, a tendency to devalue or overlook the significance of this particular slash form, affirming a real need for further critical engagement with this under-examined practice. Slash Photo Remix: Famous Faces, Porny Bodies Lessig defines remix culture as based on an activity of “rip, mix and burn” (12–5); while Navas describes it as a “practice of cut/copy and paste” (159)—the latter being more applicable to photo remix. Whereas Lessig is concerned primarily with issues of copyright, Navas is interested in remix’s role in aesthetics and the political economy. Within fan studies, slash vids—a form of video remix—has been a topic of considerable academic interest in recent years. Slash manips—a form of photo or image remix—however, has not attracted the same degree of interest. Stasi’s description of slash as “a non-hierarchical, rich layering of genres” points to the usefulness of slash manips as an embodiment of the process of slash; whereby artists combine, blend and mutate graphic layers from popular media with those from gay pornography. Aesthetics and the slash manip process are central concerns of this article’s consideration of slash photo remix. Slash manips, or slash photo montage, use image manipulation software (Adobe Photoshop being the community standard, see wandsinhand’s tutorial) to layer the heads of male fictional characters from stills or promotional images with scenes—static or moving—from gay pornography. Once an artist has selected pornographic ‘base models’ anatomically suited to canon characters, these models are often then repositioned into the canon universe, which in the case of Merlin means a medieval setting. (Works not repositioned and without added details from canon are generally categorised as ‘male celebrity fakes’ rather than ‘slash manips’.) Stedman contends that while many fan studies scholars are interested in remix, “studies commonly focus on examples of remixed objects rather than the compositional strategies used by remix composers themselves” (107). He advocates moving beyond an exclusive consideration of “text-centred approaches” to also consider “practice-” and “composer-centred” approaches. Such approaches offer insight into “the detailed choices composers actually make when composing” (107). He refers to recognition of the skills required by a remix composer as “remix literacy” (108). This article’s consideration of the various choices and skills that go into the composition of slash manips—what I term the ‘semiotic significance of selection’—is explored with respect to wandsinhand’s practice, coupling my reading—informed by my experience as a practitioner—with the interpretations of the artist himself. Jenkins defines slash as “reaction against” constructions of male sexuality in both popular media and pornography (189). By their very nature, slash manips also make clear the oft-overlooked connections between slash and gay pornography, and in turn the contributions of gay male participants, who are well represented by the form. This contrasts with a tendency within scholarship to compare slash with heterosexual female forms, such as the romance genre (Salmon and Symons). Gay pornography plays a visible role in slash manips—and slash vids, which often remix scenes from popular media with gay cinema and pornography. Slash as Romance, Slash as Pornography Early scholarship on slash (see Russ; Lamb and Veith) defines it as a form of erotica or pornography, by and for women; a reductive definition that fails to take into account men’s contribution, yet one that many researchers continue to adopt today. As stated above, there has also been a tendency within scholarship to align the practice with heterosexual female forms such as the romance genre. Such a tendency is by and large due to theorisation of slash as heterosexual female fantasy—and concerned primarily with romance and intimacy rather than sex (see Woledge). Weinstein describes slash as more a “fascination with” than a “representation of” homosexual relationships (615); while MacDonald makes the point that homosexuality is not a major political motivator for slash (28–9). There is no refuting that slash—along with most fannish practice—is female dominated, ethnographic work and fandom surveys reveal that is the case. However there is great need for research into male production of slash, particularly how such practices might challenge reigning definitions and assumptions of the practice. In similar Japanese practices, for example, gay male opposition to girls’ comics (shōjo) depicting love between ‘pretty boys’ (bishōunen) has been well documented (see Hori)—Men’s Love (or bara) is a subgenre of Boys’ Love (or shōnen’ai) predominately created by gay men seeking a greater connection with the lived reality of gay life (Lunsing). Dennis finds male slash fanart producers more committed to muscular representations and depiction of graphic male/male sex when compared with female-identifying artists (14, 16). He also observes that male fanart artists have a tendency of “valuing same-sex desire without a heterosexual default and placing it within the context of realistic gay relationships” (11). I have observed similar differences between male and female-identifying slash manip artists. Female-identifying Nicci Mac, for example, will often add trousers to her donor bodies, recoding them for a more romantic context. By contrast, male-identifying mythagowood is known for digitally enlarging the penises and rectums of his base models, exaggerating his work’s connection to the pornographic and the macabre. Consider, for example, mythagowood’s rationale for digitally enlarging and importing ‘lips’ for Sam’s (Supernatural) rectum in his work Ass-milk: 2012, which marks the third anniversary of the original: Originally I wasn’t going to give Sammy’s cunt any treatment (before I determined the theme) but when assmilk became the theme I had to go find a good set of lips to slap on him and I figured, it’s been three years, his hole is going to be MUCH bigger. (personal correspondence, used with permission) While mythagowood himself cautions against gendered romance/pornography slash arguments—“I find it annoying that people attribute certain specific aspects of my work to something ‘only a man’ would make.” (ibid.)—gay pornography occupies an important place in the lives of gay men as a means for entertainment, community engagement and identity-construction (see McKee). As one of the only cultural representations available to gay men, Fejes argues that gay pornography plays a crucial role in defining gay male desire and identity. This is confirmed by an Internet survey conducted by Duggan and McCreary that finds 98% of gay participants reporting exposure to pornographic material in the 30-day period prior to the survey. Further, the underground nature of gay pornographic film (see Dyer) aligns it with slash as a subcultural practice. I now analyse two Merlin slash manips with respect to the sexual positions of the pornographic base models, illustrating how gay pornography genres and ideologies referenced through these works enforce their intended meaning, as defined by the artist. A sexual act such as bukkake, as wandsinhand astutely notes, acts as a universal sign and “automatically generates a narrative for the image without anything really needing to be detailed”. Barthes argues that such a “relation between thing signified and image signifying in analogical representation” is unlike language, which has a much more ‘arbitrary’ relationship between signifier and signified (272). Bukkake and the Assertion of Masculine Power in Merlin Merlin (2008–12) is a BBC reimagining of the Arthurian legend that focuses on the coming-of-age of Arthur and his close bond with his manservant Merlin, who keeps his magical identity secret until Arthur’s final stand in the iconic Battle of Camlann. The homosexual potential of Merlin and Arthur’s story—and of magic as a metaphor for homosexuality—is something slash fans were quick to recognise. During question time at the first Merlin cast appearance at the London MCM Expo in October 2008—just one month after the show’s pilot first aired—a fan asked Morgan and James, who portray Merlin and Arthur, is Merlin “meant to be a love story between Arthur and Merlin?” James nods in jest. Wandsinhand, who is most active in the Teen Wolf (2011–present) fandom, has produced two Merlin slash manips to date, a 2013 Merlin/Arthur and a 2012 Arthur/Percival, both untitled. The Merlin/Arthur manip (see Figure 1) depicts Merlin bound and on his knees, Arthur ejaculating across his face and on his chest. Merlin is naked while Arthur is partially clothed in chainmail and armour. They are both bruised and dirty, Arthur’s injuries suggesting battle given his overall appearance, while Merlin’s suggesting abuse, given his subordinate position. The setting appears to be the royal stables, where we know Merlin spends much of his time mucking out Arthur’s horses. I am left to wonder if perhaps Merlin did not carry out this duty to Arthur’s satisfaction, and is now being punished for it; or if Arthur has returned from battle in need of sexual gratification and the endorsement of power that comes from debasing his manservant. Figure 1: wandsinhand, Untitled (Merlin/Arthur), 2013, photo montage. Courtesy the artist. Both readings are supported by Arthur’s ‘spent’ expression of disinterest or mild curiosity, while Merlin’s face emotes pain: crying and squinting through the semen obscuring his vision. The artist confirms this reading in our interview: “Arthur is using his pet Merlin to relieve some stress; Merlin of course not being too pleased about the aftermath, but obedient all the same.” The noun ‘pet’ evokes the sexual connotations of Merlin’s role as Arthur’s personal manservant, while also demoting Merlin even further than usual. He is, in Arthur’s eyes, less than human, a sexual plaything to use and abuse at will. The artist’s statement also confirms that Arthur is acting against Merlin’s will. Violence is certainly represented here, the base models having been ‘marked up’ to depict sexualisation of an already physically and emotionally abusive relationship, their relative positioning and the importation of semen heightening the humiliation. Wandsinhand’s work engages characters in sadomasochistic play, with semen and urine frequently employed to degrade and arouse—“peen wolf”, a reference to watersports, is used within his Teen Wolf practice. The two wandsinhand works analysed in this present article come without words, thus lacking a “linguistic message” (Barthes 273–6). However even so, the artist’s statement and Arthur’s stance over “his pet Merlin” mean we are still able to “skim off” (270) the meanings the image contains. The base models, for example, invite comparison with the ‘gay bukkake’ genre of gay pornography—admittedly with a single dominant male rather than a group. Gay bukkake has become a popular niche in North American gay pornography—it originated in Japan as a male–female act in the 1980s. It describes a ritualistic sexual act where a group of dominant men—often identifying as heterosexual—fuck and debase a homosexual, submissive male, commonly bareback (Durkin et al. 600). The aggression on display in this act—much like the homosocial insistency of men who partake in a ‘circle jerk’ (Mosher 318)—enables the participating men to affirm their masculinity and dominance by degrading the gay male, who is there to service (often on his knees) and receive—in any orifice of the group’s choosing—the men’s semen, and often urine as well. The equivalencies I have made here are based on the ‘performance’ of the bukkake fantasy in gay niche hazing and gay-for-pay pornography genres. These genres are fuelled by antigay sentiment, aggression and debasement of effeminate males (see Kendall). I wish here to resist the temptation of labelling the acts described above as deviant. As is a common problem with anti-pornography arguments, to attempt to fix a practice such as bukkake as deviant and abject—by, for example, equating it to rape (Franklin 24)—is to negate a much more complex consideration of distinctions and ambiguities between force and consent; lived and fantasy; where pleasure is, where it is performed and where it is taken. I extend this desire not to label the manip in question, which by exploiting the masculine posturing of Arthur effectively sexualises canon debasement. This began with the pilot when Arthur says: “Tell me Merlin, do you know how to walk on your knees?” Of the imported imagery—semen, bruising, perspiration—the key signifier is Arthur’s armour which, while torn in places, still ensures the encoding of particular signifieds: masculinity, strength and power. Doggystyle and the Subversion of Arthur’s ‘Armoured Self’ Since the romanticism and chivalric tradition of the knight in shining armour (see Huizinga) men as armoured selves have become a stoic symbol of masculine power and the benchmark for aspirational masculinity. For the medieval knight, armour reflects in its shiny surface the mettle of the man enclosed, imparting a state of ‘bodilessness’ by containing any softness beneath its shielded exterior (Burns 140). Wandsinhand’s Arthur/Percival manip (see Figure 2) subverts Arthur and the symbolism of armour with the help of arguably the only man who can: Arthur’s largest knight Percival. While a minor character among the knights, Percival’s physical presence in the series looms large, and has endeared him to slash manip artists, particularly those with only a casual interest in the series, such as wandsinhand: Why Arthur and Percival were specifically chosen had really little to do with the show’s plot, and in point of fact, I don’t really follow Merlin that closely nor am I an avid fan. […] Choosing Arthur/Percival really was just a matter of taste rather than being contextually based on their characterisations in the television show. Figure 2: wandsinhand, Untitled (Arthur/Percival), 2012, photo montage. Courtesy the artist. Concerning motivation, the artist explains: “Sometimes one’s penis decides to pick the tv show Merlin, and specifically Arthur and Percival.” The popularity of Percival among manip artists illustrates the power of physicality as a visual sign, and the valorisation of size and muscle within the gay community (see Sánchez et al.). Having his armour modified to display his muscles, the implication is that Percival does not need armour, for his body is already hard, impenetrable. He is already suited up, simultaneously man and armoured. Wandsinhand uses the physicality of this character to strip Arthur of his symbolic, masculine power. The work depicts Arthur with a dishevelled expression, his armoured chest pressed against the ground, his chainmail hitched up at the back to expose his arse, Percival threading his unsheathed cock inside him, staring expressionless at the ‘viewer’. The artist explains he “was trying to show a shift of power”: I was also hinting at some sign of struggle, which is somewhat evident on Arthur’s face too. […] I think the expressions work in concert to suggest […] a power reversal that leaves Arthur on the bottom, a position he’s not entirely comfortable accepting. There is pleasure to be had in seeing the “cocky” Arthur forcefully penetrated, “cut down to size by a bigger man” (wandsinhand). The two assume the ‘doggystyle’ position, an impersonal sexual position, without eye contact and where the penetrator sets the rhythm and intensity of each thrust. Scholars have argued that the position is degrading to the passive party, who is dehumanised by the act, a ‘dog’ (Dworkin 27); and rapper Snoop ‘Doggy’ Dogg exploits the misogynistic connotations of the position on his record Doggystyle (see Armstrong). Wandsinhand is clear in his intent to depict forceful domination of Arthur. Struggle is signified through the addition of perspiration, a trademark device used by this artist to symbolise struggle. Domination in a sexual act involves the erasure of the wishes of the dominated partner (see Cowan and Dunn). To attune oneself to the pleasures of a sexual partner is to regard them as a subject. To ignore such pleasures is to degrade the other person. The artist’s choice of pairing embraces the physicality of the male/male bond and illustrates a tendency among manip producers to privilege conventional masculine identifiers—such as size and muscle—above symbolic, nonphysical identifiers, such as status and rank. It is worth noting that muscle is more readily available in the pornographic source material used in slash manips—muscularity being a recurrent component of gay pornography (see Duggan and McCreary). In my interview with manip artist simontheduck, he describes the difficulty he had sourcing a base image “that complimented the physicality of the [Merlin] characters. […] The actor that plays Merlin is fairly thin while Arthur is pretty built, it was difficult to find one. I even had to edit Merlin’s body down further in the end.” (personal correspondence, used with permission) As wandsinhand explains, “you’re basically limited by what’s available on the internet, and even then, only what you’re prepared to sift through or screencap yourself”. Wandsinhand’s Arthur/Percival pairing selection works in tandem with other artistic decisions and inclusions—sexual position, setting, expressions, effects (perspiration, lighting)—to ensure the intended reading of the work. Antithetical size and rank positions play out in the penetration/submission act of wandsinhand’s work, in which only the stronger of the two may come out ‘on top’. Percival subverts the symbolic power structures of prince/knight, asserting his physical, sexual dominance over the physically inferior Arthur. That such a construction of Percival is incongruent with the polite, impeded-by-my-size-and-muscle-density Percival of the series speaks to the circumstances of manip production, much of which is on a taste basis, as previously noted. There are of course exceptions to this, the Teen Wolf ‘Sterek’ (Stiles/Derek) pairing being wandsinhand’s, but even in this case, size tends to couple with penetration. Slash manips often privilege physicality of the characters in question—as well as the base models selected—above any particular canon-supported slash reading. (Of course, the ‘queering’ nature of slash practice means at times there is also a desire to see such identifiers subverted, however in this example, raw masculine power prevails.) This final point is in no way representative—my practice, for example, combines manips with ficlets to offer a clearer connection with canon, while LJ’s zdae69 integrates manips, fiction and comics. However, common across slash manip artists driven by taste—and requests—rather than connection with canon—the best known being LJ’s tw-31988, demon48180 and Tumblr’s lwoodsmalestarsfakes, all of whom work across many fandoms—is interest in the ‘aesthetics of canon’, the blue hues of Teen Wolf or the fluorescent greens of Arrow (2012–present), displayed in glossy magazine format using services such as ISSUU. In short, ‘the look’ of the work often takes precedent over canonical implications of any artistic decisions. “Nothing Too Serious”: Slash Manips as Objects Worth Studying It had long been believed that the popular was the transient, that of entertainment rather than enlightenment; that which is manufactured, “an appendage of the machinery”, consumed by the duped masses and a product not of culture but of a ‘culture industry’ (Adorno and Rabinbach 12). Scholars such as Radway, Ang pioneered a shift in scholarly practice, advancing the cultural studies project by challenging elitism and finding meaning in traditionally devalued cultural texts and practices. The most surprising outcome of my interviews with wandsinhand was hearing how he conceived of his practice, and the study of slash: If I knew I could get a PhD by writing a dissertation on Slash, I would probably drop out of my physics papers! […] I don’t really think too highly of faking/manip-making. I mean, it’s not like it’s high art, is it? … or is it? I guess if Duchamp’s toilet can be a masterpiece, then so can anything. But I mainly just do it to pass the time, materialise fantasies, and disperse my fantasies unto others. Nothing too serious. Wandsinhand erects various binaries—academic/fan, important/trivial, science/arts, high art/low art, profession/hobby, reality/fantasy, serious/frivolous—as justification to devalue his own artistic practice. Yet embracing the amateur, personal nature of his practice frees him to “materialise fantasies” that would perhaps not be possible without self-imposed, underground production. This is certainly supported by his body of work, which plays with taboos of the unseen, of bodily fluids and sadomasochism. My intention with this article is not to contravene views such as wandsinhand’s. Rather, it is to promote slash manips as a form of remix culture that encourages new perspectives on how slash has been defined, its connection with male producers and its symbiotic relationship with gay pornography. I have examined the ‘semiotic significance of selection’ that creates meaning in two contrary slash manips; how these works actualise and resist canon dominance, as it relates to the physical and the symbolic. This examination also offers insight into this form’s connection to and negotiation with certain ideologies of gay pornography, such as the valorisation of size and muscle. References Adorno, Theodor W., and Anson G. Rabinbach. “Culture Industry Reconsidered.” New German Critique 6 (1975): 12–19. Ang, Ien. 1985. Watching Dallas. London: Methuen, 1985. Armstrong, Edward G. “Gangsta Misogyny: A Content Analysis of the Portrayals of Violence against Women in Rap Music, 1987–93.” Journal of Criminal Justice and Popular Culture 8.2 (2001): 96–126. Barthes, Roland. “Rhetoric of the Image.” Image, Music, Text. London: HarperCollins, 1977. 269–85. Burns, E. Jane. Courtly Love Undressed: Reading through Clothes in Medieval French Culture. Philadelphia: Univ. of Pennsylvania Press, 2002. Bury, Rhiannon. Cyberspaces of Their Own: Female Fandoms Online. New York: Peter Lang, 2005. Cowan, Gloria, and Kerri F. Dunn. “What Themes in Pornography Lead to Perceptions of the Degradation of Women?” The Journal of Sex Research 31.1 (1994): 11–21. Dennis, Jeffery P. “Drawing Desire: Male Youth and Homoerotic Fan Art.” Journal of LGBT Youth 7.1 (2010): 6–28. Duggan, Scott J., and Donald R. McCreary. “Body Image, Eating Disorders, and the Drive for Muscularity in Gay and Heterosexual Men: The Influence of Media Images.” Journal of Homosexuality 47.3/4 (2004): 45–58. Durkin, Keith, Craig J. Forsyth, and James F. Quinn. “Pathological Internet Communities: A New Direction for Sexual Deviance Research in a Post Modern Era.” Sociological Spectrum 26.6 (2006): 595–606. Dworkin, Andrea. “Against the Male Flood: Censorship, Pornography, and Equality.” Letters from a War Zone. London: Martin Secker and Warburg, 1997. 19–38. Fejes, Fred. “Bent Passions: Heterosexual Masculinity, Pornography, and Gay Male Identity.” Sexuality & Culture 6.3 (2002): 95–113. Franklin, Karen. “Enacting Masculinity: Antigay Violence and Group Rape as Participatory Theater.” Sexuality Research & Social Policy 1.2 (2004): 25–40. Hori, Akiko. “On the Response (or Lack Thereof) of Japanese Fans to Criticism That Yaoi Is Antigay Discrimination.” Transformative Works and Cultures 12 (2013). doi:10.3983/twc.2013.0463. Huizinga, Johan. The Waning of the Middle Ages: A Study of Forms of Life, Thought, and Art in France and the Netherlands in the Dawn of the Renaissance. Trans. F. Hopman. London: Edward Arnold & Co, 1924. Jenkins, Henry. Textual Poachers: Television Fans & Participatory Culture. London: Routledge, 1992. Kendall, Christopher N. “‘Real Dominant, Real Fun!’: Gay Male Pornography and the Pursuit of Masculinity.” Saskatchewan Law Review 57 (1993): 21–57. Kreisinger, Elisa. “Queer Video Remix and LGBTQ Online Communities.” Transformative Works and Cultures 9 (2012). doi:10.3983/twc.2012.0395. Lamb, Patricia F., and Diane L. Veith. “Romantic Myth, Transcendence, and Star Trek Zines.” Erotic Universe: Sexuality and Fantastic Literature. Ed. D Palumbo. New York: Greenwood, 1986. 235–57. Lessig, Lawrence. The Future of Ideas. New York: Vintage, 2001. Lunsing, Wim. “Yaoi Ronsō: Discussing Depictions of Male Homosexuality in Japanese Girls’ Comics, Gay Comics and Gay Pornography.” Intersections: Gender, History and Culture in the Asian Context 12 (2006). ‹http://intersections.anu.edu.au/issue12/lunsing.html›. MacDonald, Marianne. “Harry Potter and the Fan Fiction Phenom.” The Gay & Lesbian Review 13.1 (2006): 28–30. McKee, Alan. “Australian Gay Porn Videos: The National Identity of Despised Cultural Objects.” International Journal of Cultural Studies 2.2 (1999): 178–98. Morrison, Todd G., Melanie A. Morrison, and Becky A. Bradley. “Correlates of Gay Men’s Self-Reported Exposure to Pornography.” International Journal of Sexual Health 19.2 (2007): 33–43. Mosher, Donald L. “Negative Attitudes Toward Masturbation in Sex Therapy.” Journal of Sex & Marital Therapy 5.4 (1979): 315–33. Navas, Eduardo. “Regressive and Reflexive Mashups in Sampling Culture.” Mashup Cultures. Ed. Stefan Sonvilla-Weiss. New York: Springer, 2010. 157–77. Radway, Janice. Reading the Romance: Women, Patriarchy, and Popular Literature. Chapel Hill: Univ. of North Carolina Press, 1984. Russ, Joanna. “Pornography by Women for Women, with Love.” Magic Mommas, Trembling Sisters, Puritans, and Perverts: Feminist Essays. Trumansburg: Crossing Press, 1985. 79–99. Russo, Julie Levin. “User-Penetrated Content: Fan Video in the Age of Convergence.” Cinema Journal 48.4 (2009): 125–30. Salmon, Catherine, and Donald Symons. Warrior Lovers: Erotic Fiction, Evolution and Human Sexuality. London: Weidenfeld & Nicolson, 2001. Sánchez, Francisco J., Stefanie T. Greenberg, William Ming Liu, and Eric Vilain. “Reported Effects of Masculine Ideals on Gay Men.” Psychology of Men & Masculinity 10.1 (2009): 73–87. Stasi, Mafalda. “The Toy Soldiers from Leeds: The Slash Palimpsest.” Fan Fiction and Fan Communities in the Age of the Internet. Ed. Karen Hellekson, and Kristina Busse. Jefferson: McFarland, 2006. 115–33. Stedman, Kyle D. “Remix Literacy and Fan Compositions.” Computers and Composition 29.2 (2012): 107–23. Weinstein, Matthew. “Slash Writers and Guinea Pigs as Models for Scientific Multiliteracy.” Educational Philosophy and Theory 38.5 (2006): 607–23. Woledge, Elizabeth. “Intimatopia: Genre Intersections between Slash and the Mainstream.” Fan Fiction and Fan Communities in the Age of the Internet. Ed. Karen Hellekson, and Kristina Busse. Jefferson: McFarland, 2006. 97–114.
APA, Harvard, Vancouver, ISO, and other styles
25

Morris, Gavin, Rachel A. Groom, Emma Louise Schuberg, Sarah Dowden-Parker, Miriam-Rose Ungunmerr-Baumann, Aaron McTaggart, and Bronwyn Carlson. "‘I want to video it, so people will respect me’: Nauiyu community, digital platforms and trauma." Media International Australia, October 29, 2021, 1329878X2110380. http://dx.doi.org/10.1177/1329878x211038005.

Full text
Abstract:
The Edge of Sacred project was conducted with the Nauiyu community in northern Australia and investigated trauma and traditional healing practices. Study participants from the community identified negative social changes and an escalation in anti-social behaviour, such as higher rates of bullying, violence, risky sexual behaviour and children accessing pornography, when mobile phones and social networking sites were used inappropriately. The research utilised Dadirri, a place-based, performative healing praxis that engaged community members in a truth-telling journey. Shared stories revealed social impacts derived from accessing mobile technologies and the ensuing cultural colonisation affected all aspects of Nauiyu community life. We present the findings of mobile phone use behaviours in this remote context and the performance of negative, traumatised and harmful identities that occupy social media and are enabled through social networking sites. Despite the corrosive effects of colonisation, the community unanimously believed that empowerment through truth-telling exists within and belongs to Nauiyu. The traditional holistic healing practice of Dadirri reframes identities, reclaiming Indigenous Lore.
APA, Harvard, Vancouver, ISO, and other styles
26

Nurmayani, Winda, Kusniyati Utami, Misroh Mulianingsih, Fitri Romadonika, and BqRia Syafraini. "Pornographic And Social Economic Exposure Affect The Age Of Menarch." Jurnal Kebidanan dan Kesehatan Tradisional, October 11, 2021, 95–102. http://dx.doi.org/10.37341/jkkt.v0i0.251.

Full text
Abstract:
Background: Menarche is the first menstruation which occurs in middle age of adolescence before entering the reproductive period. Menarche can cause negative reactions in young women due to a lack of readiness and knowledge about personal hygine during menstruation, this is can cause of UTI (Urinary Tract Infection). Asserted that the factors that influence menarche were nutritional status, exposure to mass media and fast food consumption. Media exposure to adolescents will enhance many aspects related to the sexual maturation of the adolescences. Aim of study is to determine the pornographic exposure and economic status in students. Methods: A mix methods was match qualitative and quantitative research, the samples of the research used were 47 people, they were taken using purposive sampling technique. Results: The results of this research showed that the age of menarche which occurred were8 to 12 years old. Factors associated with the menarche were socioeconomic status (p-value 0.020) and exposure to pornography (p-value 0.037). Conclusion: Pornographic and socio economic status affect the age of menarchthe results can be used as material for consideration to provide early reproductive health education and supervise children in using cellphones and internet access.
APA, Harvard, Vancouver, ISO, and other styles
27

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
28

Döring, Nicola, and Dan J. Miller. "Conceptual Overview (Portrayals of Sexuality in Pornography)." DOCA - Database of Variables for Content Analysis, October 24, 2022. http://dx.doi.org/10.34778/5k.

Full text
Abstract:
Pornography is neither a documentary media genre that documents what real sex in everyday life looks like, nor is it a pedagogical or moral media genre aimed at showing what ideal sex (in terms of health or morality) should look like. Instead, pornography is a fictional media genre that depicts sexual fantasies and explicitly presents naked bodies and sexual activities for the purpose of sexual arousal (Williams, 1989; McKee et al., 2020). Regarding media ethics and media effects, pornography has traditionally been viewed as highly problematic. Pornographic material has been accused of portraying sexuality in unhealthy, morally questionable and often sexist ways, thereby harming performers, audiences, and society at large. In the age of the Internet, pornography has become more diverse, accessible, and widespread than ever (Döring, 2009; Miller et al., 2020). Consequently, the depiction of sexuality in pornography is the focus of a growing number of content analyses of both mass media (e.g., erotic and pornographic novels and movies) and social media (e.g., erotic and pornographic stories, photos and videos shared via online platforms). Typically, pornography’s portrayals of sexuality are examined by measuring the prevalence and frequency of sexual practices and related gender roles via quantitative content analysis (for research reviews see Carrotte et al., 2020; Miller & McBain, 2022). It should be noted that the conceptual differentiation between erotica and pornography is complex and that “pornography” remains an ideologically charged, and often negatively connotated, concept. Hence, the research literature sometimes uses the broader and more neutral term “sexually explicit material” (SEM) in place of “pornographic material” (McKee et al., 2020). Furthermore, it must be emphasized that in the context of content analyses of SEM the focus is typically on legal pornography. Legal visual pornography is produced with adults who have given their informed consent for their image to be recorded, and then disseminated and marketed as SEM. Illegal pornography is usually beyond the scope of media content research, as the acquisition and use of illegal material would be unethical and illegal for researchers (e.g., the analysis of so-called “child pornography”, or what might be more accurately labeled “images of child sexual abuse”). Criminological and forensic research projects are exceptions to this rule. Field of application/theoretical foundation: The theories applied in pornographic media content research primarily come from four academic disciplines: communication science, psychology, sex research, and gender studies. These different theories are fairly similar in their core assumption that pornography users’ sexual cognitions and behaviors are molded by the ways in which sexuality is portrayed in pornographic material. Some of the theories also explain the typical content of pornography and point to the fact that audiences might not only be influenced by pornography but can also shape porn production through their preferences. All theories demand content analyses of pornographic material to back up their predictions. General Media Effects Theories Cultivation Theory and Social Cognitive Theory are the most commonly used media effects theories, irrespective of specific media content. They are often applied to pornographic material. Cultivation Theory (CT) was developed by communication researcher George Gerbner in the 1960s (Gerbner, 1998). CT claims that heavy media users’ perceptions of the prevalence of different societal phenomena (e.g., crimes) are shaped by the prevalence with which these phenomena occur in the media they consume (e.g., cop shows on TV). Applied to pornography, CT predicts that heavy users of pornography will severely overestimate the prevalence of sexual practices that are rare in reality, but widespread in pornography. Young people who lack real life sexual experience are regarded as particularly vulnerable for sexual cultivation effects in terms of biased perceptions of the popularity and normalcy of different performances of sexuality (e.g., name calling and slapping during sex). Another classic media effects theory that is widely adopted in pornography research is psychologist Albert Bandura’s Social Learning Theory (Bandura, 1971), later re-labeled as Social Cognitive Theory (SCT; Bandura, 2001). SCT claims that people imitate the behaviors of media role models. Applied to pornographic material, SCT predicts that media audiences will develop more favorable attitudes towards, and engage more frequently in, sexual behaviors portrayed positively in sexually explicit material. Such sexual imitation effects may influence not only attitudes toward, and engagement in, sex acts represented in pornography (e.g., anal sex), but also gender role behaviors (e.g., men acting dominantly, women acting submissively during sex), safer sex measures (e.g., lack of condom use), bodily appearance (e.g., breast augmentation), and consent communication (e.g., lack of explicitly asking for, or giving, consent to engage in different sex acts). Sexual Media Effects Theories While CT and SCT are broad media effects theories applicable to pornography as well as many other types of media content, Sexual Script Theory and the 3AM specifically address sexual media and their effects. Sexual Script Theory (SST) was developed by sociologists John Gagnon and William Simon in the 1970s (Gagnon & Simon, 1973; Simon & Gagnon, 2003; Wiederman, 2015). SST argues that human sexuality is not merely a biological instinct, but a highly complex set of cognitions and behaviors shaped by symbolic, social and cultural factors: People develop ideas about how to have sex in terms of organized cognitive schemas or “scripts” that reflect intra-psychic desires (e.g., their sexual fantasies), social norms (e.g., peers’ and partners’ sexual expectations), and cultural influences (e.g., representations of sexuality in the media they consume). SST stresses that the intra-psychic, social, and cultural determinants of individuals’ sexual scripts mutually influence each other and can change over time (Simon & Gagnon, 2003). However, in pornography research, usually only the third element of the theory (cultural influences through media representations of sexuality) is considered. Applied to pornography, SST predicts that sexual scripts presented in pornographic material (e.g., spontaneous anal sex with strangers without condoms or overt consent communication) can shape individuals’ sexual scripts. The Acquisition, Activation, and Application Model of Media Sexual Socialization (3AM) was developed more recently by communication researcher Paul Wright as a specification of SST regarding media influence (Wright, 2011). According to the 3AM, sexually explicit media content shapes cognitive schemas of sexuality in three ways: Pornography can foster the creation of new schemas (schema acquisition), it can prime extant schemas (schema activation), and it can facilitate the utilization of extant schemas to inform attitudes and behaviors (schema application). The 3AM differentiates between specific scripting effects of pornography (e.g., engaging in condom-free casual anal sex without sufficient consent communication after having observed this exact sexual script multiple times in pornography) versus abstract scripting effects (e.g., adopting a more permissive sexual worldview after having observed many people engaging in unrestricted sex in pornography). The aforementioned general and sexuality-specific media effects theories have been used predominantly to predict negative (unwanted, harmful) effects such as dangerously distorted views of sexuality and gender roles as well as engagement in risky or violent sexual behaviors, while potential positive effects have been mostly ignored. Only recently, has serious consideration been given to the beneficial effects of pornography use (e.g., sexual identity validation, sexual empowerment, improved couple communication, sexual skill acquisition, etc.) in the research literature (e.g., Döring, 2021; Döring & Mohseni, 2018; Döring et al., 2021; Kohut & Fisher, 2013; Kohut et al., 2017; Miller et al., 2018; Tillmann & Wells, 2022). Depending on specific negative and/or positive effect assumptions, different aspects of the representation of sexuality will be measured (e.g., expressions of aggression during sex or different types of sexual stimulation techniques). Gender Role, Feminist and Queer Theories Typically, analysis of the ways in which sexuality is represented in pornography involves considerations of gender relations, therefore gender role theories and feminist theories of gender (in-)equality are frequently drawn upon (e.g., Eagly, 1987). There are two main reasons for this additional theoretical focus on gender: 1) Most SEM depicts heterosexual encounters, hence the portrayal of sexuality in pornography implies a portrayal of sexual gender relations (Williams, 1989). 2) Gender relations in the media are often asymmetrical, depicting men and women in superior and subordinate positions, respectively. Such patriarchal gender relations are expected to be reflected, or even exaggerated, in pornographic material. Radical feminist approaches in particular characterize pornography as a portrayal of sexual degradation of women by men, that is so harmful to society that it should be prohibited (e.g., MacKinnon, 1991). Other feminist approaches are also critical of asymmetric gender relations in traditional mainstream pornography and call for more gender equality in SEM, such as in feminist pornography (Williams, 1989). Feminist criticism of gender roles and relations in pornography does not address the demographic variable of sex/gender alone, but also covers other diversity dimensions such as age, race/ethnicity, or disability. According to the analytical framework of intersectionality, the subordination and discrimination of women in society and media representations particularly affect those women who have multiple marginalized demographic characteristics (e.g., the representation of white women in pornography differs from that of black or Asian women; Fritz et al. 2021). Queer theory is also concerned with different racial/ethnic and sexual identities of women and their participation and representation in pornography (Ingraham 2013). Content analyses of pornography need to take into consideration that pornography is becoming increasingly diverse (Miller & McBain, 2022). Hence, content analyses need to differentiate between various pornographic sub-genres such as commercial heterosexual mainstream pornography (traditionally targeting men) versus, for example, women-friendly and couple-oriented pornography, feminist pornography, queer pornography, fetish and kink pornography, or authentic amateur and DIY (do it yourself) pornography in the form of visual or text pornography (Döring, 2021; McKee et al., 2008). Gender role, feminist, and queer theories predict that gender relations in mainstream pornography are more asymmetrical, stereotypical and patriarchal than in women- and couple-friendly, feminist and queer pornography. Sexual Fantasy and Desire Theories The above-mentioned effect theories do not address and explain the main intended effect of pornography, namely immediate sexual arousal, pleasure and satisfaction. The theories focus on linking the fictional pornographic content directly with real life opinions and behaviors, but mostly ignore the links between fictional pornographic content and sexual fantasies. Research shows that many sexual fantasies of people of all genders are unrealistic, extreme, clichéd, violent and norm-violating and that norm-violation is often what makes them arousing (e.g., Bivona et al., 2012; Critelli & Bivona, 2008; Joyal, 2015). The same might be true for pornographic content. Hence, measuring pornography, a fictional media genre, against standards of realism, health and morality might not always be in line with the main entertainment purpose of the genre. Erotizing the forbidden and dangerous (e.g, sex with family members, with mysterious strangers, with authority figures, with non-human creatures) is a common trope of sexual fantasies, hence meaningful variables to measure pornographic portrayals of sexuality could be derived from, and related to, theories of sexual fantasy and desire (e.g., Salmon et al., 2019; Stoller, 1985). Indulging in unrealistic and norm-violating fantasies and fictional media contents is part of media entertainment and may not necessarily lead to norm-violating behaviors. Competent media users should be able to differentiate between fiction and reality. Mold Theories versus Mirror Theories When analyzing and criticizing sexuality portrayals in pornography, it is important to realize that media do not just uni-directionally influence public opinions and behaviors (mold theory). Rather, media also bi-directionally reflect existing sexual relations and fantasies (mirror theory). Recent sex surveys, for example, demonstrate that engagement in consensual BDSM (Bondage/Discipline, Dominance/Submission, Sadism/Masochism) practices and rough sex (e.g., name calling, spanking, hair pulling) is fairly widespread in the general population and enjoyed by all genders (e.g., Burch & Salmon, 2019; Herbenick et al., 2021a, 2021b; Strizzi et al., 2022). Hence, it might not always be the adult industry that influences audiences’ sexualities, but also audiences’ sexual interests that influence porn production. Particularly in the digital pornography market, producers and vendors can easily analyze audience preferences through the analysis of search terms and download statistics and adopt their content accordingly. Furthermore, general beauty trends in society (e.g., regarding shaving of pubic and body hair, growing of beards, or multiple tattoos and other body art) might be mirrored in pornography (through its selection and presentation of performers) rather than of generated by it. References/combination with other methods of data collection: Manual quantitative content analyses of pornographic material can be combined with qualitative (e.g., Keft-Kennedy, 2008) as well as computational (e.g., Seehuus et al., 2019) content analyses. Furthermore, content analyses can be complemented with qualitative interviews and quantitative surveys to investigate perceptions and evaluations of the portrayals of sexuality in pornography among pornography’s creators and performers (e.g., West, 2019) and audiences (e.g., Cowan & Dunn, 1994; Hardy et al., 2022; Paasoonen, 2021; Shor, 2022). Additionally, experimental studies are helpful to measure directly how different dimensions of pornographic portrayals of sexuality are perceived and evaluated by recipients, and if and how these portrayals can affect audiences’ sexuality-related thoughts, feelings, and behaviors (e.g., Kohut & Fisher, 2013; Miller et al., 2019). Example studies for manual quantitative content analyses: Acknowledging the multidimensionality and complexity of portrayals of sexuality in pornography, a recent research review identified eight main dimensions of analysis (Miller & McBain, 2022) that are adopted and extended in this DOCA entry as: 1) violence, 2) degradation, 3) sex acts, 4) performer demographics (sex/gender, age, race/ethnicity), 5) performer bodily appearance, 6) safer sex practices, 7) relational context of sex, and 8) consent communication. Example studies and measures for all eight dimensions of pornographic portrayals of sexuality are presented in separate DOCA entries. Eight Dimension of Portrayals of Sexuality in Pornography DOCA entry 1) Violence Portrayals of Sexuality in Pornography: Violence 2) Degradation Portrayals of Sexuality in Pornography: Degradation 3) Sex Acts Portrayals of Sexuality in Pornography: Sex Acts 4) Performer Demographics Portrayals of Sexuality in Pornography: Performer Demographics 5) Performer Bodily Appearance Portrayals of Sexuality in Pornography: Performer Bodily Appearance 6) Safer Sex Practices Portrayals of Sexuality in Pornography: Safer Sex Practices 7) Relational Context of Sex Portrayals of Sexuality in Pornography: Relational Context of Sex 8) Consent Communication Portrayals of Sexuality in Pornography: Consent Communication References Bandura, A. (1971). Social learning theory. General Learning. Bandura, A. (2001). Social cognitive theory of mass communication. Media Psychology, 3(3), 265–299. https://doi.org/10.1207/S1532785XMEP0303_03 Bivona, J. M., Critelli, J. W., & Clark, M. J. (2012). Women's rape fantasies: An empirical evaluation of the major explanations. Archives of Sexual Behavior, 41(5), 1107–1119. https://doi.org/10.1007/s10508-012-9934-6 Burch, R. L., & Salmon, C. (2019). The rough stuff: Understanding aggressive consensual sex. Evolutionary Psychological Science, 5(4), 383–393. https://doi.org/10.1007/s40806-019-00196-y Carrotte, E. R., Davis, A. C., & Lim, M. S. (2020). Sexual behaviors and violence in pornography: Systematic review and narrative synthesis of video content analyses. Journal of Medical Internet Research, 22(5), Article e16702. https://doi.org/10.2196/16702 Cowan, G., & Dunn, K. F. (1994). What themes in pornography lead to perceptions of the degradation of women? Journal of Sex Research, 31(1), 11–21. https://doi.org/10.1080/00224499409551726 Critelli, J. W., & Bivona, J. M. (2008). Women's erotic rape fantasies: An evaluation of theory and research. Journal of Sex Research, 45(1), 57–70. https://doi.org/10.1080/00224490701808191 Döring, N. (2009). The Internet’s impact on sexuality: A critical review of 15 years of research. Computers in Human Behavior, 25(5), 1089–1101. https://doi.org/10.1016/j.chb.2009.04.003 Döring, N. (2021). Erotic Fan Fiction. In A. D. Lykins (Ed.), Encyclopedia of sexuality and gender (pp. 1–8). Springer. https://doi.org/10.1007/978-3-319-59531-3_65-1 Döring, N., Krämer, N., Mikhailova, V., Brand, M., Krüger, T. H. C., & Vowe, G. (2021). Sexual interaction in digital contexts and its implications for sexual health: A conceptual analysis. Frontiers in Psychology, 12, Article 769732. https://doi.org/10.3389/fpsyg.2021.769732 Döring, N., & Mohseni, M. R. (2018). Are online sexual activities and sexting good for adults’ sexual well-being? Results from a national online survey. International Journal of Sexual Health, 30(3), 250–263. https://doi.org/10.1080/19317611.2018.1491921 Eagly, A. H. (1987). Sex differences in social behavior: A social-role interpretation. Erlbaum. Fritz, N., Malic, V. [Vinny], Paul, B., & Zhou, Y. (2021). Worse than objects: The depiction of black women and men and their sexual relationship in pornography. Gender Issues 38, 100-120. https://doi.org/10.1007/s12147-020-09255-2 Gagnon, J. H., & Simon, W. (1973). Sexual conduct: The social sources of human sexuality (2. ed.). AldineTransaction. Gerbner, G. (1998). Cultivation analysis: An overview. Mass Communication and Society, 1(3-4), 175–194. https://doi.org/10.1080/15205436.1998.9677855 Hardy, J., Kukkonen, T., & Milhausen, R. (2022). Examining sexually explicit material use in adults over the age of 65 years. The Canadian Journal of Human Sexuality, 31(1), 117–129. https://doi.org/10.3138/cjhs.2021-0047 Herbenick, D., Fu, T.‑C., Patterson, C., Rosenstock Gonzalez, Y. R., Luetke, M., Svetina Valdivia, D., Eastman-Mueller, H., Guerra-Reyes, L., & Rosenberg, M. (2021a). Prevalence and characteristics of choking/strangulation during sex: Findings from a probability survey of undergraduate students. Journal of American College Health, 1–15. https://doi.org/10.1080/07448481.2021.1920599 Herbenick, D., Patterson, C., Beckmeyer, J., Gonzalez, Y. R. R., Luetke, M., Guerra-Reyes, L., Eastman-Mueller, H., Valdivia, D. S., & Rosenberg, M. (2021b). Diverse sexual behaviors in undergraduate students: Findings from a campus probability survey. The Journal of Sexual Medicine, 18(6), 1024–1041. https://doi.org/10.1016/j.jsxm.2021.03.006 Ingraham, N. (2013). Queering pornography through qualitative method. International Journal of Multiple Research Approaches, 7(2), 158-159. https://doi.org/10.5172/mra.2013.7.2.218 Joyal, C. C. (2015). Defining "normophilic" and "paraphilic" sexual fantasies in a population-based sample: On the importance of considering subgroups. Sexual Medicine, 3(4), 321–330. https://doi.org/10.1002/sm2.96 Keft-Kennedy, V. (2008). Fantasising masculinity in Buffyverse slash fiction: Sexuality, violence, and the vampire. Nordic Journal of English Studies, 7(1), 49–80. Kohut, T., & Fisher, W. A. (2013). The impact of brief exposure to sexually explicit video clips on partnered female clitoral self-stimulation, orgasm and sexual satisfaction. The Canadian Journal of Human Sexuality, 22(1), 40–50. https://doi.org/10.3138/cjhs.935 Kohut, T., Fisher, W. A., & Campbell, L. (2017). Perceived effects of pornography on the couple relationship: Initial findings of open-ended, participant-informed, "bottom-up" research. Archives of Sexual Behavior, 46(2), 585–602. https://doi.org/10.1007/s10508-016-0783-6 MacKinnon, C. A. (1991). Pornography as defamation and discrimination. Boston University Law Review, 71, 793-818. McKee, A., Albury, K., & Lumby, C. (2008). The porn report. Melbourne University Press. McKee, A., Byron, P., Litsou, K., & Ingham, R. (2020). An interdisciplinary definition of pornography: Results from a global Delphi panel. Archives of Sexual Behavior, 49(3), 1085–1091. https://doi.org/10.1007/s10508-019-01554-4 Miller, D. J., Hald, G. M., & Kidd, G. (2018). Self-perceived effects of pornography consumption among heterosexual men. Psychology of Men & Masculinity, 19(3), 469–476. https://doi.org/10.1037/men0000112 Miller, D. J., & McBain, K. A. (2022). The content of contemporary, mainstream pornography: A literature review of content analytic studies. American Journal of Sexuality Education, 17(2), 219–256. https://doi.org/10.1080/15546128.2021.2019648 Miller, D. J., McBain, K. A., & Raggatt, P. T. F. (2019). An experimental investigation into pornography’s effect on men’s perceptions of the likelihood of women engaging in porn-like sex. Psychology of Popular Media Culture, 8(4), 365–375. https://doi.org/10.1037/ppm0000202 Miller, D. J., Raggatt, P. T. F., & McBain, K. (2020). A literature review of studies into the prevalence and frequency of men’s pornography use. American Journal of Sexuality Education, 15(4), 502–529. https://doi.org/10.1080/15546128.2020.1831676 Paasonen, S. (2021). “We watch porn for the fucking, not for romantic tiptoeing”: Extremity, fantasy and women’s porn use. Porn Studies, 1–14. https://doi.org/10.1080/23268743.2021.1956366 Salmon, C., Fisher, M. L., & Burch, R. L. (2019). Evolutionary approaches: Integrating pornography preferences, short-term mating, and infidelity. Personality and Individual Differences, 148, 45–49. https://doi.org/10.1016/j.paid.2019.05.030 Seehuus, M., Stanton, A. M., & Handy, A. B. (2019). On the content of "real-world" sexual fantasy: Results from an analysis of 250,000+ anonymous text-based erotic fantasies. Archives of Sexual Behavior, 48(3), 725–737. https://doi.org/10.1007/s10508-018-1334-0 Shor, E. (2022). Who seeks aggression in pornography? Findings from interviews with viewers. Archives of Sexual Behavior, 51(2), 1237–1255. https://doi.org/10.1007/s10508-021-02053-1 Simon, W., & Gagnon, J. H. (2003). Sexual scripts: Origins, influences and changes. Qualitative Sociology, 26(4), 491–497. https://doi.org/10.1023/B:QUAS.0000005053.99846.e5 Stoller, R. J. (1985). Observing the erotic imagination. Yale University Press. Strizzi, J. M., Øverup, C. S., Ciprić, A., Hald, G. M., & Træen, B. (2022). BDSM: Does it hurt or help sexual satisfaction, relationship satisfaction, and relationship closeness? Journal of Sex Research, 59(2), 248–257. https://doi.org/10.1080/00224499.2021.1950116 Tillman, M., & Wells, B. E. (2022). An intersectional feminist analysis of women's experiences of authenticity in pornography. Journal of Sex Research, 1–17. https://doi.org/10.1080/00224499.2021.2024489 West, C. (2019). Pornography and ethics: An interview with porn performer Blath. Porn Studies, 6(2), 264–267. https://doi.org/10.1080/23268743.2018.1505540 Wiederman, M. W. (2015). Sexual Script Theory: Past, present, and future. In J. DeLamater & R. F. Plante (Eds.), Handbook of the sociology of sexualities (pp. 7–22). Springer. https://doi.org/10.1007/978-3-319-17341-2_2 Williams, L. (1989). Hard Core: Power, pleasure, and the frenzy of the visible. University of California Press. Wright, P. J. (2011). Mass media effects on youth sexual behavior assessing the claim for causality. Annals of the International Communication Association, 35(1), 343–385. https://doi.org/10.1080/23808985.2011.11679121
APA, Harvard, Vancouver, ISO, and other styles
29

Holloway, Donell, Lelia Green, and Robyn Quin. "What Porn?" M/C Journal 7, no. 4 (October 1, 2004). http://dx.doi.org/10.5204/mcj.2381.

Full text
Abstract:
The negative implications of children’s use of the Internet, particularly their loss of innocence through access to pornography, is a topic frequently addressed in public discussions and debate. These debates often take on a technologically determinist point of view and assume that technology directly influences children, usually in a harmful fashion. But what is really happening in the Australian family home? Are parents fearful of these risks, and if so what are they doing about it? A recent exploration of the everyday Internet lives of Australian families indicates that families manage these perceived risks in a variety of ways and are not overly troubled about this issue. Findings from the research project indicate that Australian parents are more concerned about some children’s excessive use of the Internet than about pornography. They construct the Internet as interfering with time available to carry out homework, chores, getting adequate sleep or participating in outdoor (fresh air) activities. This disparity, between public discourse regarding the protection of children in the online environment and the actual significance of this issue in the everyday lives of Australian families, reflects the domestic dynamics within the “moral economy of the household” (Silverstone et al. 15) whereby family relationships and household practices inform the manner in which technology is consumed within any given household. The research project described here (Family Internet: Theorising Domestic Internet Consumption, Production and Use Within Australian Families) is funded by an Australian Research Council Discovery Grant and investigates Internet use within Australian homes with specific reference to families with school-aged children. It explores how individual family members make sense of their family’s engagement with the Internet and investigates ways in which the Internet is integrated within Australian family life. Public Debates The relationship between children and technology is often addressed in public debates regarding children’s health, safety, social and educational development. Within these debates technology is usually held responsible for a variety of harmful consequences to children. These technological ‘effects’ range from the decline of children’s social relationships (with both peers and family); through sedentary lifestyles which impinge on fitness levels and the weight (body mass index) of children; to the corruption of children (and their loss of innocence) through access to unsuitable materials. These unsuitable texts include “soft and hardcore porn, Neo Nazi groups, paedophiles, racial and ethnic hatred” (Valentine et al. 157). Other digital technologies, such as computer and video games, are sometimes seen as exacerbating these problems and raise the spectre of the ‘Nintendo kid’, friendless and withdrawn (Marshall 73), lacking in social skills and unable to relate to others except through multi-player games – although this caricature appears far removed from children’s normal experience of computer gaming (Aisbett: Durkin and Aisbett). Such debates about the negative implications of the Internet and video games run simultaneously alongside government, educational and commercial promotion of these technologies, and the positioning of digital skills and connectivity as the key to children’s future education and employment. In this pro-technology discourse the family: …is being constructed as an entry point for the development of new computer-related literacies and social practices in young people … what is discursively produced within the global cultural economy as digital fun and games for young people, is simultaneously constructed as serious business for parents (Nixon 23). Thus, two conflicting discourses about children’s Internet use exist simultaneously whereby children are considered both “technically competent and at risk from their technical skills” (Valentine et al. 157). This anxiety is further exacerbated by the fear that parents are losing control of their children’s Internet activities because their own (the parents’) technical competencies are being surpassed by their children. Such fear may well be based on misleading information, particularly in the Australian context. The Australian Broadcasting Authority’s 2001 Internet@ home report “challenges the popular belief that parents lag behind their children in their interest and proficiency with online technology. Most often the household Internet ‘expert’ is an adult” (Aisbett 4). Nonetheless, this public anxiety is underscored by a concern that parents may not be sufficiently Internet-savvy to prevent their children’s access to pornography and other undesirable Internet content. This leads to the fundamental anxiety that parents’ natural power base will be diminished (Valentine et al. 157). In the case of children’s access to Internet porn it may well be that: although parents still occupy the role of initiated with regard to sexuality, if they are uninitiated technologically then they lose the power base from which to set the markers for progressive socialisation (Evans and Butkus 68). These popular fears do not take into consideration the context of Internet use in the real world—of children’s and parents’ actual experiences with and uses of the Internet. Parents have developed a variety of ways to manage these perceived risks in the home and are not usually overly concerned about their children’s exposure to unsuitable or inappropriate content on the Internet. Families’ everyday experiences of Internet consumption The home Internet is one site where most parents exercise some degree of care and control of their children, supervising both the quantity and quality of their children’s Internet experiences. When supervising their children’s access to particular Internet sites, parents in this study use a variety of strategies and approaches. These approaches range from a child-empowering ‘autonomous’ approach (which recognises children’s autonomy and competencies) to more authoritarian approaches (with the use of more direct supervision in order to restrict and protect children). At the same time children may use the Internet to affirm their autonomy or independence from their parents, as parents in this study affirm: He used to let me see the [onscreen] conversations but he won’t let me see them now. But that’s fine. If I come up and talk to him, he clicks the button and takes the screen off. (Kathy, pseudonyms used for interviewee contributions) Parents who tend to favour a child-empowering approach recognise their children’s autonomy, while at the same time having relatively high expectations of their children’s psychosocial competence and ability to handle a variety of media texts in a relatively sophisticated manner. When asked about her son’s access to adult Internet content, single mum Lisa indicated that Henry (17) had openly accessed Internet pornography a few years earlier. She expected (and allowed for) some exploration by her son. At the same time, she was not overly concerned that these materials would corrupt or harm him as she expected these explorations to be a transitory phase in his life: It doesn’t bother me at all. If he wants to do that then he can do it because he’ll get sick of it and I think initially it was ‘let’s see what we can do’. I remember once, he called me in and says ‘Mum, come and look at her boobs’ and I looked at it and I said ‘it’s disgusting’ or something and walked away and he laughed his head off. But I’ve never come in [lately] and found him looking at that stuff … It’s just not something that I’m … really worried about. It’s up to him (Lisa). As with this exchange, families often use media texts as tools in the socialisation of children. The provision of shared topics of conversation allows for discussions between generations: Such materials serve an agenda-setting role … [playing] an important role in providing a socioemotional context for the household within which learning takes place. Technoculture is consequently a critical tool for socialisation … ICTs also construct a framework on/with which to differentiate one member from another, to differentiate between generations, and to differentiate ways in which power and control can be asserted (Green 58). In this case, Lisa’s comment to her teenage son (‘it’s disgusting’) and her actions (in walking away) doubtlessly provided Henry with a social cue, an alternative attitude to his choice of online content. Further, in initiating this exchange with his mother, Henry is likely to have been making a statement about his own autonomy and transition into (heterosexual) manhood. In his interview, Henry openly acknowledged his earlier exploration of adult porn sites but (as his mother anticipated) he seems to have moved on from this particular phase. When asked whether he visited adult sites on the Internet Henry responded in his own succinct manner: Henry: Like porn and stuff? Not really. I probably did when I was a bit younger but it’s not really very exciting. Interviewer: That was when you first got it [the Internet] or when? Henry: Yeah, [two to three years earlier] all your friends come around and you check out the sites. It’s nothing exciting anymore. Sexual experiences and knowledge are an important currency within teenage boy culture (Holland et al. 1998) and like other teenage boys, Henry and his friends are likely to have used this technology in order to “negotiate their masculinity within the heterosexual economy of [their] peer group social relations”(Valentine et al. 160). In this case, it seemed to be a transitory stage within Henry’s peer (or community of interest) group and became less important as the teenagers grew into maturity. Many children and young people are also exploring the social world of Internet chat, with the potential risk of unwanted (and unsafe) face-to-face contact. Leonie, mother of teenage girls, explained her daughters’ ability to negotiate these potentially unsafe contacts: I suppose you just get a bit concerned about the chat lines and who they’re talking to sometimes but really they usually tell me … [to 17-year old daughter in the room] Like on the chat lines you, when, had that idiot … that one that was going to come over here. Just some idiots on there. A lot of the kids are teenagers. I know Shani’s [14] gotten on there a few times on the chat line and there’s been obviously someone asking them lewd questions and she’s usually blocked them and cut them off …(Leonie). Daughter Shani also discusses her experiences with unsafe (unwanted) Internet contact: “They go on about stuff that you don’t really want to talk about and it’s just ‘No, I don’t think so’” (Shani, 14). Shani went on to explain that she now prefers to use instant messaging with known (offline) friends—a preference now taken up by many teenagers (Holloway and Green: Livingstone and Bober). Electronic media play an important role in children’s transition to adulthood. The ubiquitousness of the World Wide Web, however, makes restriction and protection of children increasingly difficult to realise (Buckingham 84-5). Instead, many parents in this study are placing more importance on openness, consultation and discussion with their children about the media texts they encounter, rather than imposing restriction and regulation which these parents believe may well be “counter-productive” (Nightingale et al. 19). Of greater disquiet to many parents in this study than their children’s access to unsuitable online content is concern about their children’s possible excessive use of the Internet. Parents were typically more concerned about the amount of time some of their children were spending chatting to friends and playing online games. One mother explains: They [my daughters] started to use MSN whilst they were doing school work and obviously kids are able to listen to music, watch television, do a project. They can multi-task without all the confusion that I [would have] but we actually now, they’re not able to do MSN during the school week at all … so we now said to them, “if you want to ring somebody, give them a call, that’s fine, we don’t mind, but during the week no MSN” … we’ve actually restricted them (Stephanie). Parental concern about children’s excessive use of the Internet was most marked for parents of teenage children: adolescence being a time when “rules about media consumption can be an early site of resistance for young adults keen to take more power for themselves and their own lives” (Green 30). Father of two, Xavier, expressed his concern about (what he perceived as) his teenage son’s excessive use of the Internet: Well I think there’s far too much time … Gavin’ll spend a whole day on it. I try to get him to come to the footy on Sunday. No. He’s available for friends [for online gaming and chat on the Internet]. He’ll spend all day on the computer (Xavier). Son Gavin (16), in a separate interview, anticipated that this criticism had been made and felt compelled to counter it: Well he [dad] makes comments like saying I’m not fit enough ‘cause I spent too much time on the computer but I play soccer a lot. Like, I do sport perhaps everyday at school … I mean, I think, such a piece of crap (Gavin). Thus, the incorporation of the Internet into the domestic sphere often sees previously established boundaries (who uses what, when, where and for how long) redefined, challenged, resisted and defended by various family members. In this way the Internet (and other new media) helps shape (and is shaped by) the temporal and spatial boundaries within the home. Conclusion While all parents in the Family Internet study construct the Internet as a site which requires some level of care and control over their children’s online use, they use a variety of approaches when carrying out this supervisory role. Some parents tend to allow for children’s free exploration of the Internet and are relatively confident that their children are able to negotiate adult texts such as pornography in a comparatively sophisticated manner. Other parents, those inclined to protect their children from the dangers of adult content and unsafe Internet contact, choose to monitor and restrict their children’s access to the Internet to varying degrees. More consistent is parental concern about excessive use of the Internet, and the assumption that this displaces constructive use of children’s time. Public anxieties about children’s use of the Internet make assumptions about children’s media practices. Children (and their families) are often assumed to be less able to differentiate between suitable and unsuitable Internet texts and to deal with these potential dangers in a sensible manner. These fears presuppose a variety of negative impacts on children’s and young peoples’ lives which may have little to do with daily reality. Our exploration of families’ everyday experiences of Internet consumption highlights the disparity between public anxieties about Internet use and the importance of these anxieties in the everyday lives of families. The major concern of families – ill-disciplined and excessive Internet use – barely registers on the same scale as the public moral panic over children’s possible access to online pornography. These findings say less about the Internet as a locale in cyberspace than they do about the domestic dynamics of the household, parenting styles, relationships between parent(s) and children, and the sociocultural context of family life. References Aisbett, Kate. The Internet at Home: A Report on Internet Use in the Home. Sydney: Australian Broadcasting Authority, 2001. Buckingham, David. After the Death of Childhood: Growing up in the Age of Electronic Media. Cambridge, UK: Polity Press, 2000. Durkin, Kevin and Kate Aisbett. Computer Games and Australians Today. Sydney: Office of Film and Literature Classification, 1999. Evans, Mark and Clarice Butkus. “Regulating the Emergent: Cyberporn and the Traditional Media.” Media International Australia 85 (1997): 62-9. Green, Lelia. Technoculture: >From Alphabet to Cybersex. Crows Nest Australia: Allen and Unwin, 2002. Holland, Janet and Caroline Ramazanoglu, Sue Sharpe and Rachel Thomson. The Male in the Head: Young People, Heterosexuality and Power. London: Tufnell Press, 1998. Holloway, Donell and Lelia Green. “Home Is Where You Hang Your @: Australian Women on the Net.” Communications Research Forum. Canberra: Department of Communications, Information Technology and the Arts, 2003. Livingstone, Sonia and Magdalena Bober. UK Children Go Online: Listening to Young People’s Experiences. London: London School of Economics and Political Science, 2003. Marshall, P. David. “Technophobia: Video Games, Computer Hacks and Cybernetics.” Media International Australia 85 (1997): 70-8. Nightingale, Virginia, Dianne Dickenson and Catherine Griff. “Harm: Children’s Views About Media Harm and Program Classification.” Forum. Sydney, Australia, 2000. Nixon, Helen. “Fun and Games Are Serious Business.” Digital Diversions: Youth Culture in the Age of Multi-Media. Ed. J Sefton-Green. London: UCL Press, 1998. Silverstone, Roger, Eric Hirsch and David Morley. “Information and Communication and the Moral Economy of the Household.” Consuming Technologies: Media and Information in Domestic Spaces. Eds. Roger Silverstone and Eric Hirsch. London: Routledge, 1992. 17-31. Valentine, Gill, Sarah Holloway and Nick Bingham. “Transforming Cyberspace: Children’s Interventions in the New Public Sphere.” Children’s Geographies: Playing, Living, Learning. Eds. Sarah L. Holloway and Gill Valentine. London: Routledge, 2000. 156 – 93. MLA Style Holloway, Donell, Lelia Green & Robyn Quin. "What Porn?: Children and the Family Internet." M/C Journal 7.4 (2004). 10 October 2004 <http://www.media-culture.org.au/0410/02_children.php>. APA Style Holloway, D., Green, L. & Quin, R. (2004 Oct 11). What Porn?: Children and the Family Internet, M/C Journal, 7(4). Retrieved Oct 10 2004 from <http://www.media-culture.org.au/0410/02_children.php>
APA, Harvard, Vancouver, ISO, and other styles
30

Döring, Nicola, and Dan J. Miller. "Performer Demographics (Portrayals of Sexuality in Pornography)." DOCA - Database of Variables for Content Analysis, October 24, 2022. http://dx.doi.org/10.34778/5o.

Full text
Abstract:
Pornography is a fictional media genre that depicts sexual fantasies and explicitly presents naked bodies and sexual activities for the purpose of sexual arousal (Williams, 1989; McKee et al., 2020). Regarding media ethics and media effects, pornography has traditionally been viewed as highly problematic. Pornographic material has been accused of portraying sexuality in unhealthy, morally questionable and often sexist ways, thereby harming performers, audiences, and society at large. In the age of the Internet, pornography has become more diverse, accessible, and widespread than ever (Döring, 2009; Miller et al., 2020). Consequently, the depiction of sexuality in pornography is the focus of a growing number of content analyses of both mass media (e.g., erotic and pornographic novels and movies) and social media (e.g., erotic and pornographic stories, photos and videos shared via online platforms). Typically, pornography’s portrayals of sexuality are examined by measuring the prevalence and frequency of sexual practices or relational dynamics and related gender roles via quantitative content analysis (for research reviews see Carrotte et al., 2020; Miller & McBain, 2022). This entry focuses on the representation of performer demographics (such as sex/gender, age, and race/ethnicity) as one of eight important dimensions of the portrayals of sexuality in pornography. Field of application/theoretical foundation: In the field of pornographic media content research, different theories are used, mainly 1) general media effects theories, 2) sexual media effects theories, 3) gender role, feminist and queer theories, 4) sexual fantasy and desire theories, and different 5) mold theories versus mirror theories. The DOCA entry “Conceptual Overview (Portrayals of Sexuality in Pornography)” introduces all these theories and explains their application to pornography. The respective theories are applicable to the analysis of the depiction of performer demographics as one dimension of portrayals of sexuality in pornography. References/combination with other methods of data collection: Manual quantitative content analyses of pornographic material can be combined with qualitative (e.g., Keft-Kennedy, 2008) as well as computational (e.g., Seehuus et al., 2019) content analyses. Furthermore, content analyses can be complemented with qualitative interviews and quantitative surveys to investigate perceptions and evaluations of the portrayals of sexuality in pornography among pornography’s creators and performers (e.g., West, 2019) and audiences (e.g., Cowan & Dunn, 1994; Hardy et al., 2022; Paasoonen, 2021; Shor, 2022). Additionally, experimental studies are helpful to measure directly how different dimensions of pornographic portrayals of sexuality are perceived and evaluated by recipients, and if and how these portrayals can affect audiences’ sexuality-related thoughts, feelings, and behaviors (e.g., Kohut & Fisher, 2013; Miller et al., 2019). Example studies for manual quantitative content analyses: Common research hypotheses in relation to performer demographics state that pornography portrays sexuality in a sexist manner entailing violence towards and degradation of women, usually perpetrated by men. In addition, it is hypothesized that pornographic portrayals of sexuality are asymmetric in terms of showing men in superior and dominating, and women in subordinate and submissive, positions. This sex/gender asymmetry can be reflected in demographic variables such as social status (difference) or age (difference). Furthermore, mainstream pornography is critized for its racist portrayal of sexuality. This means that non-White performers are underrepresented and if they are represented are often depicted according to racial/ethnic stereotypes. To test such hypotheses and code pornographic material accordingly, it is necessary to clarify demographic concepts such as sex/gender, age, and race/ethnicity and use valid and reliable measures. It is important to note that in the context of pornographic content research, researchers conceptualize demographic characteristics differently and that two different approaches to coding are available: Direct coding based on the person’s appearance (e.g., apparent sex/gender, age or skin color) versus indirect coding based on meta-information about the material, such as the sub-genre category the material belongs to (e.g., pornography category “Asian” displaying Asian-looking performers or “Teen” displaying adult performers who look very young). If applying an intersectional theoretical framework (see DOCA entry “Conceptual Overview (Portrayals of Sexuality in Pornography)”) the researcher would need to code each performer in terms of multiple demographic variables. Coding Material Measure Operationalization (excerpt) Reliability Source Sex/gender: Most analyses of the way sexuality is portrayed in pornography hypothesize (or, at least, acknowledge the possibility) that men and women are depicted differently (e.g., that men are more likely to be depicted as the perpetrators of violent behaviors and that women are more likely to be depicted as recipients of violent behaviors). Accordingly, coding the sex/gender of performers is often essential to addressing research questions in this area. The term gender is often preferred when referring to people as groups, as gender reflects a social categorization, whereas sex reflects a biological categorization (American Psychological Association, 2020). While many content analyses of pornography address sex/gender differences they do not present any standardized measures for the demographic variable of sex/gender. The measure presented below is one of the rare exceptions, but it remains vague in its coding instructions and the meanings of the value “other”. N=50 segments (length 20 min. each) from a random sample of 50 bestselling pornographic films (1 segment per film) depicting a total of 1,109 sexual behaviors Sex/gender (based on performer appearance) “Coder’s perception of character’s sex based on primary and secondary sex characteristics.” Polytomous coding (1: male; 2: female; 3: other). Cohen’s Kappa: 1.0 Willis et al. (2020) Age: Performer age may be a variable of interest in its own right (e.g., if investigating whether pornography has a bias toward depicting performers in their early 20s). Alternatively, performer age may be recorded to investigate differential depictions by age group (e.g., investigating whether younger female performers are more likely to be depicted as submissive than older female performers). It should be noted that a performer’s age may be different to their character’s age (as is often the case in the legal pornography category “Teen”, where young characters are played by adult performers; Willis et al, 2020). It should be noted that reliable coding of age (of the performer or of the performed character) is difficult as tools such as make-up, costume, lighting, filters can greatly bias impressions. This problem is reflected in the available measures that cannot ensure sufficient reliability. N=50 best-selling pornographic videos and DVDs in Australia in 2003 with 838 sexual scenes Age of performer (based on performer appearance) Performer age. Polytomous coding (1: 18-30 years; 2: 31-40 years; 3: 41-50 years; 4: 51+ years). Not available McKee et al. (2008) N=50 segments (length 20 min. each) from a random sample of 50 bestselling pornographic films (1 segment per film) depicting a total of 1,109 sexual behaviors Age of character (based on character appearance) “Coder’s perception of character’s age—not the actor’s—based on physical appearance.” Note: some characters were clearly intended to be under 18 years of age, but their actors were likely older. Polytomous coding (1: <18; 2: 18-20; 3: 21-30; 4: 31-40; 5: 41-50; 6: >50 years). Cohen’s Kappa: .47 Willis et al. (2020) Race/Ethnicity: Critical analyses of racism in pornography address the mere visibility of different races/ethnicities as well as racial/ethnic stereotypes, such as Black men being depicted as sexually aggressive and well-endowed or Asian women being depicted as petite, submissive and docile (Miller & McBain, 2022). N=269 popular pornographic videos from different PornHub.com sub-genre categories Race/ethnicity (based on pornographic sub-genre category) Videos selected/coded according to race/ethnicity-related sub-genre categories on PornHub. Polytomous coding (1: “Asian/Japanese” PornHub categeory; 2: “Interracial” PornHub category; 3: “Ebony” PornHub category; 4: “Latina” PornHub category). Not applicable Shor & Seida (2019) N=45 pornographic videos from 15 different adult websites (3 videos per website) Race/ethnicity (based on performer appearance) Performers coded according to physical appearance. Binary coding (1: White; 2: non-White/other race). Not available Gorman et al. (2010) N=50 segments (length 20 min. each) from a random sample of 50 bestselling pornographic films (1 segment per film) depicting a total of 1,109 sexual behaviors Race/ethnicity (based on performer appearance) “Coder’s perception of character’s race based on physical appearance.” Polytomous coding (1: White; 2: Black; 3: Asian; 4: Latina/o; 5: Native American; 6: other). Cohen’s Kappa: .94 Willis et al. (2020) ReferencesAmerican Psychological Association. (2020). Publication manual of the American Psychological Association (7th ed.).Carrotte, E. R., Davis, A. C., & Lim, M. S. (2020). Sexual behaviors and violence in pornography: Systematic review and narrative synthesis of video content analyses. Journal of Medical Internet Research, 22(5), Article e16702. https://doi.org/10.2196/16702Cowan, G., & Dunn, K. F. (1994). What themes in pornography lead to perceptions of the degradation of women? Journal of Sex Research, 31(1), 11–21. https://doi.org/10.1080/00224499409551726Döring, N. (2009). The Internet’s impact on sexuality: A critical review of 15 years of research. Computers in Human Behavior, 25(5), 1089–1101. https://doi.org/10.1016/j.chb.2009.04.003Gorman, S., Monk-Turner, E., & Fish, J. N. (2010). Free adult internet web sites: How prevalent are degrading acts? Gender Issues, 27(3-4), 131–145. https://doi.org/10.1007/s12147-010-9095-7Hardy, J., Kukkonen, T., & Milhausen, R. (2022). Examining sexually explicit material use in adults over the age of 65 years. The Canadian Journal of Human Sexuality, 31(1), 117–129. https://doi.org/10.3138/cjhs.2021-0047Keft-Kennedy, V. (2008). Fantasising masculinity in Buffyverse slash fiction: Sexuality, violence, and the vampire. Nordic Journal of English Studies, 7(1), 49–80.Kohut, T., & Fisher, W. A. (2013). The impact of brief exposure to sexually explicit video clips on partnered female clitoral self-stimulation, orgasm and sexual satisfaction. The Canadian Journal of Human Sexuality, 22(1), 40–50. https://doi.org/10.3138/cjhs.935McKee, A. (2015). Methodological issues in defining aggression for content analyses of sexually explicit material. Archives of Sexual Behavior, 44(1), 81–87. https://doi.org/10.1007/s10508-013-0253-3McKee, A., Byron, P., Litsou, K., & Ingham, R. (2020). An interdisciplinary definition of pornography: Results from a global Delphi panel. Archives of Sexual Behavior, 49(3), 1085–1091. https://doi.org/10.1007/s10508-019-01554-4Miller, D. J., & McBain, K. A. (2022). The content of contemporary, mainstream pornography: A literature review of content analytic studies. American Journal of Sexuality Education, 17(2), 219–256. https://doi.org/10.1080/15546128.2021.2019648Miller, D. J., McBain, K. A., & Raggatt, P. T. F. (2019). An experimental investigation into pornography’s effect on men’s perceptions of the likelihood of women engaging in porn-like sex. Psychology of Popular Media Culture, 8(4), 365–375. https://doi.org/10.1037/ppm0000202Miller, D. J., Raggatt, P. T. F., & McBain, K. (2020). A literature review of studies into the prevalence and frequency of men’s pornography use. American Journal of Sexuality Education, 15(4), 502–529. https://doi.org/10.1080/15546128.2020.1831676Paasonen, S. (2021). “We watch porn for the fucking, not for romantic tiptoeing”: Extremity, fantasy and women’s porn use. Porn Studies, 1–14. https://doi.org/10.1080/23268743.2021.1956366Seehuus, M., Stanton, A. M., & Handy, A. B. (2019). On the content of "real-world" sexual fantasy: Results from an analysis of 250,000+ anonymous text-based erotic fantasies. Archives of Sexual Behavior, 48(3), 725–737. https://doi.org/10.1007/s10508-018-1334-0Shor, E. (2022). Who seeks aggression in pornography? Findings from interviews with viewers. Archives of Sexual Behavior, 51(2), 1237–1255. https://doi.org/10.1007/s10508-021-02053-1Shor, E., & Seida, K. (2019). "Harder and harder"? Is mainstream pornography becoming increasingly violent and do viewers prefer violent content? Journal of Sex Research, 56(1), 16–28. https://doi.org/10.1080/00224499.2018.1451476West, C. (2019). Pornography and ethics: An interview with porn performer Blath. Porn Studies, 6(2), 264–267. https://doi.org/10.1080/23268743.2018.1505540Williams, L. (1989). Hard Core: Power, pleasure, and the frenzy of the visible. University of California Press.Willis, M., Canan, S. N., Jozkowski, K. N., & Bridges, A. J. (2020). Sexual consent communication in best-selling pornography films: A content analysis. Journal of Sex Research, 57(1), 52–63. https://doi.org/10.1080/00224499.2019.1655522
APA, Harvard, Vancouver, ISO, and other styles
31

Markert, Charlotte, Andreas M. Baranowski, Simon Koch, Rudolf Stark, and Jana Strahler. "The Impact of Negative Mood on Event-Related Potentials When Viewing Pornographic Pictures." Frontiers in Psychology 12 (July 5, 2021). http://dx.doi.org/10.3389/fpsyg.2021.673023.

Full text
Abstract:
Background: Negative affective states may increase the risk for problematic pornography use. Underlying neurophysiological mechanisms are, however, not completely understood. Previous research suggests that the participants' emotional state may affect neural processing of sexual stimuli. The aim of this study was to investigate neural correlates of negative affect-induced alterations in sexual cue reactivity in healthy men. The moderating effects of habitual porn consumption, trait sexual motivation, and symptoms of cybersex addiction were also considered.Method: Sixty-four healthy men engaged in a sexual cue reactivity task (passive viewing of explicit sexual pictures and neutral pictures depicting scenes of social interaction) during negative (n = 32) vs. neutral affect (n = 32), induced via tailored feedback on a performance task. Self-reported sexual arousal and event-related brain potentials indicated cue reactivity and motivated attention. Symptoms of cybersex addiction and trait sexual motivation were assessed with the help of the short Internet Addiction Test, adapted to online sexual activities, and the Trait Sexual Motivation Questionnaire.Results: Negative feedback increased negative affect after the performance task. While sexual pictures compared to neutral pictures elicited significantly larger P300 and late positive potential (LPP) amplitudes, there was no general effect of negative feedback on sexual stimuli-related P300 and LPP amplitudes. In the negative feedback group, men with higher solitary sexual motivation levels showed higher P300/LPP difference amplitudes for sexual stimuli compared to men with lower levels of solitary sexual motivation. The opposite effect was found in the group with neutral feedback. There was no link to other aspects of trait sexual motivation and symptoms of cybersex addiction.Conclusions: Results suggest that higher levels of solitary sexual motivation may enhance motivated attention toward sexual stimuli among men receiving negative performance feedback. Other characteristics of sexual behaviors and traits provided no exploratory value. Future studies extending onto men suffering from compulsive sexual behavior disorder will have to closer look at the neurophysiological bases of why and when some men develop an addictive pornography consumption.
APA, Harvard, Vancouver, ISO, and other styles
32

Ammigan, Ravichandran. "Understanding the Experiences of Mauritian Students at Institutions of Higher Education Overseas." Journal for Students Affairs in Africa, 2022. http://dx.doi.org/10.24085/saa.v10i1.3548.

Full text
Abstract:
Each year, a significant number of students from the Indian Ocean island of Mauritius seek higher education opportunities abroad. Yet, limited research exists on these students’ expectations, preferences, and experiences in their academic and non-academic university settings overseas. This quantitative study investigates the experiences of Mauritian degree-seeking students at universities in Australia and the United Kingdom, which have been two of their most preferred destination countries for Mauritian international students over the years. It specifically examines associations between overall university satisfaction and various aspects of the student experience in the arrival, learning, living, and support services environment. Analyses from this research reveal that a number of satisfaction variables were important to students, namely the opportunity to make friends on campus, the availability of social activities and facilities, internet access and IT support, and chaplaincy or multi-faith provision. Implications for international educators, university administrators, and guidance counselors are discussed.
APA, Harvard, Vancouver, ISO, and other styles
33

Wagman, Ira. "Wasteaminute.com: Notes on Office Work and Digital Distraction." M/C Journal 13, no. 4 (August 18, 2010). http://dx.doi.org/10.5204/mcj.243.

Full text
Abstract:
For those seeking a diversion from the drudgery of work there are a number of websites offering to take you away. Consider the case of wasteaminute.com. On the site there is everything from flash video games, soft-core pornography and animated nudity, to puzzles and parlour games like poker. In addition, the site offers links to video clips grouped in categories such as “funny,” “accidents,” or “strange.” With its bright yellow bubble letters and elementary design, wasteaminute will never win any Webby awards. It is also unlikely to be part of a lucrative initial public offering for its owner, a web marketing company based in Lexington, Kentucky. The internet ratings company Alexa gives wasteaminute a ranking of 5,880,401 when it comes to the most popular sites online over the last three months, quite some way behind sites like Wikipedia, Facebook, and Windows Live.Wasteaminute is not unique. There exists a group of websites, a micro-genre of sorts, that go out of their way to offer momentary escape from the more serious work at hand, with a similar menu of offerings. These include sites with names such as ishouldbeworking.com, i-am-bored.com, boredatwork.com, and drivenbyboredom.com. These web destinations represent only the most overtly named time-wasting opportunities. Video sharing sites like YouTube or France’s DailyMotion, personalised home pages like iGoogle, and the range of applications available on mobile devices offer similar opportunities for escape. Wasteaminute inspired me to think about the relationship between digital media technologies and waste. In one sense, the site’s offerings remind us of the Internet’s capacity to re-purpose old media forms from earlier phases in the digital revolution, like the retro video game PacMan, or from aspects of print culture, like crosswords (Bolter and Grusin; Straw). For my purposes, though, wasteaminute permits the opportunity to meditate, albeit briefly, on the ways media facilitate wasting time at work, particularly for those working in white- and no-collar work environments. In contemporary work environments work activity and wasteful activity exist on the same platform. With a click of a mouse or a keyboard shortcut, work and diversion can be easily interchanged on the screen, an experience of computing I know intimately from first-hand experience. The blurring of lines between work and waste has accompanied the extension of the ‘working day,’ a concept once tethered to the standardised work-week associated with modernity. Now people working in a range of professions take work out of the office and find themselves working in cafes, on public transportation, and at times once reserved for leisure, like weekends (Basso). In response to the indeterminate nature of when and where we are at work, the mainstream media routinely report about the wasteful use of computer technology for non-work purposes. Stories such as a recent one in the Washington Post which claimed that increased employee use of social media sites like Facebook and Twitter led to decreased productivity at work have become quite common in traditional media outlets (Casciato). Media technologies have always offered the prospect of making office work more efficient or the means for management to exercise control over employees. However, those same technologies have also served as the platforms on which one can engage in dilatory acts, stealing time from behind the boss’s back. I suggest stealing time at work may well be a “tactic,” in the sense used by Michel de Certeau, as a means to resist the rules and regulations that structure work and the working life. However, I also consider it to be a tactic in a different sense: websites and other digital applications offer users the means to take time back, in the form of ‘quick hits,’ providing immediate visual or narrative pleasures, or through interfaces which make the time-wasting look like work (Wagman). Reading sites like wasteaminute as examples of ‘office entertainment,’ reminds us of the importance of workers as audiences for web content. An analysis of a few case studies also reveals how the forms of address of these sites themselves recognise and capitalise on an understanding of the rhythms of the working day, as well as those elements of contemporary office culture characterised by interruption, monotony and surveillance. Work, Media, Waste A mass of literature documents the transformations of work brought on by industrialisation and urbanisation. A recent biography of Franz Kafka outlines the rigors imposed upon the writer while working as an insurance agent: his first contract stipulated that “no employee has the right to keep any objects other than those belonging to the office under lock in the desk and files assigned for its use” (Murray 66). Siegfried Kracauer’s collection of writings on salaried workers in Germany in the 1930s argues that mass entertainment offers distractions that inhibit social change. Such restrictions and inducements are exemplary of the attempts to make work succumb to managerial regimes which are intended to maximise productivity and minimise waste, and to establish a division between ‘company time’ and ‘free time’. One does not have to be an industrial sociologist to know the efforts of Frederick W. Taylor, and the disciplines of “scientific management” in the early twentieth century which were based on the idea of making work more efficient, or of the workplace sociology scholarship from the 1950s that drew attention to the ways that office work can be monotonous or de-personalising (Friedmann; Mills; Whyte). Historian JoAnne Yates has documented the ways those transformations, and what she calls an accompanying “philosophy of system and efficiency,” have been made possible through information and communication technologies, from the typewriter to carbon paper (107). Yates evokes the work of James Carey in identifying these developments, for example, the locating of workers in orderly locations such as offices, as spatial in nature. The changing meaning of work, particularly white-collar or bureaucratic labour in an age of precarious employment and neo-liberal economic regimes, and aggressive administrative “auditing technologies,” has subjected employees to more strenuous regimes of surveillance to ensure employee compliance and to protect against waste of company resources (Power). As Andrew Ross notes, after a deep period of self-criticism over the drudgery of work in North American settings in the 1960s, the subsequent years saw a re-thinking of the meaning of work, one that gradually traded greater work flexibility and self-management for more assertive forms of workplace control (9). As Ross notes, this too has changed, an after-effect of “the shareholder revolution,” which forced companies to deliver short-term profitability to its investors at any social cost. With so much at stake, Ross explains, the freedom of employees assumed a lower priority within corporate cultures, and “the introduction of information technologies in the workplace of the new capitalism resulted in the intensified surveillance of employees” (12). Others, like Dale Bradley, have drawn attention to the ways that the design of the office itself has always concerned itself with the bureaucratic and disciplinary control of bodies in space (77). The move away from physical workspaces such as ‘the pen’ to the cubicle and now from the cubicle to the virtual office is for Bradley a move from “construction” to “connection.” This spatial shift in the way in which control over employees is exercised is symbolic of the liquid forms in which bodies are now “integrated with flows of money, culture, knowledge, and power” in the post-industrial global economies of the twenty-first century. As Christena Nippert-Eng points out, receiving office space was seen as a marker of trust, since it provided employees with a sense of privacy to carry out affairs—both of a professional or of a personal matter—out of earshot of others. Privacy means a lot of things, she points out, including “a relative lack of accountability for our immediate whereabouts and actions” (163). Yet those same modalities of control which characterise communication technologies in workspaces may also serve as the platforms for people to waste time while working. In other words, wasteful practices utilize the same technology that is used to regulate and manage time spent in the workplace. The telephone has permitted efficient communication between units in an office building or between the office and outside, but ‘personal business’ can also be conducted on the same line. Radio stations offer ‘easy listening’ formats, providing unobtrusive music so as not to disturb work settings. However, they can easily be tuned to other stations for breaking news, live sports events, or other matters having to do with the outside world. Photocopiers and fax machines facilitate the reproduction and dissemination of communication regardless of whether it is it work or non-work related. The same, of course, is true for computerised applications. Companies may encourage their employees to use Facebook or Twitter to reach out to potential clients or customers, but those same applications may be used for personal social networking as well. Since the activities of work and play can now be found on the same platform, employers routinely remind their employees that their surfing activities, along with their e-mails and company documents, will be recorded on the company server, itself subject to auditing and review whenever the company sees fit. Employees must be careful to practice image management, in order to ensure that contradictory evidence does not appear online when they call in sick to the office. Over time the dynamics of e-mail and Internet etiquette have changed in response to such developments. Those most aware of the distractive and professionally destructive features of downloading a funny or comedic e-mail attachment have come to adopt the acronym “NSFW” (Not Safe for Work). Even those of us who don’t worry about those things are well aware that the cache and “history” function of web browsers threaten to reveal the extent to which our time online is spent in unproductive ways. Many companies and public institutions, for example libraries, have taken things one step further by filtering out access to websites that may be peripheral to the primary work at hand.At the same time contemporary workplace settings have sought to mix both work and play, or better yet to use play in the service of work, to make “work” more enjoyable for its workers. Professional development seminars, team-building exercises, company softball games, or group outings are examples intended to build morale and loyalty to the company among workers. Some companies offer their employees access to gyms, to game rooms, and to big screen TVs, in return for long and arduous—indeed, punishing—hours of time at the office (Dyer-Witheford and Sherman; Ross). In this manner, acts of not working are reconfigured as a form of work, or at least as a productive experience for the company at large. Such perks are offered with an assumption of personal self-discipline, a feature of what Nippert-Eng characterises as the “discretionary workplace” (154). Of course, this also comes with an expectation that workers will stay close to the office, and to their work. As Sarah Sharma recently argued in this journal, such thinking is part of the way that late capitalism constructs “innovative ways to control people’s time and regulate their movement in space.” At the same time, however, there are plenty of moments of gentle resistance, in which the same machines of control and depersonalisation can be customised, and where individual expressions find their own platforms. A photo essay by Anna McCarthy in the Journal of Visual Culture records the inspirational messages and other personalised objects with which workers adorn their computers and work stations. McCarthy’s photographs represent the way people express themselves in relation to their work, making it a “place where workplace politics and power relations play out, often quite visibly” (McCarthy 214). Screen SecretsIf McCarthy’s photo essay illustrates the overt ways in which people bring personal expression or gentle resistance to anodyne workplaces, there are also a series of other ‘screen acts’ that create opportunities to waste time in ways that are disguised as work. During the Olympics and US college basketball playoffs, both American broadcast networks CBS and NBC offered a “boss button,” a graphic link that a user could immediately click “if the boss was coming by” that transformed the screen to something was associated with the culture of work, such as a spreadsheet. Other purveyors of networked time-wasting make use of the spreadsheet to mask distraction. The website cantyouseeimbored turns a spreadsheet into a game of “Breakout!” while other sites, like Spreadtweet, convert your Twitter updates into the form of a spreadsheet. Such boss buttons and screen interfaces that mimic work are the presentday avatars of the “panic button,” a graphic image found at the bottom of websites back in the days of Web 1.0. A click of the panic button transported users away from an offending website and towards something more legitimate, like Yahoo! Even if it is unlikely that boss keys actually convince one’s superiors that one is really working—clicking to a spreadsheet only makes sense for a worker who might be expected to be working on those kinds of documents—they are an index of how notions of personal space and privacy play out in the digitalised workplace. David Kiely, an employee at an Australian investment bank, experienced this first hand when he opened an e-mail attachment sent to him by his co-workers featuring a scantily-clad model (Cuneo and Barrett). Unfortunately for Kiely, at the time he opened the attachment his computer screen was visible in the background of a network television interview with another of the bank’s employees. Kiely’s inauspicious click (which made his the subject of an investigation by his employees) continues to circulate on the Internet, and it spawned a number of articles highlighting the precarious nature of work in a digitalised environment where what might seem to be private can suddenly become very public, and thus able to be disseminated without restraint. At the same time, the public appetite for Kiely’s story indicates that not working at work, and using the Internet to do it, represents a mode of media consumption that is familiar to many of us, even if it is only the servers on the company computer that can account for how much time we spend doing it. Community attitudes towards time spent unproductively online reminds us that waste carries with it a range of negative signifiers. We talk about wasting time in terms of theft, “stealing time,” or even more dramatically as “killing time.” The popular construction of television as the “boob tube” distinguishes it from more ‘productive’ activities, like spending time with family, or exercise, or involvement in one’s community. The message is simple: life is too short to be “wasted” on such ephemera. If this kind of language is less familiar in the digital age, the discourse of ‘distraction’ is more prevalent. Yet, instead of judging distraction a negative symptom of the digital age, perhaps we should reinterpret wasting time as the worker’s attempt to assert some agency in an increasingly controlled workplace. ReferencesBasso, Pietro. Modern Times, Ancient Hours: Working Lives in the Twenty-First Century. London: Verso, 2003. Bolter, Jay David, and Richard Grusin. Remediation: Understanding New Media. Cambridge: MIT Press, 2000.Bradley, Dale. “Dimensions Vary: Technology, Space, and Power in the 20th Century Office”. Topia 11 (2004): 67-82.Casciato, Paul. “Facebook and Other Social Media Cost UK Billions”. Washington Post, 5 Aug. 2010. 11 Aug. 2010 ‹http://www.washingtonpost.com/wp-dyn/content/article/2010/08/05/AR2010080503951.html›.Cuneo, Clementine, and David Barrett. “Was Banker Set Up Over Saucy Miranda”. The Daily Telegraph 4 Feb. 2010. 21 May 2010 ‹http://www.dailytelegraph.com.au/entertainment/sydney-confidential/was-banker-set-up-over-saucy-miranda/story-e6frewz0-1225826576571›.De Certeau, Michel. The Practice of Everyday Life. Vol. 1. Berkeley: U of California P. 1988.Dyer-Witheford, Nick, and Zena Sharman. "The Political Economy of Canada's Video and Computer Game Industry”. Canadian Journal of Communication 30.2 (2005). 1 May 2010 ‹http://www.cjc-online.ca/index.php/journal/article/view/1575/1728›.Friedmann, Georges. Industrial Society. Glencoe, Ill.: Free Press, 1955.Kracauer, Siegfried. The Salaried Masses. London: Verso, 1998.McCarthy, Anna. Ambient Television. Durham: Duke UP, 2001. ———. “Geekospheres: Visual Culture and Material Culture at Work”. Journal of Visual Culture 3 (2004): 213-21.Mills, C. Wright. White Collar. Oxford: Oxford UP, 1951. Murray, Nicholas. Kafka: A Biography. New Haven: Yale UP, 2004.Newman, Michael. “Ze Frank and the Poetics of Web Video”. First Monday 13.5 (2008). 1 Aug. 2010 ‹http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2102/1962›.Nippert-Eng, Christena. Home and Work: Negotiating Boundaries through Everyday Life. Chicago: U. of Chicago P, 1996.Power, Michael. The Audit Society. Oxford: Oxford UP, 1997. Ross, Andrew. No Collar: The Humane Workplace and Its Hidden Costs. Philadelphia: Temple UP, 2004. Sharma, Sarah. “The Great American Staycation and the Risk of Stillness”. M/C Journal 12.1 (2009). 11 May 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/122›. Straw, Will. “Embedded Memories”. Residual Media Ed. Charles Acland. U. of Minnesota P., 2007. 3-15.Whyte, William. The Organisation Man. New York: Simon and Schuster, 1957. Wagman, Ira. “Log On, Goof Off, Look Up: Facebook and the Rhythms of Canadian Internet Use”. How Canadians Communicate III: Contexts for Popular Culture. Eds. Bart Beaty, Derek, Gloria Filax Briton, and Rebecca Sullivan. Athabasca: Athabasca UP 2009. 55-77. ‹http://www2.carleton.ca/jc/ccms/wp-content/ccms-files/02_Beaty_et_al-How_Canadians_Communicate.pdf›Yates, JoAnne. “Business Use of Information Technology during the Industrial Age”. A Nation Transformed by Information. Eds. Alfred D. Chandler & James W. Cortada. Oxford: Oxford UP., 2000. 107-36.
APA, Harvard, Vancouver, ISO, and other styles
34

Arnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no. 2 (May 3, 2010). http://dx.doi.org/10.5204/mcj.221.

Full text
Abstract:
Our thesis is that the city’s ambience is now an unstable dialectic in which we are watchers and watched, mirrored and refracted in a landscape of iPhone auteurs, eTags, CCTV and sousveillance. Embrace ambience! Invoking Benjamin’s spirit, this article does not seek to limit understanding through restriction to a particular theme or theoretical construct (Buck-Morss 253). Instead, it offers snapshots of interactions at the dawn of the postmodern city. That bricolage also engages how people appropriate, manipulate, disrupt and divert urban spaces and strategies of power in their everyday life. Ambient information can both liberate and disenfranchise the individual. This article asks whether our era’s dialectics result in a new personhood or merely restate the traditional spectacle of ‘bright lights, big city’. Does the virtualized city result in ambient anomie and satiation or in surprise, autonomy and serendipity? (Gumpert 36) Since the steam age, ambience has been characterised in terms of urban sound, particularly the alienation attributable to the individual’s experience as a passive receptor of a cacophony of sounds – now soft, now loud, random and recurrent–from the hubbub of crowds, the crash and grind of traffic, the noise of industrial processes and domestic activity, factory whistles, fire alarms, radio, television and gramophones (Merchant 111; Thompson 6). In the age of the internet, personal devices such as digital cameras and iPhones, and urban informatics such as CCTV networks and e-Tags, ambience is interactivity, monitoring and signalling across multiple media, rather than just sound. It is an interactivity in which watchers observe the watched observing them and the watched reshape the fabric of virtualized cities merely by traversing urban precincts (Hillier 295; De Certeau 163). It is also about pervasive although unevenly distributed monitoring of individuals, using sensors that are remote to the individual (for example cameras or tag-readers mounted above highways) or are borne by the individual (for example mobile phones or badges that systematically report the location to a parent, employer or sex offender register) (Holmes 176; Savitch 130). That monitoring reflects what Doel and Clark characterized as a pervasive sense of ambient fear in the postmodern city, albeit fear that like much contemporary anxiety is misplaced–you are more at risk from intimates than from strangers, from car accidents than terrorists or stalkers–and that is ahistorical (Doel 13; Scheingold 33). Finally, it is about cooption, with individuals signalling their identity through ambient advertising: wearing tshirts, sweatshirts, caps and other apparel that display iconic faces such as Obama and Monroe or that embody corporate imagery such as the Nike ‘Swoosh’, Coca-Cola ‘Ribbon’, Linux Penguin and Hello Kitty feline (Sayre 82; Maynard 97). In the postmodern global village much advertising is ambient, rather than merely delivered to a device or fixed on a billboard. Australian cities are now seas of information, phantasmagoric environments in which the ambient noise encountered by residents and visitors comprises corporate signage, intelligent traffic signs, displays at public transport nodes, shop-window video screens displaying us watching them, and a plethora of personal devices showing everything from the weather to snaps of people in the street or neighborhood satellite maps. They are environments through which people traverse both as persons and abstractions, virtual presences on volatile digital maps and in online social networks. Spectacle, Anomie or Personhood The spectacular city of modernity is a meme of communication, cultural and urban development theory. It is spectacular in the sense that of large, artificial, even sublime. It is also spectacular because it is built around the gaze, whether the vistas of Hausmann’s boulevards, the towers of Manhattan and Chicago, the shopfront ‘sea of light’ and advertising pillars noted by visitors to Weimar Berlin or the neon ‘neo-baroque’ of Las Vegas (Schivelbusch 114; Fritzsche 164; Ndalianis 535). In the year 2010 it aspires to 2020 vision, a panoptic and panspectric gaze on the part of governors and governed alike (Kullenberg 38). In contrast to the timelessness of Heidegger’s hut and the ‘fixity’ of rural backwaters, spectacular cities are volatile domains where all that is solid continues to melt into air with the aid of jackhammers and the latest ‘new media’ potentially result in a hypereality that make it difficult to determine what is real and what is not (Wark 22; Berman 19). The spectacular city embodies a dialectic. It is anomic because it induces an alienation in the spectator, a fatigue attributable to media satiation and to a sense of being a mere cog in a wheel, a disempowered and readily-replaceable entity that is denied personhood–recognition as an autonomous individual–through subjection to a Fordist and post-Fordist industrial discipline or the more insidious imprisonment of being ‘a housewife’, one ant in a very large ant hill (Dyer-Witheford 58). People, however, are not automatons: they experience media, modernity and urbanism in different ways. The same attributes that erode the selfhood of some people enhance the autonomy and personhood of others. The spectacular city, now a matrix of digits, information flows and opportunities, is a realm in which people can subvert expectations and find scope for self-fulfillment, whether by wearing a hoodie that defeats CCTV or by using digital technologies to find and associate with other members of stigmatized affinity groups. One person’s anomie is another’s opportunity. Ambience and Virtualisation Eighty years after Fritz Lang’s Metropolis forecast a cyber-sociality, digital technologies are resulting in a ‘virtualisation’ of social interactions and cities. In post-modern cityscapes, the space of flows comprises an increasing number of electronic exchanges through physically disjointed places (Castells 2002). Virtualisation involves supplementation or replacement of face-to-face contact with hypersocial communication via new media, including SMS, email, blogging and Facebook. In 2010 your friends (or your boss or a bully) may always be just a few keystrokes away, irrespective of whether it is raining outside, there is a public transport strike or the car is in for repairs (Hassan 69; Baron 215). Virtualisation also involves an abstraction of bodies and physical movements, with the information that represents individual identities or vehicles traversing the virtual spaces comprised of CCTV networks (where viewers never encounter the person or crowd face to face), rail ticketing systems and road management systems (x e-Tag passed by this tag reader, y camera logged a specific vehicle onto a database using automated number-plate recognition software) (Wood 93; Lyon 253). Surveillant Cities Pervasive anxiety is a permanent and recurrent feature of urban experience. Often navigated by an urgency to control perceived disorder, both physically and through cultivated dominant theory (early twentieth century gendered discourses to push women back into the private sphere; ethno-racial closure and control in the Black Metropolis of 1940s Chicago), history is punctuated by attempts to dissolve public debate and infringe minority freedoms (Wilson 1991). In the Post-modern city unprecedented technological capacity generates a totalizing media vector whose plausible by-product is the perception of an ambient menace (Wark 3). Concurrent faith in technology as a cost-effective mechanism for public management (policing, traffic, planning, revenue generation) has resulted in emergence of the surveillant city. It is both a social and architectural fabric whose infrastructure is dotted with sensors and whose people assume that they will be monitored by private/public sector entities and directed by interactive traffic management systems – from electronic speed signs and congestion indicators through to rail schedule displays –leveraging data collected through those sensors. The fabric embodies tensions between governance (at its crudest, enforcement of law by police and their surrogates in private security services) and the soft cage of digital governmentality, with people being disciplined through knowledge that they are being watched and that the observation may be shared with others in an official or non-official shaming (Parenti 51; Staples 41). Encounters with a railway station CCTV might thus result in exhibition of the individual in court or on broadcast television, whether in nightly news or in a ‘reality tv’ crime expose built around ‘most wanted’ footage (Jermyn 109). Misbehaviour by a partner might merely result in scrutiny of mobile phone bills or web browser histories (which illicit content has the partner consumed, which parts of cyberspace has been visited), followed by a visit to the family court. It might instead result in digital viligilantism, with private offences being named and shamed on electronic walls across the global village, such as Facebook. iPhone Auteurism Activists have responded to pervasive surveillance by turning the cameras on ‘the watchers’ in an exercise of ‘sousveillance’ (Bennett 13; Huey 158). That mirroring might involve the meticulous documentation, often using the same geospatial tools deployed by public/private security agents, of the location of closed circuit television cameras and other surveillance devices. One outcome is the production of maps identifying who is watching and where that watching is taking place. As a corollary, people with anxieties about being surveilled, with a taste for street theatre or a receptiveness to a new form of urban adventure have used those maps to traverse cities via routes along which they cannot be identified by cameras, tags and other tools of the panoptic sort, or to simply adopt masks at particular locations. In 2020 can anyone aspire to be a protagonist in V for Vendetta? (iSee) Mirroring might take more visceral forms, with protestors for example increasingly making a practice of capturing images of police and private security services dealing with marches, riots and pickets. The advent of 3G mobile phones with a still/video image capability and ongoing ‘dematerialisation’ of traditional video cameras (ie progressively cheaper, lighter, more robust, less visible) means that those engaged in political action can document interaction with authority. So can passers-by. That ambient imaging, turning the public gaze on power and thereby potentially redefining the ‘public’ (given that in Australia the community has been embodied by the state and discourse has been mediated by state-sanctioned media), poses challenges for media scholars and exponents of an invigorated civil society in which we are looking together – and looking at each other – rather than bowling alone. One challenge for consumers in construing ambient media is trust. Can we believe what we see, particularly when few audiences have forensic skills and intermediaries such as commercial broadcasters may privilege immediacy (the ‘breaking news’ snippet from participants) over context and verification. Social critics such as Baudelaire and Benjamin exalt the flaneur, the free spirit who gazed on the street, a street that was as much a spectacle as the theatre and as vibrant as the circus. In 2010 the same technologies that empower citizen journalism and foster a succession of velvet revolutions feed flaneurs whose streetwalking doesn’t extend beyond a keyboard and a modem. The US and UK have thus seen emergence of gawker services, with new media entrepreneurs attempting to build sustainable businesses by encouraging fans to report the location of celebrities (and ideally provide images of those encounters) for the delectation of people who are web surfing or receiving a tweet (Burns 24). In the age of ambient cameras, where the media are everywhere and nowhere (and micro-stock photoservices challenge agencies such as Magnum), everyone can join the paparazzi. Anyone can deploy that ambient surveillance to become a stalker. The enthusiasm with which fans publish sightings of celebrities will presumably facilitate attacks on bodies rather than images. Information may want to be free but so, inconveniently, do iconoclasts and practitioners of participatory panopticism (Dodge 431; Dennis 348). Rhetoric about ‘citizen journalism’ has been co-opted by ‘old media’, with national broadcasters and commercial enterprises soliciting still images and video from non-professionals, whether for free or on a commercial basis. It is a world where ‘journalists’ are everywhere and where responsibility resides uncertainly at the editorial desk, able to reject or accept offerings from people with cameras but without the industrial discipline formerly exercised through professional training and adherence to formal codes of practice. It is thus unsurprising that South Australia’s Government, echoed by some peers, has mooted anti-gawker legislation aimed at would-be auteurs who impede emergency services by stopping their cars to take photos of bushfires, road accidents or other disasters. The flipside of that iPhone auteurism is anxiety about the public gaze, expressed through moral panics regarding street photography and sexting. Apart from a handful of exceptions (notably photography in the Sydney Opera House precinct, in the immediate vicinity of defence facilities and in some national parks), Australian law does not prohibit ‘street photography’ which includes photographs or videos of streetscapes or public places. Despite periodic assertions that it is a criminal offence to take photographs of people–particularly minors–without permission from an official, parent/guardian or individual there is no general restriction on ambient photography in public spaces. Moral panics about photographs of children (or adults) on beaches or in the street reflect an ambient anxiety in which danger is associated with strangers and strangers are everywhere (Marr 7; Bauman 93). That conceptualisation is one that would delight people who are wholly innocent of Judith Butler or Andrea Dworkin, in which the gaze (ever pervasive, ever powerful) is tantamount to a violation. The reality is more prosaic: most child sex offences involve intimates, rather than the ‘monstrous other’ with the telephoto lens or collection of nastiness on his iPod (Cossins 435; Ingebretsen 190). Recognition of that reality is important in considering moves that would egregiously restrict legitimate photography in public spaces or happy snaps made by doting relatives. An ambient image–unposed, unpremeditated, uncoerced–of an intimate may empower both authors and subjects when little is solid and memory is fleeting. The same caution might usefully be applied in considering alarms about sexting, ie creation using mobile phones (and access by phone or computer monitor) of intimate images of teenagers by teenagers. Australian governments have moved to emulate their US peers, treating such photography as a criminal offence that can be conceptualized as child pornography and addressed through permanent inclusion in sex offender registers. Lifelong stigmatisation is inappropriate in dealing with naïve or brash 12 and 16 year olds who have been exchanging intimate images without an awareness of legal frameworks or an understanding of consequences (Shafron-Perez 432). Cameras may be everywhere among the e-generation but legal knowledge, like the future, is unevenly distributed. Digital Handcuffs Generations prior to 2008 lost themselves in the streets, gaining individuality or personhood by escaping the surveillance inherent in living at home, being observed by neighbours or simply surrounded by colleagues. Streets offered anonymity and autonomy (Simmel 1903), one reason why heterodox sexuality has traditionally been negotiated in parks and other beats and on kerbs where sex workers ply their trade (Dalton 375). Recent decades have seen a privatisation of those public spaces, with urban planning and digital technologies imposing a new governmentality on hitherto ambient ‘deviance’ and on voyeuristic-exhibitionist practice such as heterosexual ‘dogging’ (Bell 387). That governmentality has been enforced through mechanisms such as replacement of traditional public toilets with ‘pods’ that are conveniently maintained by global service providers such as Veolia (the unromantic but profitable rump of former media & sewers conglomerate Vivendi) and function as billboards for advertising groups such as JC Decaux. Faces encountered in the vicinity of the twenty-first century pissoir are thus likely to be those of supermodels selling yoghurt, low interest loans or sportsgear – the same faces sighted at other venues across the nation and across the globe. Visiting ‘the mens’ gives new meaning to the word ambience when you are more likely to encounter Louis Vuitton and a CCTV camera than George Michael. George’s face, or that of Madonna, Barack Obama, Kevin 07 or Homer Simpson, might instead be sighted on the tshirts or hoodies mentioned above. George’s music might also be borne on the bodies of people you see in the park, on the street, or in the bus. This is the age of ambient performance, taken out of concert halls and virtualised on iPods, Walkmen and other personal devices, music at the demand of the consumer rather than as rationed by concert managers (Bull 85). The cost of that ambience, liberation of performance from time and space constraints, may be a Weberian disenchantment (Steiner 434). Technology has also removed anonymity by offering digital handcuffs to employees, partners, friends and children. The same mobile phones used in the past to offer excuses or otherwise disguise the bearer’s movement may now be tied to an observer through location services that plot the person’s movement across Google Maps or the geospatial information of similar services. That tracking is an extension into the private realm of the identification we now take for granted when using taxis or logistics services, with corporate Australia for example investing in systems that allow accurate determination of where a shipment is located (on Sydney Harbour Bridge? the loading dock? accompanying the truck driver on unauthorized visits to the pub?) and a forecast of when it will arrive (Monmonier 76). Such technologies are being used on a smaller scale to enforce digital Fordism among the binary proletariat in corporate buildings and campuses, with ‘smart badges’ and biometric gateways logging an individual’s movement across institutional terrain (so many minutes in the conference room, so many minutes in the bathroom or lingering among the faux rainforest near the Vice Chancellery) (Bolt). Bright Lights, Blog City It is a truth universally acknowledged, at least by right-thinking Foucauldians, that modernity is a matter of coercion and anomie as all that is solid melts into air. If we are living in an age of hypersocialisation and hypercapitalism – movies and friends on tap, along with the panoptic sorting by marketers and pervasive scrutiny by both the ‘information state’ and public audiences (the million people or one person reading your blog) that is an inevitable accompaniment of the digital cornucopia–we might ask whether everyone is or should be unhappy. This article began by highlighting traditional responses to the bright lights, brashness and excitement of the big city. One conclusion might be that in 2010 not much has changed. Some people experience ambient information as liberating; others as threatening, productive of physical danger or of a more insidious anomie in which personal identity is blurred by an ineluctable electro-smog. There is disagreement about the professionalism (for which read ethics and inhibitions) of ‘citizen media’ and about a culture in which, as in the 1920s, audiences believe that they ‘own the image’ embodying the celebrity or public malefactor. Digital technologies allow you to navigate through the urban maze and allow officials, marketers or the hostile to track you. Those same technologies allow you to subvert both the governmentality and governance. You are free: Be ambient! References Baron, Naomi. Always On: Language in an Online and Mobile World. New York: Oxford UP, 2008. Bauman, Zygmunt. Liquid Modernity. Oxford: Polity Press, 2000. Bell, David. “Bodies, Technologies, Spaces: On ‘Dogging’.” Sexualities 9.4 (2006): 387-408. Bennett, Colin. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge: MIT Press, 2008. Berman, Marshall. All That Is Solid Melts into Air: The Experience of Modernity. London: Verso, 2001. Bolt, Nate. “The Binary Proletariat.” First Monday 5.5 (2000). 25 Feb 2010 ‹http://131.193.153.231/www/issues/issue5_5/bolt/index.html›. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge: MIT Press, 1991. Bull, Michael. Sounding Out the City: Personal Stereos and the Management of Everyday Life. Oxford: Berg, 2003. Bull, Michael. Sound Moves: iPod Culture and the Urban Experience. London: Routledge, 2008 Burns, Kelli. Celeb 2.0: How Social Media Foster Our Fascination with Popular Culture. Santa Barbara: ABC-CLIO, 2009. Castells, Manuel. “The Urban Ideology.” The Castells Reader on Cities and Social Theory. Ed. Ida Susser. Malden: Blackwell, 2002. 34-70. Cossins, Anne, Jane Goodman-Delahunty, and Kate O’Brien. “Uncertainty and Misconceptions about Child Sexual Abuse: Implications for the Criminal Justice System.” Psychiatry, Psychology and the Law 16.4 (2009): 435-452. Dalton, David. “Policing Outlawed Desire: ‘Homocriminality’ in Beat Spaces in Australia.” Law & Critique 18.3 (2007): 375-405. De Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California P, 1984. Dennis, Kingsley. “Keeping a Close Watch: The Rise of Self-Surveillance and the Threat of Digital Exposure.” The Sociological Review 56.3 (2008): 347-357. Dodge, Martin, and Rob Kitchin. “Outlines of a World Coming into Existence: Pervasive Computing and the Ethics of Forgetting.” Environment & Planning B: Planning & Design 34.3 (2007): 431-445. Doel, Marcus, and David Clarke. “Transpolitical Urbanism: Suburban Anomaly and Ambient Fear.” Space & Culture 1.2 (1998): 13-36. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. Champaign: U of Illinois P, 1999. Fritzsche, Peter. Reading Berlin 1900. Cambridge: Harvard UP, 1998. Gumpert, Gary, and Susan Drucker. “Privacy, Predictability or Serendipity and Digital Cities.” Digital Cities II: Computational and Sociological Approaches. Berlin: Springer, 2002. 26-40. Hassan, Robert. The Information Society. Cambridge: Polity Press, 2008. Hillier, Bill. “Cities as Movement Economies.” Intelligent Environments: Spatial Aspects of the Information Revolution. Ed. Peter Drioege. Amsterdam: Elsevier, 1997. 295-342. Holmes, David. “Cybercommuting on an Information Superhighway: The Case of Melbourne’s CityLink.” The Cybercities Reader. Ed. Stephen Graham. London: Routledge, 2004. 173-178. Huey, Laura, Kevin Walby, and Aaron Doyle. “Cop Watching in the Downtown Eastside: Exploring the Use of CounterSurveillance as a Tool of Resistance.” Surveillance and Security: Technological Politics and Power in Everyday Life. Ed. Torin Monahan. London: Routledge, 2006. 149-166. Ingebretsen, Edward. At Stake: Monsters and the Rhetoric of Fear in Public Culture. Chicago: U of Chicago P, 2001. iSee. “Now More Than Ever”. 20 Feb 2010 ‹http://www.appliedautonomy.com/isee/info.html›. Jackson, Margaret, and Julian Ligertwood. "Identity Management: Is an Identity Card the Solution for Australia?” Prometheus 24.4 (2006): 379-387. Jermyn, Deborah. Crime Watching: Investigating Real Crime TV. London: IB Tauris, 2007. Kullenberg, Christopher. “The Social Impact of IT: Surveillance and Resistance in Present-Day Conflicts.” FlfF-Kommunikation 1 (2009): 37-40. Lyon, David. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. London: Routledge, 2003. Marr, David. The Henson Case. Melbourne: Text, 2008. Maynard, Margaret. Dress and Globalisation. Manchester: Manchester UP, 2004. Merchant, Carolyn. The Columbia Guide to American Environmental History. New York: Columbia UP, 2002. Monmonier, Mark. “Geolocation and Locational Privacy: The ‘Inside’ Story on Geospatial Tracking’.” Privacy and Technologies of Identity: A Cross-disciplinary Conversation. Ed. Katherine Strandburg and Daniela Raicu. Berlin: Springer, 2006. 75-92. Ndalianis, Angela. “Architecture of the Senses: Neo-Baroque Entertainment Spectacles.” Rethinking Media Change: The Aesthetics of Tradition. Ed. David Thorburn and Henry Jenkins. Cambridge: MIT Press, 2004. 355-374. Parenti, Christian. The Soft Cage: Surveillance in America. New York: Basic Books, 2003. Sayre, Shay. “T-shirt Messages: Fortune or Folly for Advertisers.” Advertising and Popular Culture: Studies in Variety and Versatility. Ed. Sammy Danna. New York: Popular Press, 1992. 73-82. Savitch, Henry. Cities in a Time of Terror: Space, Territory and Local Resilience. Armonk: Sharpe, 2008. Scheingold, Stuart. The Politics of Street Crime: Criminal Process and Cultural Obsession. Philadephia: Temple UP, 1992. Schivelbusch, Wolfgang. Disenchanted Night: The Industrialization of Light in the Nineteenth Century. Berkeley: U of California Press, 1995. Shafron-Perez, Sharon. “Average Teenager or Sex Offender: Solutions to the Legal Dilemma Caused by Sexting.” John Marshall Journal of Computer & Information Law 26.3 (2009): 431-487. Simmel, Georg. “The Metropolis and Mental Life.” Individuality and Social Forms. Ed. Donald Levine. Chicago: University of Chicago P, 1971. Staples, William. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham: Rowman & Littlefield, 2000. Steiner, George. George Steiner: A Reader. New York: Oxford UP, 1987. Thompson, Emily. The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America. Cambridge: The MIT Press, 2004. Wark, Mackenzie. Virtual Geography: Living with Global Media Events. Bloomington: Indiana UP, 1994. Wilson, Elizabeth. The Sphinx in the City: Urban Life, the Control of Disorder and Women. Berkeley: University of California P, 1991. Wood, David. “Towards Spatial Protocol: The Topologies of the Pervasive Surveillance Society.” Augmenting Urban Spaces: Articulating the Physical and Electronic City. Eds. Allesandro Aurigi and Fiorella de Cindio. Aldershot: Ashgate, 2008. 93-106.
APA, Harvard, Vancouver, ISO, and other styles
35

Bowrey, Kathy, and Matthew Rimmer. "Rip, Mix, Burn: The politics of peer to peer and copyright law (originally published in August 2002)." First Monday, July 4, 2005. http://dx.doi.org/10.5210/fm.v0i0.1456.

Full text
Abstract:
This paper is included in the First Monday Special Issue: Music and the Internet, published in July 2005. Special Issue editor David Beer asked authors to submit additional comments regarding their articles. Since this paper was first published in 2002 there has been a constant stream of litigation surrounding P2P in the US and in other jurisdictions. In the United States, the District Court and the Court of Appeals controversially held that Grokster was not liable for contributory and vicarious copyright infringement. Justice Thomas of the Federal Circuit observed: "We live in a quicksilver technological environment with courts ill-suited to fix the flow of internet innovation." The United States Supreme Court is due to hear an appeal by copyright owners against the Grokster decision in 2005. In Australia, litigation was initiated against Sharman License Holdings, LEF Interactive and Brilliant Digital Entertainment, as the controllers of the peer to peer network Kazaa. Again, media owners have emphasized that the network is a pirate bazaar. Global legal forum shopping is one of the intriguing aspects of P2P. We see the arguments of both sides, originally developed specifically for US deliberation manifest across the globe. The Media naively ask whether there is any point in the Australian court considering these issues, given the litigation ongoing in the US. Here the US is seen as the world leader for legal ideas surrounding P2P, with the currency in ideas about technology, innovation and growing the global information economy clouding appreciation of national sovereignty and the distinctiveness of local jurisprudence. This context makes an appreciation of the cultural uniqueness of the US views all the more important. Rip, Mix, Burn: The Politics of Peer to Peer and Copyright Law by Kathy Bowrey and Matthew Rimmer Whereas Lessig's recent work engages with questions of culture and creativity in society, this paper looks at the role of culture and creativity in the law. The paper evaluates the Napster, DeCSS, Felten and Sklyarov litigation in terms of the new social, legal, economic and cultural relations being produced. This involves a deep discussion of law's economic relations, and the implications of this for litigation strategy. The paper concludes with a critique of recent attempts to define copyright law in terms of first amendment rights and communicative freedom.
APA, Harvard, Vancouver, ISO, and other styles
36

Harris, Alana. "Mobility, Modernity, and Abroad." M/C Journal 19, no. 5 (October 13, 2016). http://dx.doi.org/10.5204/mcj.1157.

Full text
Abstract:
IntroductionWhat does it mean to be abroad in the modern Australian context? Australia has developed as a country where people increasingly travel both domestically and abroad. Tourism Research Australia reports that 9.6 million resident departures are forecast for 2015-16 and that this will increase to 13.2 million in 2024–25 (Tourism Forecast). This article will identify the development of the Australian culture of travel abroad, the changes that have taken place in Australian society and the conceptual shift of what it means to travel abroad in modern Australia.The traditions of abroad stem from the seventeenth and eighteenth centuries Grand Tour notion where Europeans and Britons travelled on or to the continent to expand their knowledge and experience. While travel at this time focused on history, culture and science, it was very much the domain of the upper classes (Cooper). The concept of the tourist is often credited with Thomas Cook’s first package tour in 1841, which used railways to facilitate trips for pleasure (Cooper). Other advances at the time popularised the trip abroad. Steamships, expanded rail and road networks all contributed to an age of emerging mobility which saw the development of travel to a multi-dimensional experience open to a great many more people than ever before. This article explores three main waves of influence on the Australian concept of abroad and how each has shifted the experience and meaning of what it is to travel abroad.Australians Abroad The post-war period saw significant changes to Australian society, particularly advances in transport, which shaped the way Australians travelled in the 1950s and 1960s. On the domestic front, Australia began manufacturing Holden cars with Prime Minister Ben Chifley unveiling the first Holden “FX” on 29 November 1948. Such was its success that over 500,000 Holden cars were produced by the end of the next decade (Holden). Throughout the 1950s and 1960s the government established a program to standardise railway gauges around the country, making direct travel between Melbourne and Sydney possible for the first time. Australians became more mobile and their enthusiasm for interstate travel flowed on to international transport (Lee).Also, during the 1950s, Australia experienced an influx of migrants from Southern Europe, followed by the Assisted Passage Scheme to attract Britons in the late 1950s and through the 1960s (“The Changing Face of Modern Australia”). With large numbers of new Australians arriving in Australia by ship, these ships could be filled for their return journey to Britain and Europe with Australian tourists. Travel by ship, usually to the “mother country,” took up to two months time, and communication with those “back home” was limited. By the 1960s travelling by ship started to give way to travel by air. The 1950s saw Qantas operate Royal flights for Queen Elizabeth II and the Duke of Edinburgh for their Australian tour, and in 1956 the airline fleet of 34 propeller drive aircraft carried a record number of passengers to the Melbourne Olympics. On 14 January 1958 Qantas launched the first world service from Melbourne flying the Kangaroo Route (via India) and the Southern Cross Route (via the United States) and before long, there were eight such services operating weekly (Qantas). This developing network of international air services connected Australia to the world in a way it had not been previously (Lee).Such developments in Australian aviation were significant on two fronts. Firstly, air travel was a much faster, easier, and more glamorous means of travel (Bednarek) despite the cost, comfort, safety, and capacity issues. The increase in air travel resulted in a steady decline of international travel by boat. Secondly, air travel abroad offered Australians from all walks of life the opportunity to experience other cultures, ideas, fashions, and fads from abroad. These ideas were fed into a transforming Australian society more quickly than they had been in the past.Social change during the late 1950s and into the 1960s connected Australia more closely to the world. The Royal Tour attracted the attention of the British Empire, and the Melbourne Olympics drew international attention. It was the start of television in Australia (1956) which gave Australians connectivity in a way not experienced previously. Concurrent with these advances, Australian society enjoyed rising standards of living, increased incomes, a rise in private motorcar ownership, along with greater leisure time. Three weeks paid holiday was introduced in NSW in 1958 and long service leave soon followed (Piesse). The confluence of these factors resulted in increased domestic travel and arguably altered the allure of abroad. Australians had the resources to travel in a way that they had not before.The social desire for travel abroad extended to the policy level with the Australian government’s 1975 introduction of the Working Holiday Programme (WHP). With a particular focus on young people, its aim was to foster closer ties and cultural exchange between Australia and partner countries (Department of Immigration and Boarder Protection). With cost and time commitments lessened in the 1960s and bilateral arrangements for the WHP in the 1970s, travel abroad became much more widespread and, at least in part, reduced the tyranny of distance. It is against the backdrop of increasingly connected transport networks, modernised communication, and rapid social change that the foundation for a culture of mobility among Australians was further cemented.Social Interactions AbroadDistance significantly shapes the experience of abroad. Proximity has a long association with the volume and frequency of communication exchange. Libai et al. observed that the geographic, temporal, and social distance may be much more important than individual characteristics in communication exchange. Close proximity fosters interpersonal interaction where discussion of experiences can lead to decision-making and social arrangements whilst travelling. Social interaction abroad has been grounded in similarity, social niceties, a desire to belong to a social group of particular travellers, and the need for information (Harris and Prideaux). At the same time, these interactions also contribute to the individual’s abroad experience. White and White noted, “the role of social interaction in the active construction of self as tourist and the tourist experience draws attention to how tourists self-identify social worlds in which they participate while touring” (43). Similarly, Holloway observed of social interaction that it is “a process of meaning making where individuals and groups shape understandings and attitudes through shared talk within their own communities of critique” (237).The unique combination of social interaction and place forms the experiences one has abroad. Cresswell observed that the geographical location and travellers’ sense of place combine to produce a destination in the tourism context. It is against this backdrop of material and immaterial, mobile and immobile, fixed and fluid intersections where social relations between travellers take place. These points of social meeting, connectivity and interaction are linked by way of networks within the destination or during travel (Mavric and Urry) and contribute to its production of unique experiences abroad.Communicating Abroad Communication whilst abroad, has changed significantly since the turn of the century. The merging of the corporeal and technological domains during travel has impacted the entire experience of travel. Those who travelled to faraway lands by ship in the 1950s were limited to letter writing and the use of telegrams for urgent or special communication. In the space of less than 60 years, the communication landscape could not look more different.Mobile phones, tablets, and laptops are all carried alongside the passport as the necessities of travel. Further, Wi-Fi connectivity at airports, on transport, at accommodation and in public spaces allows the traveller to continue “living” at home—at least in the technological sense—whilst physically being abroad. This is not just true of Australians. Global Internet use has grown by 826.9% from 361 million users in 2000 to 3.3 billion users in 2015. In addition, there were 7.1 billion global SIM connections and 243 million machine-to-machine connections by the end of 2014 (GSMA Intelligence). The World Bank also reported a global growth in mobile telephone subscriptions, per 100 people, from 33.9 in 2005 to 96.3 in 2014. This also means that travellers can be socially present while physically away, which changes the way we see the world.This adoption of modern communication has changed the discourse of “abroad” in a number of ways. The 24-hour nature of the Internet allows constant connectivity. Channels that are always open means that information about a travel experience can be communicated as it is occurring. Real time communication means that ideas can be expressed synchronously on a one-to-one or one-to-many basis (Litvin et al.) through hits, clicks, messages, on-line ratings, comments and the like. Facebook, Snapchat, Instagram, WhatsApp, Viber, Twitter, TripAdvisor, blogs, e-mails and a growing number of channels allow for multifaceted, real time communication during travel.Tied to this, the content of communicating the travel experience has also diversified from the traditional written word. The adage that “a picture tells a thousand words” is poignantly relevant here. The imagery contributes to the message and brings with it a degree of tone and perspective and, at the same time, adds to the volume being communicated. Beyond the written word and connected with images, modern communication allows for maps and tracking during the trip. How a traveller might be feeling can be captured with emojis, what they think of an experience can be assessed and rated and, importantly, this can be “liked” or commented on from those “at home.”Technologically-enhanced communication has changed the traveller’s experience in terms of time, interaction with place, and with people. Prior to modern communication, the traveller would reflect and reconstruct travel tales to be recounted upon their return. Stories of adventure and travels could be malleable, tailored to audience, and embellished—an individual’s recount of their individual abroad experience. However, this has shifted so that the modern traveller can capture the aspects of the experience abroad on screen, upload, share and receive immediate feedback in real time, during travel. It raises the question of whether a traveller is actually experiencing or simply recording events. This could be seen as a need for validation from those at home during travel as each interaction and experience is recorded, shared and held up for scrutiny by others. It also raises the question of motivation. Is the traveller travelling for self or for others?With maps, photos and images at each point, comments back and forth, preferences, ratings, records of social interactions with newfound friends “friended” or “tagged” on Facebook, it could be argued that the travel is simply a chronological series of events influenced from afar; shaped by those who are geographically distanced.Liquid Modernity and Abroad Cresswell considered tourist places as systems of mobile and material objects, technologies, and social relations that are produced, imagined, recalled, and anticipated. Increasingly, developments in communication and closeness of electronic proximity have closed the gap of being away. There is now an unbroken link to home during travel abroad, as there is a constant and real time exchange of events and experiences, where those who are travelling and those who are at home are overlapping rather than discrete networks. Sociologists refer to this as “mobility” and it provides a paradigm that underpins the modern concept of abroad. Mobility thinking accepts the movement of individuals and the resulting dynamism of social groups and argues that actual, virtual, and imagined mobility is critical to all aspects of modern life. Premised on “liquid modernity,” it asserts that people, objects, images, and information are all moving and that there is an interdependence between these movements. The paradigm asserts a network approach of the mobile (travellers, stories, experiences) and the fixed (infrastructure, accommodation, devices). Furthermore, it asserts that there is not a single network but complex intersections of flow, moving at different speed, scale and viscosity (Sheller and Urry). This is a useful way of viewing the modern concept of abroad as it accepts a level of maintained connectivity during travel. The technological interconnectivity within these networks, along with the mobile and material objects, contributes to overlapping experiences of home and abroad.ConclusionFrom the Australian perspective, the development of a transport network, social change and the advent of technology have all impacted the experience abroad. What once was the realm of a select few and a trip to the mother country, has expanded to a “golden age” of glamour and excitement (Bednarek). Travel abroad has become part of the norm for individuals and for businesses in an increasingly global society.Over time, the experience of “abroad” has also changed. Travel and non-travel now overlap. The modern traveller can be both at home and abroad. Modernity and mobility have influenced the practice of the overseas where the traveller’s experience can be influenced by home and vice-versa simultaneously. Revisiting the modern version of the “grand tour” could mean standing in a crowded gallery space of The Louvre with a mobile phone recording and sharing the Mona Lisa experience with friends and family at home. It could mean exploring the finest detail and intricacies of the work from home using Google Art Project (Ambroise).While the lure of the unique and different provides an impetus for travel, it is undeniable that the meaning of abroad has changed. In some respects it could be argued that abroad is only physical distance. Conversely overseas travel has now melded into Australian social life in such a way that it cannot be easily unpicked from other aspects. The traditions that have seen Australians travel and experience abroad have, in any case, provided a tradition of travel which has impacted modern, social and cultural life and will continue to do so.ReferencesAustralian Government. Austrade. Tourism Forecasts 2016. Tourism Research Australia, Canberra. Forest ACT: Australian Government July 2016. Australian Government Department of Immigration and Border Protection. Working Holiday Maker Visa Programme Report. Forest, ACT: Australian Government. 30 June 2015. Australian Government. “The changing Face of Modern Australia – 1950s to 1970s.” Australian Stories, 25 Sep 2016 <http://www.australia.gov.au/about-australia/australian-story/changing-face-of-modern-australia-1950s-to-1970s>. Bednarek, Janet. "Longing for the ‘Holden Age’ of Air Travel? Be Careful What You Wish For." The Conversation 25 Nov. 2014.Cooper, Chris. Essentials of Tourism. Sydney: Pearson Higher Education, 2013.Cresswell, Tim. On the Move: Mobility in the Modern Western World. New York: Taylor & Francis, 2006.Dubois, Ambroise. Mona Lisa, XVI century, Château du Clos Lucé. 1 Oct. 2016 <http://www.google.com/culturalinstitute/beta/asset/mona-lisa-by-ambroise-dubois/fAEaTV3ZVjY_vw?hl=en>.GSMA Intelligence. The Mobile Economy 2015. London: GSMA (Groupe Spécial Mobile Association), 2015.Harris, Alana, and Bruce Prideaux. “The Potential for eWOM to Affect Consumer Behaviour in Tourism.” Handbook of Consumer Behaviour in Tourism. Melbourne: Routledge, in press.Holden. "Holden's Heritage & History with Australia.” Australia, n.d.Holloway, Donell, Lelia Green, and David Holloway. "The Intratourist Gaze: Grey Nomads and ‘Other Tourists’." Tourist Studies 11.3 (2011): 235-252.Lee, Robert. “Linking a Nation: Australia’s Transport and Communications 1788-1970.” Australian Heritage Council, 2003. 29 Sep. 2016 <https://www.environment.gov.au/heritage/ahc/publications/linking-a-nation/contents>.Libai, Barak, et al. "Customer-to-Customer Interactions: Broadening the Scope of Word of Mouth Research." Journal of Service Research 13.3 (2010): 267-282.Litvin, Stephen W., Ronald E. Goldsmith, and Bing Pan. "Electronic Word-of-Mouth in Hospitality and Tourism Management." Tourism Management 29.3 (2008): 458-468.Mavric, Misela, and John Urry. Tourism Studies and the New Mobilities Paradigm. London: Sage Publications, 2009.Piesse, R.D. “Travel & Tourism.” Year Book Australia. Australian Bureau of Statistics, 1966.Qantas. "Constellations." The Qantas Story. 1 Aug. 2016 <http://www.qantas.com/travel/airlines/history-constellations/global/enWeb>.Sheller, Mimi, and John Urry. "The New Mobilities Paradigm." Environment and Planning 38.2 (2006): 207-226.White, Naomi Rosh, and Peter B. White. "Travel as Interaction: Encountering Place and Others." Journal of Hospitality and Tourism Management 15.1 (2008): 42-48.
APA, Harvard, Vancouver, ISO, and other styles
37

Green, Lelia, and Carmen Guinery. "Harry Potter and the Fan Fiction Phenomenon." M/C Journal 7, no. 5 (November 1, 2004). http://dx.doi.org/10.5204/mcj.2442.

Full text
Abstract:
The Harry Potter (HP) Fan Fiction (FF) phenomenon offers an opportunity to explore the nature of fame and the work of fans (including the second author, a participant observer) in creating and circulating cultural products within fan communities. Matt Hills comments (xi) that “fandom is not simply a ‘thing’ that can be picked over analytically. It is also always performative; by which I mean that it is an identity which is (dis-)claimed, and which performs cultural work”. This paper explores the cultural work of fandom in relation to FF and fame. The global HP phenomenon – in which FF lists are a small part – has made creator J K Rowling richer than the Queen of England, according to the 2003 ‘Sunday Times Rich List’. The books (five so far) and the films (three) continue to accelerate the growth in Rowling’s fortune, which quadrupled from 2001-3: an incredible success for an author unknown before the publication of Harry Potter and the Philosopher’s Stone in 1997. Even the on-screen HP lead actor, Daniel Radcliffe, is now Britain’s second wealthiest teenager (after England’s Prince Harry). There are other globally successful books, such as the Lord of the Rings trilogy, and the Narnia collection, but neither of these series has experienced the momentum of the HP rise to fame. (See Endnote for an indication of the scale of fan involvement with HP FF, compared with Lord of the Rings.) Contemporary ‘Fame’ has been critically defined in relation to the western mass media’s requirement for ‘entertaining’ content, and the production and circulation of celebrity as opposed to ‘hard news’(Turner, Bonner and Marshall). The current perception is that an army of publicists and spin doctors are usually necessary, but not sufficient, to create and nurture global fame. Yet the HP phenomenon started out with no greater publicity investment than that garnered by any other promising first novelist: and given the status of HP as children’s publishing, it was probably less hyped than equivalent adult-audience publications. So are there particular characteristics of HP and his creator that predisposed the series and its author to become famous? And how does the fame status relate to fans’ incorporation of these cultural materials into their lives? Accepting that it is no more possible to predict the future fame of an author or (fictional) character than it is to predict the future financial success of a book, film or album, there is a range of features of the HP phenomenon that, in hindsight, helped accelerate the fame momentum, creating what has become in hindsight an unparalleled global media property. J K Rowling’s personal story – in the hands of her publicity machine – itself constituted a magical myth: the struggling single mother writing away (in longhand) in a Scottish café, snatching odd moments to construct the first book while her infant daughter slept. (Comparatively little attention was paid by the marketers to the author’s professional training and status as a teacher, or to Rowling’s own admission that the first book, and the outline for the series, took five years to write.) Rowling’s name itself, with no self-evident gender attribution, was also indicative of ambiguity and mystery. The back-story to HP, therefore, became one of a quintessentially romantic endeavour – the struggle to write against the odds. Publicity relating to the ‘starving in a garret’ background is not sufficient to explain the HP/Rowling grip on the popular imagination, however. Instead it is arguable that the growth of HP fame and fandom is directly related to the growth of the Internet and to the middle class readers’ Internet access. If the production of celebrity is a major project of the conventional mass media, the HP phenomenon is a harbinger of the hyper-fame that can be generated through the combined efforts of the mass media and online fan communities. The implication of this – evident in new online viral marketing techniques (Kirby), is that publicists need to pique cyber-interest as well as work with the mass media in the construction of celebrity. As the cheer-leaders for online viral marketing make the argument, the technique “provides the missing link between the [bottom-up] word-of-mouth approach and the top-down, advertainment approach”. Which is not to say that the initial HP success was a function of online viral marketing: rather, the marketers learned their trade by analysing the magnifier impact that the online fan communities had upon the exponential growth of the HP phenomenon. This cyber-impact is based both on enhanced connectivity – the bottom-up, word-of-mouth dynamic, and on the individual’s need to assume an identity (albeit fluid) to participate effectively in online community. Critiquing the notion that the computer is an identity machine, Streeter focuses upon (649) “identities that people have brought to computers from the culture at large”. He does not deal in any depth with FF, but suggests (651) that “what the Internet is and will come to be, then, is partly a matter of who we expect to be when we sit down to use it”. What happens when fans sit down to use the Internet, and is there a particular reason why the Internet should be of importance to the rise and rise of HP fame? From the point of view of one of us, HP was born at more or less the same time as she was. Eleven years old in the first book, published in 1997, Potter’s putative birth year might be set in 1986 – in line with many of the original HP readership, and the publisher’s target market. At the point that this cohort was first spellbound by Potter, 1998-9, they were also on the brink of discovering the Internet. In Australia and many western nations, over half of (two-parent) families with school-aged children were online by the end of 2000 (ABS). Potter would notionally have been 14: his fans a little younger but well primed for the ‘teeny-bopper’ years. Arguably, the only thing more famous than HP for that age-group, at that time, was the Internet itself. As knowledge of the Internet grew stories about it constituted both news and entertainment and circulated widely in the mass media: the uncertainty concerning new media, and their impact upon existing social structures, has – over time – precipitated a succession of moral panics … Established commercial media are not noted for their generosity to competitors, and it is unsurprising that many of the moral panics circulating about pornography on the Net, Internet stalking, Web addiction, hate sites etc are promulgated in the older media. (Green xxvii) Although the mass media may have successfully scared the impressionable, the Internet was not solely constructed as a site of moral panic. Prior to the general pervasiveness of the Internet in domestic space, P. David Marshall discusses multiple constructions of the computer – seen by parents as an educational tool which could help future-proof their children; but which their children were more like to conceptualise as a games machine, or (this was the greater fear) use for hacking. As the computer was to become a site for the battle ground between education, entertainment and power, so too the Internet was poised to be colonised by teenagers for a variety of purposes their parents would have preferred to prevent: chat, pornography, game-playing (among others). Fan communities thrive on the power of the individual fan to project themselves and their fan identity as part of an ongoing conversation. Further, in constructing the reasons behind what has happened in the HP narrative, and in speculating what is to come, fans are presenting themselves as identities with whom others might agree (positive affirmation) or disagree (offering the chance for engagement through exchange). The genuinely insightful fans, who apparently predict the plots before they’re published, may even be credited in their communities with inspiring J K Rowling’s muse. (The FF mythology is that J K Rowling dare not look at the FF sites in case she finds herself influenced.) Nancy Baym, commenting on a soap opera fan Usenet group (Usenet was an early 1990s precursor to discussion groups) notes that: The viewers’ relationship with characters, the viewers’ understanding of socioemotional experience, and soap opera’s narrative structure, in which moments of maximal suspense are always followed by temporal gaps, work together to ensure that fans will use the gaps during and between shows to discuss with one another possible outcomes and possible interpretations of what has been seen. (143) In HP terms the The Philosopher’s Stone constructed a fan knowledge that J K Rowling’s project entailed at least seven books (one for each year at Hogwarts School) and this offered plentiful opportunities to speculate upon the future direction and evolution of the HP characters. With each speculation, each posting, the individual fan can refine and extend their identity as a member of the FF community. The temporal gaps between the books and the films – coupled with the expanding possibilities of Internet communication – mean that fans can feel both creative and connected while circulating the cultural materials derived from their engagement with the HP ‘canon’. Canon is used to describe the HP oeuvre as approved by Rowling, her publishers, and her copyright assignees (for example, Warner Bros). In contrast, ‘fanon’ is the name used by fans to refer the body of work that results from their creative/subversive interactions with the core texts, such as “slash” (homo-erotic/romance) fiction. Differentiation between the two terms acknowledges the likelihood that J K Rowling or her assignees might not approve of fanon. The constructed identities of fans who deal solely with canon differ significantly from those who are engaged in fanon. The implicit (romantic) or explicit (full-action descriptions) sexualisation of HP FF is part of a complex identity play on behalf of both the writers and readers of FF. Further, given that the online communities are often nurtured and enriched by offline face to face exchanges with other participants, what an individual is prepared to read or not to read, or write or not write, says as much about that person’s public persona as does another’s overt consumption of pornography; or diet of art house films, in contrast to someone else’s enthusiasm for Friends. Hearn, Mandeville and Anthony argue that a “central assertion of postmodern views of consumption is that social identity can be interpreted as a function of consumption” (106), and few would disagree with them: herein lies the power of the brand. Noting that consumer culture centrally focuses upon harnessing ‘the desire to desire’, Streeter’s work (654, on the opening up of Internet connectivity) suggests a continuum from ‘desire provoked’; through anticipation, ‘excitement based on what people imagined would happen’; to a sense of ‘possibility’. All this was made more tantalising in terms of the ‘unpredictability’ of how cyberspace would eventually resolve itself (657). Thus a progression is posited from desire through to the thrill of comparing future possibilities with eventual outcomes. These forces clearly influence the HP FF phenomenon, where a section of HP fans have become impatient with the pace of the ‘official’/canon HP text. J K Rowling’s writing has slowed down to the point that Harry’s initial readership has overtaken him by several years. He’s about to enter his sixth year (of seven) at secondary school – his erstwhile-contemporaries have already left school or are about to graduate to University. HP is yet to have ‘a relationship’: his fans are engaged in some well-informed speculation as to a range of sexual possibilities which would likely take J K Rowling some light years from her marketers’ core readership. So the story is progressing more slowly than many fans would choose and with less spice than many would like (from the evidence of the web, at least). As indicated in the Endnote, the productivity of the fans, as they ‘fill in the gaps’ while waiting for the official narrative to resume, is prodigious. It may be that as the fans outstrip HP in their own social and emotional development they find his reactions in later books increasingly unbelievable, and/or out of character with the HP they felt they knew. Thus they develop an alternative ‘Harry’ in fanon. Some FF authors identify in advance which books they accept as canon, and which they have decided to ignore. For example, popular FF author Midnight Blue gives the setting of her evolving FF The Mirror of Maybe as “after Harry Potter and the Goblet of Fire and as an alternative to the events detailed in Harry Potter and the Order of the Phoenix, [this] is a Slash story involving Harry Potter and Severus Snape”. Some fans, tired of waiting for Rowling to get Harry grown up, ‘are doin’ it for themselves’. Alternatively, it may be that as they get older the first groups of HP fans are unwilling to relinquish their investment in the HP phenomenon, but are equally unwilling to align themselves uncritically with the anodyne story of the canon. Harry Potter, as Warner Bros licensed him, may be OK for pre-teens, but less cool for the older adolescent. The range of identities that can be constructed using the many online HP FF genres, however, permits wide scope for FF members to identify with dissident constructions of the HP narrative and helps to add to the momentum with which his fame increases. Latterly there is evidence that custodians of canon may be making subtle overtures to creators of fanon. Here, the viral marketers have a particular challenge – to embrace the huge market represented by fanon, while not disturbing those whose HP fandom is based upon the purity of canon. Some elements of fanon feel their discourses have been recognised within the evolving approved narrative . This sense within the fan community – that the holders of the canon have complimented them through an intertextual reference – is much prized and builds the momentum of the fame engagement (as has been demonstrated by Watson, with respect to the band ‘phish’). Specifically, Harry/Draco slash fans have delighted in the hint of a blown kiss from Draco Malfoy to Harry (as Draco sends Harry an origami bird/graffiti message in a Defence against the Dark Arts Class in Harry Potter and the Prisoner of Azkaban) as an acknowledgement of their cultural contribution to the development of the HP phenomenon. Streeter credits Raymond’s essay ‘The Cathedral and the Bazaar’ as offering a model for the incorporation of voluntary labour into the marketplace. Although Streeter’s example concerns the Open Source movement, derived from hacker culture, it has parallels with the prodigious creativity (and productivity) of the HP FF communities. Discussing the decision by Netscape to throw open the source code of its software in 1998, allowing those who use it to modify and improve it, Streeter comments that (659) “the core trope is to portray Linux-style software development like a bazaar, a real-life competitive marketplace”. The bazaar features a world of competing, yet complementary, small traders each displaying their skills and their wares for evaluation in terms of the product on offer. In contrast, “Microsoft-style software production is portrayed as hierarchical and centralised – and thus inefficient – like a cathedral”. Raymond identifies “ego satisfaction and reputation among other [peers]” as a specific socio-emotional benefit for volunteer participants (in Open Source development), going on to note: “Voluntary cultures that work this way are not actually uncommon [… for example] science fiction fandom, which unlike hackerdom has long explicitly recognized ‘egoboo’ (ego-boosting, or the enhancement of one’s reputation among other fans) as the basic drive behind volunteer activity”. This may also be a prime mover for FF engagement. Where fans have outgrown the anodyne canon they get added value through using the raw materials of the HP stories to construct fanon: establishing and building individual identities and communities through HP consumption practices in parallel with, but different from, those deemed acceptable for younger, more innocent, fans. The fame implicit in HP fandom is not only that of HP, the HP lead actor Daniel Radcliffe and HP’s creator J K Rowling; for some fans the famed ‘state or quality of being widely honoured and acclaimed’ can be realised through their participation in online fan culture – fans become famous and recognised within their own community for the quality of their work and the generosity of their sharing with others. The cultural capital circulated on the FF sites is both canon and fanon, a matter of some anxiety for the corporations that typically buy into and foster these mega-media products. As Jim Ward, Vice-President of Marketing for Lucasfilm comments about Star Wars fans (cited in Murray 11): “We love our fans. We want them to have fun. But if in fact someone is using our characters to create a story unto itself, that’s not in the spirit of what we think fandom is about. Fandom is about celebrating the story the way it is.” Slash fans would beg to differ, and for many FF readers and writers, the joy of engagement, and a significant engine for the growth of HP fame, is partly located in the creativity offered for readers and writers to fill in the gaps. Endnote HP FF ranges from posts on general FF sites (such as fanfiction.net >> books, where HP has 147,067 stories [on 4,490 pages of hotlinks] posted, compared with its nearest ‘rival’ Lord of the rings: with 33,189 FF stories). General FF sites exclude adult content, much of which is corralled into 18+ FF sites, such as Restrictedsection.org, set up when core material was expelled from general sites. As an example of one adult site, the Potter Slash Archive is selective (unlike fanfiction.net, for example) which means that only stories liked by the site team are displayed. Authors submitting work are asked to abide by a list of ‘compulsory parameters’, but ‘warnings’ fall under the category of ‘optional parameters’: “Please put a warning if your story contains content that may be offensive to some authors [sic], such as m/m sex, graphic sex or violence, violent sex, character death, major angst, BDSM, non-con (rape) etc”. Adult-content FF readers/writers embrace a range of unexpected genres – such as Twincest (incest within either of the two sets of twin characters in HP) and Weasleycest (incest within the Weasley clan) – in addition to mainstream romance/homo-erotica pairings, such as that between Harry Potter and Draco Malfoy. (NB: within the time frame 16 August – 4 October, Harry Potter FF writers had posted an additional 9,196 stories on the fanfiction.net site alone.) References ABS. 8147.0 Use of the Internet by Householders, Australia. http://www.abs.gov.au/ausstats/abs@.nsf/ e8ae5488b598839cca25682000131612/ ae8e67619446db22ca2568a9001393f8!OpenDocument, 2001, 2001>. Baym, Nancy. “The Emergence of Community in Computer-Mediated Communication.” CyberSociety: Computer-Mediated Communication and Community. Ed. S. Jones. Thousand Oaks, CA: Sage, 1995. 138-63. Blue, Midnight. “The Mirror of Maybe.” http://www.greyblue.net/MidnightBlue/Mirror/default.htm>. Coates, Laura. “Muggle Kids Battle for Domain Name Rights. Irish Computer. http://www.irishcomputer.com/domaingame2.html>. Fanfiction.net. “Category: Books” http://www.fanfiction.net/cat/202/>. Green, Lelia. Technoculture: From Alphabet to Cybersex. Sydney: Allen & Unwin. Hearn, Greg, Tom Mandeville and David Anthony. The Communication Superhighway: Social and Economic Change in the Digital Age. Sydney: Allen & Unwin, 1997. Hills, Matt. Fan Cultures. London: Routledge, 2002. Houghton Mifflin. “Potlatch.” Encyclopedia of North American Indians. http://college.hmco.com/history/readerscomp/naind/html/ na_030900_potlatch.htm>. Kirby, Justin. “Brand Papers: Getting the Bug.” Brand Strategy July-August 2004. http://www.dmc.co.uk/pdf/BrandStrategy07-0804.pdf>. Marshall, P. David. “Technophobia: Video Games, Computer Hacks and Cybernetics.” Media International Australia 85 (Nov. 1997): 70-8. Murray, Simone. “Celebrating the Story the Way It Is: Cultural Studies, Corporate Media and the Contested Utility of Fandom.” Continuum 18.1 (2004): 7-25. Raymond, Eric S. The Cathedral and the Bazaar. 2000. http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/ar01s11.html>. Streeter, Thomas. The Romantic Self and the Politics of Internet Commercialization. Cultural Studies 17.5 (2003): 648-68. Turner, Graeme, Frances Bonner, and P. David Marshall. Fame Games: The Production of Celebrity in Australia. Melbourne: Cambridge UP. Watson, Nessim. “Why We Argue about Virtual Community: A Case Study of the Phish.net Fan Community.” Virtual Culture: Identity and Communication in Cybersociety. Ed. Steven G. Jones. London: Sage, 1997. 102-32. Citation reference for this article MLA Style Green, Lelia, and Carmen Guinery. "Harry Potter and the Fan Fiction Phenomenon." M/C Journal 7.5 (2004). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0411/14-green.php>. APA Style Green, L., and C. Guinery. (Nov. 2004) "Harry Potter and the Fan Fiction Phenomenon," M/C Journal, 7(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0411/14-green.php>.
APA, Harvard, Vancouver, ISO, and other styles
38

Holloway, Donell Joy, and David Anthony Holloway. "Everyday Life in the "Tourist Zone"." M/C Journal 14, no. 5 (October 18, 2011). http://dx.doi.org/10.5204/mcj.412.

Full text
Abstract:
This article makes a case for the everyday while on tour and argues that the ability to continue with everyday routines and social relationships, while at the same time moving through and staying in liminal or atypical zones of tourist locales, is a key part of some kinds of tourist experience. Based on ethnographic field research with grey nomads (retirees who take extended tours of Australia in caravans and motorhomes) everyday life while on tour is examined, specifically the overlap and intersection between the out-of-the-ordinary “tourist zone” and the ordinariness of the “everyday zone.” The “everyday zone” and “tourist zone” can be readily differentiated by their obvious geospatial boundaries (being at home or being away on holiday). More specifically, the “everyday zone” refers to the routines of quotidian life, or the mundane practices which make up our daily, at-home lives. These practices are closely connected with the domestic realm and include consumption practices (clothing, cooking, mass media) and everyday social interactions. The “tourist zone” is similarly concerned with consumption. In this zone, however, tourists are seen to consume places; the culture, landscape, and peoples of exotic or out-of-the-ordinary tourist locales. Needless to say this consumption of place also includes the consumption of services and objects available in the tourist destinations (Urry, “The Consuming of Place” 220). The notion of tourists being away from home has often been contrasted with constructions of home—with the dull routines of everyday life—by social scientists and tourist marketers alike in an effort to illuminate the difference between being “away” and being at “home.” Scott McCabe and Elizabeth Stokoe suggest that peoples’ notion of “home” takes into account the meaning of being away (602). That is to say that when people are away from home, as tourists for example, they often compare and contrast this with the fundamental aspects of living at home. Others, however, argue that with the widespread use of mobile communication technologies, the distinction between the notion of being at “home” and being “away” becomes less clear (White and White 91). In this sense, the notion of home or the everyday is viewed with an eye towards social relationships, rather than any specific geographical location (Jamal and Hill 77–107; Massey 59–69; Urry, “The Tourist Gaze” 2–14; White and White 88–104). It can be argued, therefore, that tourism entails a fusion of the routines and relationships associated with the everyday, as well as the liminal or atypical world of difference. This article is based on semi-structured interviews with 40 grey nomads, as well as four months of ethnographic fieldwork carried out in rural and remote Australia—in Western Australia, the Northern Territory, and South Australia. Grey nomads have been part of Australian senior culture for at least four decades. They are a relatively heterogeneous group of tourists encompassing a range of socio-economic backgrounds, preferred activities, health status, and favoured destinations (Davies et al. 40–1; Economic Development Committee 4; Holloway 117–47), as well age cohorts—including the frugal generation (1910–1932), the silent generation (1931–1946), and the baby boomer generation (1946–65). Grey nomads usually tour as spousal couples (Tourism Research Australia 26; Onyx and Leonard 387). Some of these couples live solely on government pensions while others are obviously well-resourced—touring in luxury motorhomes costing well over half a million dollars. Some prefer to bush camp in national parks and other isolated locations, and some choose to stay long term in caravan parks socialising with other grey nomads and the local community. All grey nomads, nonetheless, maintain a particularly close link with the everyday while touring. Mobile communication technologies anchor grey nomads (and other tourists) to the everyday—allowing for ready contact with existing family and friends while on tour. Grey nomads’ mobile dwellings, their caravans and motorhomes, integrate familiar domestic spaces with a touring life. The interior and exterior spaces of these mobile dwellings allow for easy enactment of everyday, domestic routines and the privatised world of adult spousal relationships. This peripatetic form of dwelling, where the dwelling itself accommodates both travel and an everyday domestic life further blurs the distinctions between the “everyday zone” and the “tourist zone”. In this sense grey nomads carry out a lifestyle that is both anchored and mobile; anchored in the everyday domestic life while at the same time being nomadic or geographically unstable. This blurring of the boundaries between the “everyday zone” and “tourist zone” is attractive to senior tourists, offering them a relatively safe and comfortable incursion into tourist locales, where established routines and patterns of everyday life can be maintained. Other homes-away-from-homes such as serviced apartments, holiday homes and house swaps also offer greater connection to the everyday, but are geographically anchored to specific tourism spaces. The caravan or motorhome allows this at-home connection for the peripatetic tourist offsets the relative rigours of outback touring in remote and rural Australia. Everyday Social Relationships in the “Tourist Zone” When tourists go away from home, they are usually thought of as being away from both place (home) and relationships (family and friends). Nowadays, however, being away from home does not necessarily mean being away from family and friends. This is because the ease and speed of today’s telecommunication technologies allows for instantaneous contact with family and friends back home—or the virtual co-presence of family and friends while being away on tour. In the past, those friends and relations who were geographically isolated from each other still enjoyed social contact via letters and telegrams. Such contacts, however, occurred less frequently and message delivery took time. Long distance telephone calls were also costly and therefore used sparingly. These days, telecommunication technologies such as mobile phones and the Internet, as well as the lower cost of landline phone calls, mean that everyday social contact does not need to be put on hold. Keeping in contact is now a comparatively fast, inexpensive, and effortless activity and socialising with distant friends and relatives is now a routine activity (Larsen 24). All grey nomads travel with a mobile phone device, either a digital mobile, Next G or satellite phone (Obst, Brayley and King 8). These phones are used to routinely keep in contact with family and friends, bringing with them everyday familial relationships while on tour. “We ring the girls. We’ve got two daughters. We ring them once a week, although if something happens Debbie [daughter] will ring us” (Teresa). Grey nomads also take advantage of special deals or free minutes when they scheduled weekly calls to family or friends. “I mainly [use] mobile, then I ring, because I’ve got that hour, free hour” (Helen). E-mail is also a favoured way of keeping in contact with family and friends for some grey nomads. This is because the asynchronicity of e-mail interaction is very convenient as they can choose the times when they pick up and send messages. “Oh, thank goodness for the e-mail” (Pat). Maintaining social contact with family and friends at a distance is not necessarily as straightforward as when grey nomads and other tourists are at home. According to discussants in this study and the Regional Telecommunications Independent Review Committee, mobile phone coverage within Australia is still rather patchy when outside major metropolitan areas. Consequently, the everyday task of kin keeping via the phone can be somewhat intermittent, especially for those grey nomads who spend a great deal of time outside major towns in rural and remote Australia. “You can never get much [reception] but [...] they can just ring the mobile and just leave a message and we will get that message [later]” (Rena). Similarly, using the Internet to e-mail family and friends and catch up with online banking can only be carried out when passing through larger towns. “I do it [using the Internet] like every major town we went through. I’d stop and do a set of e-mails and I used to do my banking” (Maureen). The intermittent phone coverage in remote and rural Australia was not always viewed as an inconvenience by discussants in this study. This is because continuing engagement with family and friends while on tour may leave little respite from the ongoing obligations or any difficulties associated with family and friends back home, and encroach on the leisure and relaxation associated with grey nomad touring. “I don’t want the phone to ring […] That’s one thing I can do without, the phone ringing, especially at 4:00 in the morning” (Rena). In this way, too much co-presence, in the form of mobile phone calls from family and friends, can be just as much a nuisance when away from home as when at home—and impinge on the feeling of “being away from it all.” Naomi White and Peter White also suggest that “being simultaneously home and away is not always experienced in a positive light” (98) and at times, continued contact (via the phone) with friends and family while touring is not satisfying or enjoyable because these calls reiterate the “dynamics evident in those that are [usually] geographically proximate” (100). Thus, while mobile communication technologies are convenient tools for grey nomads and other tourists which blur the boundaries between the “everyday zone” and “tourist zones” in useful and pleasurable ways, their overuse may also encroach on tourists’ away time, thus interfering with their sense of solitude and quiescence when touring in remote or rural Australia. The “Everyday Zone” of the Caravan or Motorhome Being a tourist involves “everyday practices, ordinary places and significant others, such as family members and friends, but co-residing and at-a-distance” (Larsen 26). While tourism involves some sense of liminality, in reality, it is interspersed with the actuality of the everyday routines and sociabilities enacted while touring. Tim Edensor notes that; Rather than transcending the mundane, most forms of tourism are fashioned by culturally coded escape attempts. Moreover, although suffused with notions of escape from normativity, tourists carry quotidian habits and responses with them: they are part of the baggage. (61) Grey nomads go further than this by bringing on tour with them a domestic space in which everyday routines and sociabilities are sustained. Travelling in this manner “makes possible, and probably encourages, greater continuity with everyday routine than many other kinds of holiday making” (Southerton et al. 6). To be able to sleep in your own bed with your own pillow and linen, or perhaps travel with your dogs, makes caravanning and motorhoming an attractive touring option for many people. Thus, the use of caravans or motorhomes when travelling brings with it a great deal of mobile domesticity while on tour. The caravan or motorhome is furnished with most of the essentially-domestic objects and technologies to enable grey nomads to sleep, eat, relax, and be entertained in a manner similar to that which they enjoy in the family home, albeit within smaller dimensions. Lorna: We have shower, toilet. We had microwave, stereo. We have air conditioning and heating.Eric: Yeah, reverse cycle air conditioning.Lorna: Reverse cycle. What else do we have?Eric: Hot water service. Gas or 240 volt. 12 volt converter in that, which is real good, it runs your lights, runs everything like that. You just hook it into the main power and it converts it to 12 volt. Roll out awning plus the full annex.Lorna: Full annex. What else do we have? There’s a good size stove in it. The size of caravans and motorhomes means that many domestic tasks often take less time or are simplified. Cleaning the van takes a lot less time and cooking often becomes simplified, due to lack of bench and storage space. Women in particular like this aspect of grey nomad travel. “It is great. Absolutely. You don’t have toilets to clean, you don’t have bathrooms to clean. Cooking your meals are easier because everything is all […] Yeah. It’s more casual” (Sonya). This touring lifestyle also introduces new domestic routines, such as emptying chemical toilets, filling water tanks, towing and parking the van and refilling gas tanks, for example. Nonetheless grey nomads, spend significantly less time on these domestic tasks when they are touring. In this sense, the caravan or motorhome brings with it the comforts and familiarity of home, while at the same time minimising the routine chores involved in domestic life. With the core accoutrements of everyday life available, everyday activities such as doing the dishes, watching television, preparing and eating a meal—as well as individual hobbies and pastimes—weave themselves into a daily life that is simultaneously home and away. This daily life, at home in the caravan or motorhome, brings with it possibilities of a domestic routinised lifestyle—one that provides welcome comfort and familiarity when travelling and a retreat from the demands of sightseeing. On the farm I used to make jam and cakes, so I do it again [in the caravan]. I make jam, I made marmalade a couple of weeks ago. We’d often stay home [in the caravan], I’d just clean or do a bit of painting. (Jenny) Touring in a caravan or motorhome allows for some sense of predictability: that you own and control the private spaces of your own mobile dwelling, and can readily carry out everyday domestic routines and sociabilities. “We go for a long walk. We come back and we see friends and we stop and have a coffee with them, and then you come home in the caravan at 2.30 and you can still have lunch” (Yvonne). Touring in a caravan or motorhome also frees grey nomads from dependence on prearranged tourist experiences such as organised tours or hotel meal times where much of the tourist experience can be regimented. We always went in hotels and you always had to dress up, and you had to eat before a certain time, and you had your breakfast before a certain time. And after 2.30 you can’t have lunch anymore and sometimes we have lunch at 2 o’clock. I like the caravan park [better]. (Donald) Despite the caravan or motorhome having close links with everyday life and the domestic realm, its ready mobility offers a greater sense of autonomy while touring: that you are unfettered, not bound to any specific place or timetable, and can move on at whim. Grey nomads often cross paths with other tourists dependent on guided bus tours. “They go in [to Kakadu] on a bus trip. All they do is go in on the main road, they’re in there for the day and there’re back. That’s absolutely ridiculous” (Vance). This autonomy, or freedom to structure their own tourist experiences, allows grey nomads the opportunity to travel at a leisurely pace. Even those grey nomads who travel to the same northern destination every year take their time and enjoy other tourist locations along the way. We take our time. This time, last time, we did three weeks before we got in [to] Broome. We spent a lot [of time] in Karratha but also in Geraldton. And when we came back, in Kalbarri, [we had] a week in Kalbarri. But it’s nice going up, you know. You go all through the coast, along the coast. (John) Caravan or motorhome use, therefore, provides for a routinised everyday life while at the same time allowing a level of autonomy not evident in other forms of tourism—which rely more heavily on pre-booking accommodation and transport options. These contradictory aspects of grey nomad travel, an everyday life of living in a caravan or motorhome coupled with freedom to move on in an independent manner, melds the “everyday zone” and the “tourist zone” in a manner appealing to many grey nomads. Conclusion Theories of tourism tend to pay little attention to the aspects of tourism that involve recurrent activities and an ongoing connectedness with everyday life. Tourism is often defined: by contrasting it to home geographies and everydayness: tourism is what they are not. [...] The main focus in such research is on the extraordinary, on places elsewhere. Tourism is an escape from home, a quest for more desirable and fulfilling places. (Larsen 21) Nonetheless, tourism involves everyday routines, everyday spaces and an everyday social life. Grey nomads find that mobile phones and the Internet make possible the virtual co-presence of family and friends allowing everyday relationships to continue while touring. Nonetheless, the pleasure of ongoing contact with distant family and friends while touring may at times encroach on the quietude or solitude grey nomads experienced when touring remote and rural Australia. In addition to this, grey nomads’ caravans and motorhomes are equipped with the many comforts and domestic technologies of home, making for the continuance of everyday domiciliary life while on tour, further obfuscating the boundaries between the “tourist zone” and the “everyday zone.” In this sense grey nomads lead a lifestyle that is both anchored and mobile. This anchoring involves dwelling in everyday spaces, carrying out everyday domestic and social routines, as well as maintaining contact with friends and family via mobile communication technologies. This anchoring allows for some sense of predictability: that you own and control the private spaces of your own mobile dwelling, and can readily carry out everyday domestic routines and sociabilities. Conversely, the ready mobility of the caravan or motorhome offers a sense of autonomy: that you are unfettered, not bound to any specific place and can move on at whim. This peripatetic form of dwelling, where the dwelling itself is the catalyst for both travel and an everyday domestic life, is an under researched area. Mobile dwellings such as caravans, motorhomes, and yachts, constitute dwellings that are anchored in the everyday yet unfixed to any one locale. References Davies, Amanda, Matthew Tonts, and Julie Cammell. Coastal Camping in the Rangelands: Emerging Opportunities for Natural Resource Management. Perth: Rangelands WA, 2009. 24 Sep. 2011 ‹http://www.rangelandswa.com.au/pages/178/publications›. Economic Development Committee. Inquiry into Developing Queensland’s Rural and Regional Communities through Grey Nomad Tourism. Brisbane: Queensland Parliament, 2011. 23 Sep. 2011 ‹http://www.parliament.qld.gov.au/Documents/TableOffice/TabledPapers/2011/5311T3954.pdf›. Edensor, Tim. “Performing Tourism, Staging Tourism: (Re)Producing Tourist Space and Practice.” Tourist Studies 1 (2001): 59–81. Holloway, Donell. Grey Nomads: Retirement, Leisure and Travel in the Australian Context. PhD diss. Edith Cowan University: Perth, 2010. Jamal, Tanzin, and Steve Hill. “The Home and the World: (Post) Touristic Spaces of (in) Authenticity.” The Tourist as a Metaphor of The Social World. Ed. Graham Dann. Wallingford: CAB International, 2002. 77–107. Larsen, Jonas. “De-Exoticizing Tourist Travel: Everyday Life and Sociality on the Move.” Leisure Studies 27 (2008): 21–34. Massey, Doreen. “Power-Geometry and a Progressive Sense of Place.” Mapping the Futures: Local Cultures, Global Change. Eds. Jon Bird et al. London: Routeledge, 1993. 59–69. McCabe, Scott, and Elizabeth Stokoe. “Place and Identity in Tourists’ Accounts.” Annals of Tourism Research 31 (2004): 601–22. Obst, Patricia L., Nadine Brayley, and Mark J. King. “Grey Nomads: Road Safety Impacts and Risk Management.” 2008 Australasian Road Safety Research, Policing and Education Conference. Adelaide: Engineers Australia, 2008. Onyx, Jenny, and Rosemary Leonard. “The Grey Nomad Phenomenon: Changing the Script of Aging.” The International Journal of Aging and Human Development 64 (2007): 381–98. Regional Telecommunications Independent Review Committee. Regional Telecommunications Review Report: Framework for the Future. Canberra: RTIRC, 2008. Southerton, Dale, Elizabeth Shove, Alan Warde, and Rosemary Dean. “Home from Home? A Research Note on Recreational Caravanning.” Department of Sociology, Lancaster University. 1998. 10 Jan. 2009 ‹http://www.lancs.ac.uk/fass/sociology/papers/southerton-et-al-home-from-home.pdf›. Tourism Research Australia. Understanding the Caravan industry in WA: Grey Nomads—Fast Facts. Perth, Australia: Tourism WA (n.d.). Urry, John. “The Consuming of Place.” Discourse, Communication, and Tourism. Eds. Adam Jaworski and Annette Pritchard. Clevedon: Channel View Publications, 2005. 19–27. ———. The Tourist Gaze. London: Sage, 2002. White, Naomi, and Peter White. “Home and Away: Tourists in a Connected World.” Annals of Tourism Research 34 (2006): 88–104.
APA, Harvard, Vancouver, ISO, and other styles
39

Potts, Jason. "The Alchian-Allen Theorem and the Economics of Internet Animals." M/C Journal 17, no. 2 (February 18, 2014). http://dx.doi.org/10.5204/mcj.779.

Full text
Abstract:
Economics of Cute There are many ways to study cute: for example, neuro-biology (cute as adaptation); anthropology (cute in culture); political economy (cute industries, how cute exploits consumers); cultural studies (social construction of cute); media theory and politics (representation and identity of cute), and so on. What about economics? At first sight, this might point to a money-capitalism nexus (“the cute economy”), but I want to argue here that the economics of cute actually works through choice interacting with fixed costs and what economists call ”the substitution effect”. Cute, in conjunction with the Internet, affects the trade-offs involved in choices people make. Let me put that more starkly: cute shapes the economy. This can be illustrated with internet animals, which at the time of writing means Grumpy Cat. I want to explain how that mechanism works – but to do so I will need some abstraction. This is not difficult – a simple application of a well-known economics model, namely the Allen-Alchian theorem, or the “third law of demand”. But I am going to take some liberties in order to represent that model clearly in this short paper. Specifically, I will model just two extremes of quality (“opera” and “cat videos”) to represent end-points of a spectrum. I will also assume that the entire effect of the internet is to lower the cost of cat videos. Now obviously these are just simplifying assumptions “for the purpose of the model”. And the purpose of the model is to illuminate a further aspect of how we might understand cute, by using an economic model of choice and its consequences. This is a standard technique in economics, but not so in cultural studies, so I will endeavour to explain these moments as we go, so as to avoid any confusion about analytic intent. The purpose of this paper is to suggest a way that a simple economic model might be applied to augment the cultural study of cute by seeking to unpack its economic aspect. This can be elucidated by considering the rise of internet animals as a media-cultural force, as epitomized by “cat videos”. We can explain this through an application of price theory and the theory of demand that was first proposed by Armen Alchian and William Allen. They showed how an equal fixed cost that was imposed to both high-quality and low-quality goods alike caused a shift in consumption toward the higher-quality good, because it is now relatively cheaper. Alchian and Allen had in mind something like transport costs on agricultural goods (such as apples). But it is also true that the same effect works in reverse (Cowen), and the purpose of this paper is to develop that logic to contribute to explaining how certain structural shifts in production and consumption in digital media, particularly the rise of blog formats such as Tumblr, a primary supplier of kittens on the Internet, can be in part understood as a consequence of this economic mechanism. There are three key assumptions to build this argument. The first is that the cost of the internet is independent of what it carries. This is certainly true at the level of machine code, and largely true at higher levels. What might be judged aesthetically high quality or low quality content – say of a Bach cantata or a funny cat video – are treated the same way if they both have the same file size. This is a physical and computational aspect of net-neutrality. The internet – or digitization – functions as a fixed cost imposed regardless of what cultural quality is moving across it. Second, while there are costs to using the internet (for example, in hardware or concerning digital literacy) these costs are lower than previous analog forms of information and cultural production and dissemination. This is not an empirical claim, but a logical one (revealed preference): if it were not so, people would not have chosen it. The first two points – net neutrality and lowered cost – I want to take as working assumptions, although they can obviously be debated. But that is not the purpose of the paper, which is instead the third point – the “Alchian-Allen theorem”, or the third fundamental law of demand. The Alchian-Allen Theorem The Alchian-Allen theorem is an extension of the law of demand (Razzolini et al) to consider how the distribution of high quality and low quality substitutes of the same good (such as apples) is affected by the imposition of a fixed cost (such as transportation). It is also known as the “shipping the good apples out” theorem, after Borcherding and Silberberg explained why places that produce a lot of apples – such as Seattle in the US – often also have low supplies of high quality apples compared to places that do not produce apples, such as New York. The puzzle of “why can’t you get good apples in Seattle?” is a simple but clever application of price theory. When a place produces high quality and low quality items, it will be rational for those in faraway places to consume the high quality items, and it will be rational for the producers to ship them, leaving only the low quality items locally.Why? Assume preferences and incomes are the same everywhere and that transport cost is the same regardless of whether the item shipped is high or low quality. Both high quality and low quality apples are more expensive in New York compared to Seattle, but because the fixed transport cost applies to both the high quality apples are relatively less expensive. Rational consumers in New York will consume more high quality apples. This makes fewer available in Seattle.Figure 1: Change in consumption ratio after the imposition of a fixed cost to all apples Another example: Australians drink higher quality Californian wine than Californians, and vice versa, because it is only worth shipping the high quality wine out. A counter-argument is that learning effects dominate: with high quality local product, local consumers learn to appreciate quality, and have different preferences (Cowen and Tabarrok).The Alchian-Allen theorem applies to any fixed cost that applies generally. For example, consider illegal drugs (such as alcohol during the US prohibition, or marijuana or cocaine presently) and the implication of a fixed penalty – such as a fine, or prison sentence, which is like a cost – applied to trafficking or consumption. Alchian-Allen predicts a shift toward higher quality (or stronger) drugs, because with a fixed penalty and probability of getting caught, the relatively stronger substance is now relatively cheaper. Empirical work finds that this effect did occur during alcohol prohibition, and is currently occurring in narcotics (Thornton Economics of Prohibition, "Potency of illegal drugs").Another application proposed by Steven Cuellar uses Alchian-Allen to explain a well-known statistical phenomenon why women taking the contraceptive pill on average prefer “more masculine” men. This is once again a shift toward quality predicted on falling relative price based on a common ‘fixed price’ (taking the pill) of sexual activity. Jean Eid et al show that the result also applies to racehorses (the good horses get shipped out), and Staten and Umbeck show it applies to students – the good students go to faraway universities, and the good student in those places do the same. So that’s apples, drugs, sex and racehorses. What about the Internet and kittens?Allen-Alchian Explains Why the Internet Is Made of CatsIn analog days, before digitization and Internet, the transactions costs involved with various consumption items, whether commodities or media, meant that the Alchian-Allen effect pushed in the direction of higher quality, bundled product. Any additional fixed costs, such as higher transport costs, or taxes or duties, or transactions costs associated with search and coordination and payment, i.e. costs that affected all substitutes in the same way, would tend to make the higher quality item relatively less expensive, increasing its consumption.But digitisation and the Internet reverse the direction of these transactions costs. Rather than adding a fixed cost, such as transport costs, the various aspects of the digital revolution are equivalent to a fall in fixed costs, particularly access.These factors are not just one thing, but a suite of changes that add up to lowered transaction costs in the production, distribution and consumption of media, culture and games. These include: The internet and world-wide-web, and its unencumbered operation The growth and increasing efficacy of search technology Growth of universal broadband for fast, wide band-width access Growth of mobile access (through smartphones and other appliances) Growth of social media networks (Facebook, Twitter; Metcalfe’s law) Growth of developer and distribution platforms (iPhone, android, iTunes) Globally falling hardware and network access costs (Moore’s law) Growth of e-commerce (Ebay, Amazon, Etsy) and e-payments (paypal, bitcoin) Expansions of digital literacy and competence Creative commons These effects do not simply shift us down a demand curve for each given consumption item. This effect alone simply predicts that we consume more. But the Alchian-Allen effect makes a different prediction, namely that we consume not just more, but also different.These effects function to reduce the overall fixed costs or transactions costs associated with any consumption, sharing, or production of media, culture or games over the internet (or in digital form). With this overall fixed cost component now reduced, it represents a relatively larger decline in cost at the lower-quality, more bite-sized or unbundled end of the media goods spectrum. As such, this predicts a change in the composition of the overall consumption basket to reflect the changed relative prices that these above effects give rise to. See Figure 2 below (based on a blog post by James Oswald). The key to the economics of cute, in consequence of digitisation, is to follow through the qualitative change that, because of the Alchian-Allen effect, moves away from the high-quality, highly-bundled, high-value end of the media goods spectrum. The “pattern prediction” here is toward more, different, and lower quality: toward five minutes of “Internet animals”, rather than a full day at the zoo. Figure 2: Reducing transaction costs lowers the relative price of cat videos Consider five dimensions in which this more and different tendency plays out. Consumption These effects make digital and Internet-based consumption cheaper, shifting us down a demand curve, so we consume more. That’s the first law of demand in action: i.e. demand curves slope downwards. But a further effect – brilliantly set out in Cowen – is that we also consume lower-quality media. This is not a value judgment. These lower-quality media may well have much higher aesthetic value. They may be funnier, or more tragic and sublime; or faster, or not. This is not about absolute value; only about relative value. Digitization operating through Allen-Alchian skews consumption toward the lower quality ends in some dimensions: whether this is time, as in shorter – or cost, as in cheaper – or size, as in smaller – or transmission quality, as in gifs. This can also be seen as a form of unbundling, of dropping of dimensions that are not valued to create a simplified product.So we consume different, with higher variance. We sample more than we used to. This means that we explore a larger information world. Consumption is bite-sized and assorted. This tendency is evident in the rise of apps and in the proliferation of media forms and devices and the value of interoperability.ProductionAs consumption shifts (lower quality, greater variety), so must production. The production process has two phases: (1) figuring out what to do, or development; and (2) doing it, or making. The world of trade and globalization describes the latter part: namely efficient production. The main challenge is the world of innovation: the entrepreneurial and experimental world of figuring out what to do, and how. It is this second world that is radically transformed by implications of lowered transaction costs.One implication is growth of user-communities based around collaborative media projects (such as open source software) and community-based platforms or common pool resources for sharing knowledge, such as the “Maker movement” (Anderson 2012). This phenomenon of user-co-creation, or produsers, has been widely recognized as an important new phenomenon in the innovation and production process, particularly those processes associated with new digital technologies. There are numerous explanations for this, particularly around preferences for cooperation, community-building, social learning and reputational capital, and entrepreneurial expectations (Quiggin and Potts, Banks and Potts). Business Models The Alchian-Allen effect on consumption and production follows through to business models. A business model is a way of extracting value that represents some strategic equilibrium between market forms, organizational structures, technological possibilities and institutional framework and environmental conditions that manifests in entrepreneurial patterns of business strategy and particular patterns of investment and organization. The discovery of effective business models is a key process of market capitalist development and competition. The Alchian-Allen effect impacts on the space of effective viable business models. Business models that used to work will work less well, or not at all. And new business models will be required. It is a significant challenge to develop these “economic technologies”. Perhaps no less so than development of the physical technologies, new business models are produced through experimental trial and error. They cannot be known in advance or planned. But business models will change, which will affect not only the constellation of existing companies and the value propositions that underlie them, but also the broader specializations based on these in terms of skill sets held and developed by people, locations of businesses and people, and so on. New business models will emerge from a process of Schumpeterian creative destruction as it unfolds (Beinhocker). The large production, high development cost, proprietary intellectual property and systems based business model is not likely to survive, other than as niche areas. More experimental, discovery-focused, fast-development-then-scale-up based business models are more likely to fit the new ecology. Social Network Markets & Novelty Bundling MarketsThe growth of variety and diversity of choice that comes with this change in the way media is consumed to reflect a reallocation of consumption toward smaller more bite-sized, lower valued chunks (the Alchian-Allen effect) presents consumers with a problem, namely that they have to make more choices over novelty. Choice over novelty is difficult for consumers because it is experimental and potentially costly due to risk of mistakes (Earl), but it also presents entrepreneurs with an opportunity to seek to help solve that problem. The problem is a simple consequence of bounded rationality and time scarcity. It is equivalent to saying that the cost of choice rises monotonically with the number of choices, and that because there is no way to make a complete rational choice, agents will use decision or choice heuristics. These heuristics can be developed independently by the agents themselves through experience, or they can be copied or adopted from others (Earl and Potts). What Potts et al call “social network markets” and what Potts calls “novelty bundling markets” are both instances of the latter process of copying and adoption of decision rules. Social network markets occur when agents use a “copy the most common” or “copy the highest rank” meta-level decision rule (Bentley et al) to deal with uncertainty. Social network markets can be efficient aggregators of distributed information, but they can also be path-dependent, and usually lead to winner-take all situations and dynamics. These can result in huge pay-offs differentials between first and second or fifth place, even when the initial quality differentials are slight or random. Diversity, rapid experimentation, and “fast-failure” are likely to be effective strategies. It also points to the role of trust and reputation in using adopted decision rules and the information economics that underlies that: namely that specialization and trade applies to the production and consumption of information as well as commodities. Novelty bundling markets are an entrepreneurial response to this problem, and observable in a range of new media and creative industries contexts. These include arts, music or food festivals or fairs where entertainment and sociality is combined with low opportunity cost situations in which to try bundles of novelty and connect with experts. These are by agents who developed expert preferences through investment and experience in consumption of the particular segment or domain. They are expert consumers and are selling their “decision rules” and not just the product. The more production and consumption of media and digital information goods and services experiences the Alchian-Allen effect, the greater the importance of novelty bundling markets. Intellectual Property & Regulation A further implication is that rent-seeking solutions may also emerge. This can be seen in two dimensions; pursuit of intellectual property (Boldrin and Levine); and demand for regulations (Stigler). The Alchian-Allen induced shift will affect markets and business models (and firms), and because this will induce strategic defensive and aggressive responses from different organizations. Some organizations will seek to fight and adapt to this new world through innovative competition. Other firms will fight through political connections. Most incumbent firms will have substantial investments in IP or in the business model it supports. Yet the intellectual property model is optimized for high-quality large volume centralized production and global sales of undifferentiated product. Much industrial and labour regulation is built on that model. How governments support such industries is predicated on the stability of this model. The Alchian-Allen effect threatens to upset that model. Political pushback will invariably take the form of opposing most new business models and the new entrants they carry. Conclusion I have presented here a lesser-known but important theorem in applied microeconomics – the Alchian-Allen effect – and explain why its inverse is central to understanding the evolution of new media industries, and also why cute animals proliferate on the Internet. The theorem states that when a fixed cost is added to substitute goods, consumers will shift to the higher quality item (now relatively less expensive). The theorem also holds in reverse, when a fixed cost is removed from substitute items we expect a shift to lower quality consumption. The Internet has dramatically lowered fixed costs of access to media consumption, and various development platforms have similarly lowered the costs of production. Alchian-Allen predicts a shift to lower-quality, ”bittier” cuter consumption (Cowen). References Alchian, Arman, and William Allen. Exchange and Production. 2nd ed. Belmont, CA: Wadsworth, 1967. Anderson, Chris. Makers. New York: Crown Business, 2012. Banks, John, and Jason Potts. "Consumer Co-Creation in Online Games." New Media and Society 12.2 (2010): 253-70. Beinhocker, Eric. Origin of Wealth. Cambridge, Mass.: Harvard University Press, 2005. Bentley, R., et al. "Regular Rates of Popular Culture Change Reflect Random Copying." Evolution and Human Behavior 28 (2007): 151-158. Borcherding, Thomas, and Eugene Silberberg. "Shipping the Good Apples Out: The Alchian and Allen Theorem Reconsidered." Journal of Political Economy 86.1 (1978): 131-6. Cowen, Tyler. Create Your Own Economy. New York: Dutton, 2009. (Also published as The Age of the Infovore: Succeeding in the Information Economy. Penguin, 2010.) Cowen, Tyler, and Alexander Tabarrok. "Good Grapes and Bad Lobsters: The Alchian and Allen Theorem Revisited." Journal of Economic Inquiry 33.2 (1995): 253-6. Cuellar, Steven. "Sex, Drugs and the Alchian-Allen Theorem." Unpublished paper, 2005. 29 Apr. 2014 ‹http://www.sonoma.edu/users/c/cuellar/research/Sex-Drugs.pdf›.Earl, Peter. The Economic Imagination. Cheltenham: Harvester Wheatsheaf, 1986. Earl, Peter, and Jason Potts. "The Market for Preferences." Cambridge Journal of Economics 28 (2004): 619–33. Eid, Jean, Travis Ng, and Terence Tai-Leung Chong. "Shipping the Good Horses Out." Wworking paper, 2012. http://homes.chass.utoronto.ca/~ngkaho/Research/shippinghorses.pdf Potts, Jason, et al. "Social Network Markets: A New Definition of Creative Industries." Journal of Cultural Economics 32.3 (2008): 166-185. Quiggin, John, and Jason Potts. "Economics of Non-Market Innovation & Digital Literacy." Media International Australia 128 (2008): 144-50. Razzolini, Laura, William Shughart, and Robert Tollison. "On the Third Law of Demand." Economic Inquiry 41.2 (2003): 292–298. Staten, Michael, and John Umbeck. “Shipping the Good Students Out: The Effect of a Fixed Charge on Student Enrollments.” Journal of Economic Education 20.2 (1989): 165-171. Stigler, George. "The Theory of Economic Regulation." Bell Journal of Economics 2.1 (1971): 3-22. Thornton, Mark. The Economics of Prohibition. Salt Lake City: University of Utah Press, 1991.Thornton, Mark. "The Potency of Illegal Drugs." Journal of Drug Issues 28.3 (1998): 525-40.
APA, Harvard, Vancouver, ISO, and other styles
40

Kennedy, Jenny, Indigo Holcombe-James, and Kate Mannell. "Access Denied." M/C Journal 24, no. 3 (June 21, 2021). http://dx.doi.org/10.5204/mcj.2785.

Full text
Abstract:
Introduction As social-distancing mandates in response to COVID-19 restricted in-person data collection methods such as participant observation and interviews, researchers turned to socially distant methods such as interviewing via video-conferencing technology (Lobe et al.). These were not new tools nor methods, but the pandemic muted any bias towards face-to-face data collection methods. Exemplified in crowd-sourced documents such as Doing Fieldwork in a Pandemic, researchers were encouraged to pivot to digital methods as a means of fulfilling research objectives, “specifically, ideas for avoiding in-person interactions by using mediated forms that will achieve similar ends” (Lupton). The benefits of digital methods for expanding participant cohorts and scope of research have been touted long before 2020 and COVID-19, and, as noted by Murthy, are “compelling” (“Emergent” 172). Research conducted by digital methods can expect to reap benefits such as “global datasets/respondents” and “new modalities for involving respondents” (Murthy, “Emergent” 172). The pivot to digital methods is not in and of itself an issue. What concerns us is that in the dialogues about shifting to digital methods during COVID-19, there does not yet appear to have been a critical consideration of how participant samples and collected data will be impacted upon or skewed towards recording the experiences of advantaged cohorts. Existing literature focusses on the time-saving benefits for the researcher, reduction of travel costs (Fujii), the minimal costs for users of specific platforms – e.g. Skype –, and presumes ubiquity of device access for participants (Cater). We found no discussion on data costs of accessing such services being potential barriers to participation in research, although Deakin and Wakefield did share our concern that: Online interviews may ... mean that some participants are excluded due to the need to have technological competence required to participate, obtain software and to maintain Internet connection for the duration of the discussion. In this sense, access to certain groups may be a problem and may lead to issues of representativeness. (605) We write this as a provocation to our colleagues conducting research at this time to consider the cultural and material capital of their participants and how that capital enables them to participate in digitally-mediated data gathering practices, or not, and to what extent. Despite highlighting the potential benefits of digital methods within a methodological tool kit, Murthy previously cautioned against the implications posed by digital exclusion, noting that “the drawback of these research options is that membership of these communities is inherently restricted to the digital ‘haves’ ... rather than the ‘have nots’” (“Digital” 845). In this article, we argue that while tools such as Zoom have indeed enabled fieldwork to continue despite COVID disruptions, this shift to online platforms has important and under-acknowledged implications for who is and is not able to participate in research. In making this argument, we draw on examples from the Connected Students project, a study of digital inclusion that commenced just as COVID-19 restrictions came into effect in the Australian state of Victoria at the start of 2020. We draw on the experiences of these households to illustrate the barriers that such cohorts face when participating in online research. We begin by providing details about the Connected Students project and then contextualising it through a discussion of research on digital inclusion. We then outline three areas in which households would have experienced (or still do experience) difficulties participating in online research: data, devices, and skills. We use these findings to highlight the barriers that disadvantaged groups may face when engaging in data collection activities over Zoom and question how this is impacting on who is and is not being included in research during COVID-19. The Connected Students Program The Connected Students program was conducted in Shepparton, a regional city located 180km north of Melbourne. The town itself has a population of around 30,000, while the Greater Shepparton region comprises around 64,000 residents. Shepparton was chosen as the program’s site because it is characterised by a unique combination of low-income and low levels of digital inclusion. First, Shepparton ranks in the lowest interval for the Australian Bureau of Statistics’ Socio-Economic Indexes for Areas (SEIFA) and the Index of Relative Socioeconomic Advantage and Disadvantage (IRSAD), as reported in 2016 (Australian Bureau of Statistics, “Census”; Australian Bureau of Statistics, “Index”). Although Shepparton has a strong agricultural and horticultural industry with a number of food-based manufacturing companies in the area, including fruit canneries, dairies, and food processing plants, the town has high levels of long-term and intergenerational unemployment and jobless families. Second, Shepparton is in a regional area that ranks in the lowest interval for the Australian Digital Inclusion Index (Thomas et al.), which measures digital inclusion across dimensions of access, ability, and affordability. Funded by Telstra, Australia’s largest telecommunications provider, and delivered in partnership with Greater Shepparton Secondary College (GSSC), the Connected Students program provided low-income households with a laptop and an unlimited broadband Internet connection for up to two years. Households were recruited to the project via GSSC. To be eligible, households needed to hold a health care card and have at least one child attending the school in year 10, 11, or 12. Both the student and a caregiver were required to participate in the project to be eligible. Additional household members were invited to take part in the research, but were not required to. (See Kennedy & Holcombe-James; and Kennedy et al., "Connected Students", for further details regarding household demographics.) The Australian Digital Inclusion Index identifies that affordability is a significant barrier to digital inclusion in Australia (Thomas et al.). The project’s objective was to measure how removing affordability barriers to accessing connectivity for households impacts on digital inclusion. By providing participating households with a free unlimited broadband internet connection for the duration of the research, the project removed the costs associated with digital access. Access alone is not enough to resolve the digital exclusion confronted by these low-income households. Digital exclusion in these instances is not derived simply from the cost of Internet access, but from the cost of digital devices. As a result, these households typically lacked sufficient digital devices. Each household was therefore provided both a high speed Internet connection, and a brand new laptop with built-in camera, microphone, and speakers (a standard tool kit for video conferencing). Data collection for the Connected Students project was intended to be conducted face-to-face. We had planned in-person observations including semi-structured interviews with household members conducted at three intervals throughout the project’s duration (beginning, middle, and end), and technology tours of each home to spatially and socially map device locations and uses (Kennedy et al., Digital Domesticity). As we readied to make our first research trip to commence the study, COVID-19 was wreaking havoc. It quickly became apparent we would not be travelling to work, much less travelling around the state. We thus pivoted to digital methods, with all our data collection shifting online to interviews conducted via digital platforms such as Zoom and Microsoft Teams. While the pivot to digital methods saved travel hours, allowing us to scale up the number of households we planned to interview, it also demonstrated unexpected aspects of our participants’ lived experiences of digital exclusion. In this article, we draw on our first round of interviews which were conducted with 35 households over Zoom or Microsoft Teams during lockdown. The practice of conducting these interviews reveals insights into the barriers that households faced to digital research participation. In describing these experiences, we use pseudonyms for individual participants and refer to households using the pseudonym for the student participant from that household. Why Does Digital Inclusion Matter? Digital inclusion is broadly defined as universal access to the technologies necessary to participate in social and civic life (Helsper; Livingstone and Helsper). Although recent years have seen an increase in the number of connected households and devices (Thomas et al., “2020”), digital inclusion remains uneven. As elsewhere, digital disadvantage in the Australian context falls along geographic and socioeconomic lines (Alam and Imran; Atkinson et al.; Blanchard et al.; Rennie et al.). Digitally excluded population groups typically experience some combination of education, employment, income, social, and mental health hardship; their predicament is compounded by a myriad of important services moving online, from utility payments, to social services, to job seeking platforms (Australian Council of Social Service; Chen; Commonwealth Ombudsman). In addition to challenges in using essential services, digitally excluded Australians also miss out on the social and cultural benefits of Internet use (Ragnedda and Ruiu). Digital inclusion – and the affordability of digital access – should thus be a key concern for researchers looking to apply online methods. Households in the lowest income quintile spend 6.2% of their disposable income on telecommunications services, almost three times more than wealthier households (Ogle). Those in the lowest income quintile pay a “poverty premium” for their data, almost five times more per unit of data than those in the highest income quintile (Ogle and Musolino). As evidenced by the Australian Digital Inclusion Index, this is driven in part by a higher reliance on mobile-only access (Thomas et al., “2020”). Low-income households are more likely to access critical education, business, and government services through mobile data rather than fixed broadband data (Thomas et al., “2020”). For low-income households, digital participation is the top expense after housing, food, and transport, and is higher than domestic energy costs (Ogle). In the pursuit of responsible and ethical research, we caution against assuming research participants are able to bear the brunt of access costs in terms of having a suitable device, expending their own data resources, and having adequate skills to be able to complete the activity without undue stress. We draw examples from the Connected Students project to support this argument below. Findings: Barriers to Research Participation for Digitally Excluded Households If the Connected Students program had not provided participating households with a technology kit, their preexisting conditions of digital exclusion would have limited their research participation in three key ways. First, households with limited Internet access (particularly those reliant on mobile-only connectivity, and who have a few gigabytes of data per month) would have struggled to provide the data needed for video conferencing. Second, households would have struggled to participate due to a lack of adequate devices. Third, and critically, although the Connected Students technology kit provided households with the data and devices required to participate in the digital ethnography, this did not necessarily resolve the skills gaps that our households confronted. Data Prior to receiving the Connected Students technology kit, many households in our sample had limited modes of connectivity and access to data. For households with comparatively less or lower quality access to data, digital participation – whether for the research discussed here, or in contemporary life – came with very real costs. This was especially the case for households that did not have a home Internet connection and instead relied solely on mobile data. For these households, who carefully managed their data to avoid running out, participating in research through extended video conferences would have been impossible unless adequate financial reimbursement was offered. Households with very limited Internet access used a range of practices to manage and extend their data access by shifting internet costs away from the household budget. This often involved making use of free public Wi-Fi or library internet services. Ellie’s household, for instance, spent their weekends at the public library so that she and her sister could complete their homework. While laborious, these strategies worked well for the families in everyday life. However, they would have been highly unsuitable for participating in research, particularly during the pandemic. On the most obvious level, the expectations of library use – if not silent, then certainly quiet – would have prohibited a successful interview. Further, during COVID-19 lockdowns, public libraries (and other places that provide public Internet) became inaccessible for significant periods of time. Lastly, for some research designs, the location of participants is important even when participation is occurring online. In the case of our own project, the house itself as the site of the interview was critical as our research sought to understand how the layout and materiality of the home impacts on experiences of digital inclusion. We asked participants to guide us around their home, showing where technologies and social activities are colocated. In using the data provided by the Connected Students technology kit, households with limited Internet were able to conduct interviews within their households. For these families, participating in online research would have been near impossible without the Connected Students Internet. Devices Even with adequate Internet connections, many households would have struggled to participate due to a lack of suitable devices. Laptops, which generally provide the best video conferencing experience, were seen as prohibitively expensive for many families. As a result, many families did not have a laptop or were making do with a laptop that was excessively slow, unreliable, and/or had very limited functions. Desktop computers were rare and generally outdated to the extent that they were not able to support video conferencing. One parent, Melissa, described their barely-functioning desktop as “like part of the furniture more than a computer”. Had the Connected Students program not provided a new laptop with video and audio capabilities, participation in video interviews would have been difficult. This is highlighted by the challenges students in these households faced in completing online schooling prior to receiving the Connected Students kit. A participating student, Mallory, for example, explained she had previously not had a laptop, reliant only on her phone and an old iPad: Interviewer: Were you able to do all your homework on those, or was it sometimes tricky?Mallory: Sometimes it was tricky, especially if they wanted to do a call or something ... . Then it got a bit hard because then I would use up all my data, and then didn’t have much left.Interviewer: Yeah. Right.Julia (Parent): ... But as far as schoolwork, it’s hard to do everything on an iPad. A laptop or a computer is obviously easier to manoeuvre around for different things. This example raises several common issues that would likely present barriers to research participation. First, Mallory’s household did not have a laptop before being provided with one through the Connected Students program. Second, while her household did prioritise purchasing tablets and smartphones, which could be used for video conferencing, these were more difficult to navigate for certain tasks and used up mobile data which, as noted above, was often a limited resource. Lastly, it is worth noting that in households which did already own a functioning laptop, it was often shared between several household members. As one parent, Vanessa, noted, “yeah, until we got the [Connected Students] devices, we had one laptop between the four of us that are here. And Noel had the majority use of that because that was his school work took priority”. This lack of individuated access to a device would make participation in some research designs difficult, particularly those that rely on regular access to a suitable device. Skills Despite the Connected Students program’s provision of data and device access, this did not ensure successful research participation. Many households struggled to engage with video research interviews due to insufficient digital skills. While a household with Internet connectivity might be considered on the “right” side of the digital divide, connectivity alone does not ensure participation. People also need to have the knowledge and skills required to use online resources. Brianna’s household, for example, had downloaded Microsoft Teams to their desktop computer in readiness for the interview, but had neglected to consider whether that device had video or audio capabilities. To work around this restriction, the household decided to complete the interview via the Connected Students laptop, but this too proved difficult. Neither Brianna nor her parents were confident in transferring the link to the interview between devices, whether by email or otherwise, requiring the researchers to talk them through the steps required to log on, find, and send the link via email. While Brianna’s household faced digital skills challenges that affected both parent and student participants, in others such as Ariel’s, these challenges were focussed at the parental level. In these instances, the student participant provided a vital resource, helping adults navigate platforms and participate in the research. As Celeste, Ariel’s parent, explained, it's just new things that I get a bit – like, even on here, because your email had come through to me and I said to Ariel "We're going to use your computer with Teams. How do we do this?" So, yeah, worked it out. I just had to look up my email address, but I [initially thought] oh, my god; what am I supposed to do here? Although helpful in our own research given its focus on school-aged young people, this dynamic of parents being helped by their dependents illustrates that the adults in our sample were often unfamiliar with the digital skills required for video conferencing. Research focussing only on adults, or on households in which students have not developed these skills through extended periods of online education such as occurred during the COVID-19 lockdowns, may find participants lacking the digital skills to participate in video interviews. Participation was also impacted upon by participants' lack of more subtle digital skills around the norms and conventions of video conferencing. Several households, for example, conducted their interviews in less ideal situations, such as from both moving and parked cars. A portion of the household interview with Piper’s household was completed as they drove the 30 minutes from their home into Shepperton. Due to living out of town, this household often experienced poor reception. The interview was thus regularly disrupted as they dropped in and out of range, with the interview transcript peppered with interjections such as “we’re going through a bit of an Internet light spot ... we’re back ... sorry ...” (Karina, parent). Finally, Piper switched the device on which they were taking the interview to gain a better connection: “my iPad that we were meeting on has worse Internet than my phone Internet, so we kind of changed it around” (Karina). Choosing to participate in the research from locations other than the home provides evidence of the limited time available to these families, and the onerousness of research participation. These choices also indicate unfamiliarity with video conferencing norms. As digitally excluded households, these participants were likely not the target of popular discussions throughout the pandemic about optimising video conferences through careful consideration of lighting, background, make-up and positioning (e.g. Lasky; Niven-Phillips). This was often identified by how participants positioned themselves in front of the camera, often choosing not to sit squarely within the camera lens. Sometimes this was because several household members were participating and struggled to all sit within view of the single device, but awkward camera positioning also occurred with only one or two people present. A number of interviews were initially conducted with shoulders, or foreheads, or ceilings rather than “whole” participants until we asked them to reposition the device so that the camera was pointing towards their faces. In noting this unfamiliarity we do not seek to criticise or apportion responsibility for accruing such skills to participating households, but rather to highlight the impact this had on the type of conversation between researcher and participant. Such practices offer valuable insight into how digital exclusion impacts on individual’s everyday lives as well as on their research participation. Conclusion Throughout the pandemic, digital methods such as video conferencing have been invaluable for researchers. However, while these methods have enabled fieldwork to continue despite COVID-19 disruptions, the shift to online platforms has important and under-acknowledged implications for who is and is not able to participate in research. In this article, we have drawn on our research with low-income households to demonstrate the barriers that such cohorts experience when participating in online research. Without the technology kits provided as part of our research design, these households would have struggled to participate due to a lack of adequate data and devices. Further, even with the kits provided, households faced additional barriers due to a lack of digital literacy. These experiences raise a number of questions that we encourage researchers to consider when designing methods that avoid in person interactions, and when reviewing studies that use similar approaches: who doesn’t have the technological access needed to participate in digital and online research? What are the implications of this for who and what is most visible in research conducted during the pandemic? Beyond questions of access, to what extent will disadvantaged populations not volunteer to participate in online research because of discomfort or unfamiliarity with digital tools and norms? When low-income participants are included, how can researchers ensure that participation does not unduly burden them by using up precious data resources? And, how can researchers facilitate positive and meaningful participation among those who might be less comfortable interacting through mediums like video conferencing? In raising these questions we acknowledge that not all research will or should be focussed on engaging with disadvantaged cohorts. Rather, our point is that through asking questions such as this, we will be better able to reflect on how data and participant samples are being impacted upon by shifts to digital methods during COVID-19 and beyond. As researchers, we may not always be able to adapt Zoom-based methods to be fully inclusive, but we can acknowledge this as a limitation and keep it in mind when reporting our findings, and later when engaging with the research that was largely conducted online during the pandemic. Lastly, while the Connected Students project focusses on impacts of affordability on digital inclusion, digital disadvantage intersects with many other forms of disadvantage. Thus, while our study focussed specifically on financial disadvantage, our call to be aware of who is and is not able to participate in Zoom-based research applies to digital exclusion more broadly, whatever its cause. Acknowledgements The Connected Students project was funded by Telstra. This research was also supported under the Australian Research Council's Discovery Early Career Researchers Award funding scheme (project number DE200100540). References Alam, Khorshed, and Sophia Imran. “The Digital Divide and Social Inclusion among Refugee Migrants: A Case in Regional Australia.” Information Technology & People 28.2 (2015): 344–65. Atkinson, John, Rosemary Black, and Allan Curtis. “Exploring the Digital Divide in an Australian Regional City: A Case Study of Albury”. Australian Geographer 39.4 (2008): 479–493. Australian Bureau of Statistics. “Census of Population and Housing: Socio-Economic Indexes for Areas (SEIFA), Australia, 2016.” 2016. <https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by%20Subject/2033.0.55.001~2016~Main%20Features~SOCIO-ECONOMIC%20INDEXES%20FOR%20AREAS%20(SEIFA)%202016~1>. ———. “Index of Relative Socio-Economic Advantage and Disadvantage (IRSAD).” 2016. <https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by%20Subject/2033.0.55.001~2016~Main%20Features~IRSAD~20>. Australian Council of Social Service. “The Future of Parents Next: Submission to Senate Community Affairs Committee.” 8 Feb. 2019. <http://web.archive.org/web/20200612014954/https://www.acoss.org.au/wp-content/uploads/2019/02/ACOSS-submission-into-Parents-Next_FINAL.pdf>. Beer, David. “The Social Power of Algorithms.” Information, Communication & Society 20.1 (2017): 1–13. Blanchard, Michelle, et al. “Rethinking the Digital Divide: Findings from a Study of Marginalised Young People’s Information Communication Technology (ICT) Use.” Youth Studies Australia 27.4 (2008): 35–42. Cater, Janet. “Skype: A Cost Effective Method for Qualitative Research.” Rehabilitation Counselors and Educators Journal 4.2 (2011): 10-17. Chen, Jesse. “Breaking Down Barriers to Digital Government: How Can We Enable Vulnerable Consumers to Have Equal Participation in Digital Government?” Sydney: Australian Communications Consumer Action Network, 2017. <http://web.archive.org/web/20200612015130/https://accan.org.au/Breaking%20Down%20Barriers%20to%20Digital%20Government.pdf>. Commonwealth Ombudsman. “Centrelink’s Automated Debt Raising and Recovery System: Implementation Report, Report No. 012019.” Commonwealth Ombudsman, 2019. <http://web.archive.org/web/20200612015307/https://www.ombudsman.gov.au/__data/assets/pdf_file/0025/98314/April-2019-Centrelinks-Automated-Debt-Raising-and-Recovery-System.pdf>. Deakin Hannah, and Kelly Wakefield. “Skype Interviewing: Reflections of Two PhD Researchers.” Qualitative Research 14.5 (2014): 603-616. Fujii, LeeAnn. Interviewing in Social Science Research: A Relational Approach. Routledge, 2018. Helsper, Ellen. “Digital Inclusion: An Analysis of Social Disadvantage and the Information Society.” London: Department for Communities and Local Government, 2008. Kennedy, Jenny, and Indigo Holcombe-James. “Connected Students Milestone Report 1: Project Commencement". Melbourne: RMIT, 2021. <https://apo.org.au/node/312817>. Kennedy, Jenny, et al. “Connected Students Milestone Report 2: Findings from First Round of Interviews". Melbourne: RMIT, 2021. <https://apo.org.au/node/312818>. Kennedy, Jenny, et al. Digital Domesticity: Media, Materiality, and Home Life. Oxford UP, 2020. Lasky, Julie. “How to Look Your Best on a Webcam.” New York Times, 25 Mar. 2020 <http://www.nytimes.com/2020/03/25/realestate/coronavirus-webcam-appearance.html>. Livingstone, Sonia, and Ellen Helsper. “Gradations in Digital Inclusion: Children, Young People and the Digital Divide.” New Media & Society 9.4 (2007): 671–696. Lobe, Bojana, David L. Morgan, and Kim A. Hoffman. “Qualitative Data Collection in an Era of Social Distancing.” International Journal of Qualitative Methods 19 (2020): 1–8. Lupton, Deborah. “Doing Fieldwork in a Pandemic (Crowd-Sourced Document).” 2020. <http://docs.google.com/document/d/1clGjGABB2h2qbduTgfqribHmog9B6P0NvMgVuiHZCl8/edit?ts=5e88ae0a#>. Murthy, Dhiraj. “Digital Ethnography: An Examination of the Use of New Technologies for Social Research”. Sociology 42.2 (2008): 837–855. ———. “Emergent Digital Ethnographic Methods for Social Research.” Handbook of Emergent Technologies in Social Research. Ed. Sharlene Nagy Hesse-Biber. Oxford UP, 2011. 158–179. Niven-Phillips, Lisa. “‘Virtual Meetings Aren’t Going Anywhere Soon’: How to Put Your Best Zoom Face Forward.” The Guardian, 27 Mar. 2021. <http://www.theguardian.com/fashion/2021/mar/27/virtual-meetings-arent-going-anywhere-soon-how-to-put-your-best-zoom-face-forward>. Ogle, Greg. “Telecommunications Expenditure in Australia: Fact Sheet.” Sydney: Australian Communications Consumer Action Network, 2017. <https://web.archive.org/web/20200612043803/https://accan.org.au/files/Reports/ACCAN_SACOSS%20Telecommunications%20Expenditure_web_v2.pdf>. Ogle, Greg, and Vanessa Musolino. “Connectivity Costs: Telecommunications Affordability for Low Income Australians.” Sydney: Australian Communications Consumer Action Network, 2016. <https://web.archive.org/web/20200612043944/https://accan.org.au/files/Reports/161011_Connectivity%20Costs_accessible-web.pdf>. Ragnedda, Massimo, and Maria Laura Ruiu. “Social Capital and the Three Levels of Digital Divide.” Theorizing Digital Divides. Eds. Massimo Ragnedda and Glenn Muschert. Routledge, 2017. 21–34. Rennie, Ellie, et al. “At Home on the Outstation: Barriers to Home Internet in Remote Indigenous Communities.” Telecommunications Policy 37.6 (2013): 583–93. Taylor, Linnet. “What Is Data Justice? The Case for Connecting Digital Rights and Freedoms Globally. Big Data & Society 4.2 (2017): 1–14. Thomas, Julian, et al. Measuring Australia’s Digital Divide: The Australian Digital Inclusion Index 2018. Melbourne: RMIT University, for Telstra, 2018. ———. Measuring Australia’s Digital Divide: The Australian Digital Inclusion Index 2019. Melbourne: RMIT University and Swinburne University of Technology, for Telstra, 2019. ———. Measuring Australia’s Digital Divide: The Australian Digital Inclusion Index 2020. Melbourne: RMIT University and Swinburne University of Technology, for Telstra, 2020. Zuboff, Shoshana. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology 30 (2015): 75–89.
APA, Harvard, Vancouver, ISO, and other styles
41

Hardey, Mariann. "Going Live." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2609.

Full text
Abstract:
Introduction Australia’s mobile communications industry has been slower to embrace the convergence of digital communication technology compared to other areas of the Asia-Pacific region, in particular Japan. However, the introduction of new mobile networks and spread of broadband (albeit still limited in some areas) has given Australians opportunities to experience the new technosocial communications. As a result mobile communication resources have become embedded within a sociocultural infrastructure that is at once mobile, personalised and consumerist. This paper examines how the iGeneration (or ‘Internet Generation’, those born in the first half of the 1980s and who were the first to grow up in a networked and communications media driven society) of young Australians have taken up and embraced the mobile technologies as part of their everyday sociability. This journal issue is concerned to understand the significance of the convergence of mobile media. In this paper ‘mobile’ is taken to refer to the range of digital media that are owned and used by the iGeneration. These can include mobile phones, laptops, computers alongside an array of other digital social software and Web 2.0 resources such as email, Social Networking Systems (SNS), e.g. Facebook, that enable individuals to situate themselves and communicate across their social networks. The discussion that follows will touch on all of these mobile communication resources. It is argued that these should be seen as more than technical tools, as they offer a constant ‘tether’ to personalised and intimate connections (Ito et al, 2005). This in itself is significant because the emphasis is on a digitally mobile and connected sociability rather than any single device or piece of software. It will be concluded that this connected sociability means that for the iGeneration there is a seamless movement across what has been previously depicted as an off/online and disembodied dichotomy. Researching the iGeneration The paper draws on the data from 40 in-depth and open-ended interviews with undergraduate students who were in the last term of their first year at University in Australia in 2006. The conventions of anonymity have been followed to ensure that no individual may be identified. All interviews were digitally recorded (with permission) and detailed analysis undertaken utilising AtlasTi. The analysis involved identifying themes and issues as they emerged from reading and re-reading of the data. This group was chosen as they had established non-university social networks and new connections amongst university peers. The focus on what constitutes one of the more privileged sections of young people in terms of education, if not material resources, is appropriate in a study that seeks to explore those who are likely to be able to take advantage of innovative communications technology. Extracts from the interview data for this paper, are not intended to be representative, but rather are used for illustrative purposes. Mobile Life The diffusion of communications media has become ubiquitous amongst the iGeneration who are socially, temporally and spatially mobile and likely to immerse themselves in their social connections. This is a generation that has been said to “inhabit a different world” (Muller), where seemingly unregulated flows of information and methods of staying in touch with others ‘situate’ social lives as part of mobile sociability. Part of this more mobile sociability is the crossover between global and localised connections. Indeed, globalisation theorists have emphasised how the world is characterised by the flows of such information. Urry has paid particular attention to the forms of mobility that take place in a society characterised by the exchange and sharing of information and communication practices. This paper has a narrower focus and is concerned with what might be thought of as ‘local’ communicative practices between people situated in the same city and at the same, but dispersed, institutions. Mobile communications technology takes on an increasingly ‘invisible’ sociotechnological power that underlies the structure and shapes the experience of everyday sociability and relationships (Graham). Identified as “Digital Natives” by Prensky these individuals ‘thrive’ on their constant connectivity to one another. The following quote reflects the sentiments of many of the students interviewed: I would never be without my phone, or at least having some way of being in touch with my friends. People tend to have ties everywhere now and I find that I am always in touch at the click of a button anytime. (Jon) Key to social interaction for the iGeneration is to be constantly ‘switched on’ and available to others. Significantly, the mediated aspects of mobile technology means that social connections are valued for their ‘liveness’, whereby interactions are expected to take place in ‘real time’. In this way the iGeneration have become both the producers and consumers of ‘live’ content where personal engagements are ‘active’. This ensures that individuals are (and are seen to be) socially and digitally engaged. The new social practices that form part of an ‘on-the-go’ and ‘ever-current’ lifestyle means that to be ‘in touch’ has taken on a new symbolic and social form. All 40 of the students interviewed mentioned that they could not ‘imagine’ being detached from their social networks, or without some form of communication device on their person. The relationship between previously defined on and offline lives, or ‘real’ and ‘virtual’ situations are not separate entities in this context. Instead they are inextricably linked together as the individual is continually socially connected. Individuals are part of a constant present-ness and engagement to what is experienced as a lived or ‘worldspace’, rather than static ‘real’/’virtual’ world duality (Steinberg cited by White). As a result members of the iGeneration have to maintain two active and dynamic social presences, one that is ‘real’ world and the other that is virtual. They are always ‘situated’ in both their embodied and disembodied digital lives, and yet this is a duality that many do not consciously recognise as they move ‘seamlessly’ across different venues for sociability. In order to remain ‘up-to-date’ communication strategies are employed, as one student explained: Things are changing so fast, like you go away for just one day and you are just so out of the loop, things change continually and it’s nice to be part of that. It’s hard if you miss a message because then you are behind and don’t know what’s going on… you have to continue to make the effort if you want to stay in touch. (Kim) In Goffman’s classic analysis of face-to-face interaction he revealed the complexity of social communication and the nuanced use of ‘props’ and ‘backstage work’. In a similar fashion the mediated and real time interaction amongst the iGeneration is full of symbolic meanings and rituals. Ironically in what is often thought of as a disembodied sociability, where time and place cease to matter, it is the immediacy or live presence that is valued. Thus social life rotates around the emergence of a set of continually updated communications between individuals. Social relationships are ‘reworked’ as mobile communications introduces a new layer of social connectiveness. The process of communicating with someone is not just about what is expressed, but includes a set of subjective meanings as to the ‘whom’ an individual is and value of a relationship. Successful communication and development of relations through technology require the engagement of the self with shared social conventions and representations. Mobile technology has enabled a whole generation to mobilise relationships and connections whilst ‘on the move’ in a way that strengthen social bonds and facilitates a sense of social connectedness (Wei and Lo). Getting to Know Each Other For members of the iGeneration traditional forms of social meetings, and indeed settings, have become modified to take into account constant social connectivity. Students employ technologies to provide new ways of ‘getting-to-know’ others and to develop relationships. In particular, SNS is used to find out about potential new friends by drawing on the profiles and connections that are displayed on resources such as Facebook. Profiles involve the creation of a virtual ‘identity’ that represents an individual and may include digital photographs, music, a detailed self-description, lists of interests and of other ‘friends’ etc. Sites such as Facebook are popular because (at the time the research was undertaken) they require an email address from an academic institution in order to join. Consequently, users trusted the information displayed on these sites and rarely questioned whether the descriptions that they read were accurate (Jones and Soltren). Not only would it be seen as breaking communicative norms to, for example fabricate an identity on Facebook, it would also be a fabrication that would be difficult to maintain across the various media that are in use. Indeed it would be ultimately pointless in terms of a sociability that moves across media and between the virtual and non-virtual domains. Such sites are geared to the student population and it is often taken-for-granted that amongst students that they will have a Facebook profile. Reflecting this university clubs and societies distribute notices of events and so forth through Facebook. Individual profiles may also display mobile phone numbers and other points of contact so that the online descriptions of the self are linked to other forms of connection. As this Melbourne student explains, these resources provide new means of ‘getting to know’ others. The way in is different now if you are getting to know someone, before maybe you went out a few times and got to know their circle of friends, but now you can check out their MySpace profile, or send them a message on Facebook BEFORE you meet up. Just by messaging each other you know that there’s no awkwardness or danger of gaps in conversation before you get together. (Tom) In effect the individual is digitally represented in a range of digital spaces so that a stranger can imagine or construct a sense of the ‘real’ person without ‘knowing’ or engaging with them. Such imaginings represent an important means of being on familiar terms with others and the ‘social value’ or individuals ‘place’ within a social network (Gotved). In the early stages of becoming acquainted with someone the status of the individual was related to the how frequently they were contacted and the form of interaction that took place. As noted earlier Goffman’s (1978 [1959]) work is useful as social ceremonies and rules for interaction can be detected although these are often taken-for-granted unless people are prompted to talk about how they communicate with others. They are perhaps best exemplified by the following descriptions from students talking about how they ‘got-to-know’ one another at the beginning of the university term: When you are getting to know someone it’s interesting to see if they’ll message you or call, then your like ‘oh he’s a caller’ and can go from there. (Emma) If I don’t know the person well I like to text, I am not good on the phone and so it creates a way to say ‘hi’ without the danger of awkward gaps. Then you find yourself messaging back and forth and can meet up later… (Katie) You have to play to their agenda otherwise you never hook up. (Stu) Instant messaging like on MSN or texts or whatever totally helps with getting to know someone. Before you meet up you can find out whether you’ll get on or not and whether it’s worth you while meeting up. Kind of like a filtering process. (Dan) This mediated process may involve text messages, emails and mobile calls before individuals meet offline. Members of the iGeneration therefore use an integrated set of devices and software resources to initiate and maintain friendship networks. In effect the often-rich descriptions created in SNS reflect a visualisation of what Bourdieu has described as ‘habitus’. This notion of habitus, that can basically be seen as set of acquired dispositions is appropriate, as “when habitus encounters a social world of which it is the product, it is like a “fish in water” ... it takes the world about itself for granted” (Bourdieu and Wacquant 127). This neatly describes how the iGeneration incorporates mobile communications technology into their everyday lives. An Etiquette for Mobility The ‘rules’, attitudes and expectations, that come into play as part of these new mobile communication practices continue to remain tied to a recognised and preconceived social ordering. Indeed, one of the most important aspects of this kind of mobile communication is the adherence to a set of social rules through which individuals continually control the process of interaction itself. This includes for example, the pace of communication, when to text, to make a voice call, or to email, and so forth. Galloway has argued that there is a “decidedly playful” aspect to mobile interaction. However, a range of communicative strategies underwrites this ‘play’ as periods of non-contactability have to be ‘justified’ or explained. If such episodes are not explained these can become problematic, generate misunderstandings or cause anxieties within networks and emergent relationships. Indeed, the “simple fact of carrying a mobile phone generates in the carrier the expectation of being immediately available” (Licoppe and Heurtin 100). For this reason a sense of disappointment, or cause for concern, may be experienced if an individual receives for example no text messages for a period of time. Amongst those students who were in regular contact with one other a set of what can be thought of as ‘communicative regimes’ is negotiated. These arise out of social practices for connectivity that are part of virtual and face-to-face meetings. Such negotiations may be largely implicit but occur out of a shared sense of ‘knowing’ the other. Actions or non-actions such as not answering a voice call or responding to a message straight away can be seen as a social distancing. For example, a student talked about how he always immediately returned a text message to his housemate because “it was expected” and to delay a response without an explanation would not be seen as an appropriate response to a “close mate” (Riley). Consequently communication regimes are developed around relationships and may be layered in terms of status within a peer group. For the iGeneration such practices reflect what in pervious times would have been thought of as etiquette. It is interesting to note that at the time of writing this paper there were 11 global groups with some 2,870 members on Facebook dedicated to what is described as ‘Facebook etiquette’. Conclusion A purpose of this paper is to suggest that recent changes in the provision of information and communications services in Australia have created new opportunities for an iGeneration to incorporate the technologies within their everyday lives. There are similarities here with the practices found amongst young people in Japan, South Korea and other counties that have some of the most advanced publicly available communications infrastructures (Ito et al). It is worth noting that 3rd Generation mobile phones, and video technologies are less common in Australia, hence future convergence remains open to speculation and dependent upon improved network infrastructures and marketing. The emphasis in Australia is on the seamless use of different mobile communications technologies and the embedding of these within broader social practices. The convenience and ‘pocketability’ of communications devices has become one of the most important innovations for an iGeneration that desires communication, information and entertainment accessible in the palm of their hand, a first step “towards a digital paradise” (Standage). However, care has to be taken to differentiate between media and marketing hype and actual social practices. Commentaries and research in the early days of the Internet tended to focus on the possibilities it offered to escape the fleshy body through the screen into new identities, genders and bodily forms (Turkle; Haraway). While there are resources such as Second Life that provide a means to escape form the embodied self the main concern of the iGeneration is to promote sociability across the digital and real worlds. One reinforces and reflects the other so that the virtual self is always anchored in the embodied self. It is the convergence of the self through such representations that whilst not exactly embodied in a physical sense refer to a ‘real’ physicality and presence. This suggest that in terms of social practices for the iGeneration the virtual/place dichotomy is unhelpful and as Daniel Miller and Don Slater note “we need to treat Internet media as continuous with and embedded in other social spaces” (5). The convergence of mobile communicative resources highlighted in this paper and their embodiment into social practices suggests that users may have little more to gain in terms of sociability from, for example, streaming video on mobile phones. The emotive experience of being ‘in touch’ with one another remains a fundamental amongst the iGeneration who draw upon a range of mobile media and social software to form and sustain interactions. Such connections are conducted through a more or less nuanced set of communicative regimes that move across what for them is a seamless landscape of mediated and off line resources and relationships. References Bourdieu, Pierre, and L. Wacquant. An Invitation to Reflexive Sociology. Cambridge: Polity Press, 1992. Goffman, Erving. The Presentation of the Self in Everyday Life. Harmondsworth: Penguin, 1978 [1959]. Gotved, S. “Time and Space in Cyber Social Reality.” New Media and Society 8.3 (2006): 467-486. Graham, S. “Beyond the ‘Dazzling Light’: From Dreams of Transcendence to the ‘Remediation’.” New Media Society 6 (2004): 16-25. Haraway, Donna. “A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century.” Simians, Cyborgs and Women: The Reinvention of Nature. New York: Routledge, 1991. Ito, Mizuko, Daisuke Okabe, and Misa Matsuda. Personal, Portable Pedestrian. Cambridge, Mass.: MIT Press, 2005. Harvey Jones, H., and J.H. Soltren. “Facebook: Threats to Privacy.” MIT, Dec. 2005. 6 Feb. 2007 http://www.swiss.ai.mit.edu/6.805/student-papers/fall05-papers/ facebook.pdf>. Licoppe, Christian, and J.P. Heurtin. “Managing One’s Availability to Telephone Communication through Mobile Phones.” Personal and Ubiquitous Computing 5 (201): 99-108. Miller, Daniel, and Don Slater. The Internet: An Ethnographic Approach. Oxford: Berg, 2000. Muller, D. “Y Bother? This Generation Inhabits a Different World.” Sydney Morning Herald 3 Oct. 2006. Prensky, M. “The Emerging Online Life of the Digital Native.” Marcprensky.com 2004. 2 Jan. 2007 http://www.marcprensky.com/writing/default.asp>. Standage, T. “Your Television Is Ringing.” The Economist: A Special Report on the Future of Telecoms. 14-20 Oct. 2006. Turkle, S. Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster, 1995. Urry, John. “Mobile Sociology.” British Journal of Sociology 51.1 (2000): 185-203. White, M. “Television and Internet Differences by Design.” Convergence: The International Journal of Research into New Media Technologies 12.3 (2006): 341-355. Citation reference for this article MLA Style Hardey, Mariann. "Going Live: Converging Mobile Technology and the Sociability of the iGeneration." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/09-hardey.php>. APA Style Hardey, M. (Mar. 2007) "Going Live: Converging Mobile Technology and the Sociability of the iGeneration," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/09-hardey.php>.
APA, Harvard, Vancouver, ISO, and other styles
42

Hancox, Donna. "Stories with Impact: The Potential of Storytelling to Contribute to Cultural Research and Social Inclusion." M/C Journal 14, no. 6 (November 18, 2011). http://dx.doi.org/10.5204/mcj.439.

Full text
Abstract:
Our capacity to tell stories is a skill that can be considered both natural and learned. Storytelling and oral history are parts of all human societies, and we seek to understand ourselves and each other through our stories. Our individual and collective memories collide in our stories, and reconcile to construct what Kansteiner calls our "collectively shared representations of the past" (182). It is our personal narratives that are the building blocks to public understanding, and as Harter, Japp and Beck maintain in Narratives, Health and Healing, "narrative is a fundamental human way of giving meaning to experience" (3). Adding to this idea of narrative as way of illuminating meaning, Goodall posits narrative as also being a way of knowing and as a research methodology, stating "narrative provides us with a range of forms and styles for discovering meaning and communicating it to readers through stories. It is an epistemology" (13). This re-imaging and re-purposing of narrative and storytelling has the capacity to significantly influence and shift the ways in which cultural and social research is carried out. This emerging approach can also influence the ways we understand the experiences of marginalised groups, and consequently how we respond to issues around social inclusion through policy and community based solutions. For researchers personal stories and narratives have the capacity to illuminate the nuances of broad issues; this potential also means that seemingly intractable social problems are given a human face with which to engage. It is in this way that personal narratives energise public narratives and shape our ways of thinking and collective understandings (Harter et al. 4). This paper investigates a digital storytelling project conducted in late 2009 with a group of Forgotten Australians in the months leading up to the public apology in the Australian Parliament, and how the personal stories of the participants brought to life previous research about the marginalisation of individuals who had experienced out-of-home care as children. This paper also explores how the endemic, institutionalised abuse of a group of people was translated to the broader community and galvanised support through the impact of their personal stories. Digital Storytelling As a dynamic practice storytelling, in all its forms, must be nurtured and developed if it is to contribute to the lives of individuals and communities. The number of storytelling, and in particular digital storytelling, initiatives and projects in Australia has increased rapidly since the early 2000s, and are utilised by various public and community organisations for a variety of reasons. Digital technology has had a profound impact on the ability for "ordinary" people to tell their stories, and research has identified the potential of digital storytelling in these contexts to assist in the representation of multiple voices and viewpoints in society through inclusive processes of co-creation (cf. see Burgess; Hartley, Uses and "TV"; Klaebe and Burgess). The storytelling project that forms the basis for this paper used some traditional written storytelling practices but was mainly concerned with digital storytelling. Digital stories are generally a two to four minute multi-media story that uses photographs, film and drawings to convey a personal story which the author narrates in their own voice over the series of images. Much has been, and continues to be written, about digital storytelling as a site of participatory culture and as a means of improving digital literacy in pockets of the community traditionally absent in the realm of digital citizenship (cf. Hartley, Uses; Hartley and McWilliam; Burgess; Meadows; Lundby). As Hartley points out digital storytelling has become such a compelling medium in which to record stories in communities because it "fills a gap between everyday cultural practice and professional media" (Uses 122). As a means of creating narratives digital storytelling has proven to be a significant mode, due in part to its ability to reach a large number of people relatively easily. The rise of digital storytelling partially mirrors the broad shift towards more participatory online culture that privileges user generated content and ordinary voices over official content. The origins of digital storytelling lie in a response to the absence of "ordinary" voices in mainstream media and policy making and grew with the increasing affordability of digital technology. The potential for social inclusion and participation along with the promise of self-representation is implicit in the discourse surrounding digital storytelling. "The ability to express oneself in digital media and in the case of digital storytelling using digital video editing, has become a central literary for full participation in society" (Lambert 85). Social Inclusion in an Australian context is defined by the Australian Government as all Australians feeling valued and having "the opportunity to participate fully in the life of our society. Achieving this vision means that all Australians will have the resources, opportunities and capability to" learn, work, engage in the community and have a voice (Social Inclusion Unit). The aims articulated by Lambert in the previous paragraph and the philosophy of social inclusion and the belief that individual stories have the capacity to impact on national agendas and policy lay at the heart of the digital storytelling project outlined later in this paper. The Forgotten Australians As cohort the Forgotten Australians are defined as individuals who were removed from their families, or were orphaned or child immigrants from the United Kingdom. These children were placed in institutions where they suffered abuse or neglect between 1930 and 1970, and it is estimated that up approximately 500,000 children were placed in out of home care during this time. In November 2009 the Australian Parliament delivered a bi-partisan apology to the Forgotten Australians for the pain and suffering they experienced in church and state run institutions. The stories of the Forgotten Australians were beginning to make their way into the consciousness of the Australian public in the lead up to the apology through documentaries on the national broadcasting service and stories in the mainstream media. Like most large groups the demographic of the Forgotten Australians is diverse, within those who identify as part of this group are successful and well-known Australians, along with ordinary Australians many of whom have struggled significantly as a direct result of their childhood experiences. Those involved in this project were considered to be individuals who were quite profoundly marginalised in mainstream society. A number lived with mental illness, the majority lacked stable housing and all had been severely emotionally, physically and sexually abused during their time in State or Church run institutions as children. The apology to the Forgotten Australians was preceded many years of advocacy and activism by community groups and individuals. They utilised personal stories, the digitisation of records and as the apology drew closer a number of digital storytelling projects to bring the personal narratives into the public arena in the hope of affecting change. Stories from these projects were broadcast across a variety of platforms such as YouTube, the websites for the major advocacy groups and community organisations and more recently the National Library Australia website. The stories differed from site to site and served different functions depending on the place from which they were disseminated. Hildebrand identifies the role of YouTube as a site for the intersection of personal experience, popular culture and historical narratives, and, as such, a vehicle for cultural memory "allow[ing] users to seek out the media texts that have shaped them and that would otherwise be forgotten in 'objective' histories" (54). YouTube videos relevant to the Forgotten Australians ranged from locally made stories and documentation, news items and presentations recorded by major organisations, but uploaded by individuals, and also those posted by these institutions themselves. A notable feature of all of these contributions is their role in the representation of witnesses' stories. In the case of reports on Forgotten Australians from major news organisations the commentary they attracted was largely from those who identified as fellow forgotten Australians attesting to—and corroborating—the interviewees' stories. Whether they were posted by survivors themselves or by mainstream media or other institutions, they exhibited a unity around a particular will to memory: setting the record straight through testimony. Here, the clips and posts were characterised by the provision of information as evidence for the assertion of cultural trauma as a shared experience and focus of identification (Adkins et al. 15). Storytelling functions as one of our most powerful forms for experiencing, expressing, and enacting sorrow and pain...it is pivotal in the process of sense making, allowing individuals to cope with chaotic, equivocal, and confusing conditions of everyday life, including illness and suffering. (152) Advocacy and community groups such as CLAN were focused on creating a sense of community amongst survivors with no story or artefact too small or insignificant to be included, which differed slightly from the agenda of the National Library of Australia—the institution of public memory that has been most closely involved in recording and disseminating the stories of the Forgotten Australians. The Forgotten Australians and Former Child Migrants Oral History Project conducted by the National Library Australia was one of the recommendations of the two Senate Community Affairs References Committee reports following the Senate Inquiries and receives funding from the Commonwealth Department of Families, Housing, Community Services and Indigenous Affairs. According to the National Library Australia website, this oral history project will run for three years and aims to document a rounded history of the experiences of the children in institutional care and the lifelong impact of these experiences on their lives and their families. This project will also interview a selection of advocates, and allied professionals including welfare officers, employees of institutions and administrators. (Project Team) In many important ways the purposes served in this project were those of the governments—previous and present, which was to capture and keep the stories, memories, documents and artefacts, and to share the officially selected stories with the rest of the nation, and those stories would support and affirm the government's roadmap for moving on from the apology. These digital storytelling projects, to varying degrees and levels of impact, served to provide the public with the personal narratives behind the issue being presented in the media and by advocacy groups as a large scale issue concerning hundreds of thousands of victims. Although the sheer size of the numbers of children affected was confronting, it was the personal stories that created a momentum towards the public apology. The findings of both Senate Inquiries recommended a formal apology; however this did not occur until the individual experiences of the Forgotten Australians were translated and represented in narratives and, through this, the construction of a sense of cultural memory resulting in formal recognition. Many Australians were sceptical about the importance of a public apology to the Forgotten Australians, as they had been of the apology to the Stolen Generation in 2008. To be a genuine act of reconciliation an apology requires the act of listening as much as speaking, fittingly Prime Minister Rudd quoted predominantly from personal oral history testimonies that had been collected over the years and that were of public record, but had not been digitally accessible to all, as many stories now are in the Bringing Them Home report. The Case Study In August 2009 I was funded by the Australasian Centre for Interactive Design (ACID) to conduct a series of digital storytelling and writing workshops in conjunction with Micah Projects, a community building and social justice organisation based in Brisbane. Micah delivers services for people experiencing homelessness, runs programmes for young mothers and is responsible for the Historical Abuse Network which is a network servicing the Forgotten Australians. After some discussion with the CEO of Micah it was decided that the clients involved with the Historical Abuse Network would benefit most from this project. Many of the participants had been involved in the 2003 senate inquiry into the treatment of children in institutional care. In the intervening years they had told the story of their abuse many times in official contexts and provided statements of harm for the inquiry. However, for this project we wanted to encourage the participants to create stories that allowed them some agency in their own lives rather, to re-claim some of their story from the official framework of abuse, and to use digital storytelling as a tool for this. The participants were between 45 and 65 in age, and were divided equally between women and men. There were a number of complexities inherent in this project, some of which were specific to this particular cohort and some specific to all marginalised individuals and groups. The most significant problem arose out the expectation that the "authors" will bring with them photographs and keepsakes from their lives to use in the stories. Many of the participants did not have photographs of their childhoods or of their families; some did not know how old they were (in many institutions all birthdays were celebrated on a single day, and consequently most lost track of their age and birth date) or had not had contact with their biological family for decades and as a result had few keepsakes. These hallmarks of legitimate biography were absent from their pasts and their presents. The combination of these factors meant that for many the ability to create a coherent narrative about their life or to feel ownership over their life had been seriously compromised. However, it became apparent that by using sounds and images in the digital story the technology was able to create a materiality out of memory for the participants. As it became clearer that the foundation of the stories was memory rather than a narrative arc, the more it became imperative to embrace the fragmentation, inconsistency and incoherence of the memories, and to incorporate these aspects into the digital stories. Instead of being easy to follow or emotionally satisfying narratives, some of the stories had much more in common with what is referred to in psychology and health frameworks as "chaos narratives". A chaos narrative has a sense of disconnected events characterised by a lack of closure and the presence of day-to-day uncertainty (Harter 4). Often such stories seem too incoherent to be told and too painful to be heard by others, as was certainly the case with some of the stories created for this project. Conclusion The Finding a Voice digital storytelling project led by Professor Jo Tacchi aligns with the aims of this project in its social innovation, and the role of storytelling and voice as having the genuine potential to impact on the understanding of poverty and disadvantage. Tacchi states that it "is an approach that allows those who are living in conditions that might constitute 'poverty' to tell those who are not what this experience is like, in their own words. Such an approach might challenge our 'expert' conceptions of poverty itself" (170), and confront mainstream or approved versions of social issues. Carabas posits that the agency embedded in the narrative act reforms or reframes the meanings of events through counter narratives and the act of telling transformed personal and social suffering. Those who had been objects of other's reports started to tell their own stories and rewrite official history in the first person singular (154). For the Forgotten Australians, those involved in this project and in similar ones the opportunity to tell their stories in their own words allowed them to push past the detached, impersonal representation of their experiences. Instead they could re-position the debate to being about individuals and the effect of government policy on their lives, and in doing so agitate for a formal apology. Storytelling and narrative as a research methodology, and as a way of knowing, is continuing to be refined by social and cultural researchers and by community organisations. Despite the emerging and nebulous nature of this field one thing is clear: our human desire to tell stories has the ability to be harnessed to build narratives which create understanding and insight and consequently demand that as communities and nations we respond to injustice and disadvantage accordingly. References Adkins, Barbara, Donna Hancox, and Helen Klaebe. "The Role of the Internet and Digital Technologies in the Struggle for Recognition of the Forgotten Australians." Proceedings of the A Decade in Internet Time: OII Symposium on the Dynamics of the Internet and Society, 21-24 September 2011. Oxford U of Oxford, 2011: 1-23. Burgess, Jean. "Hearing Ordinary Voices: Cultural Studies, Vernacular Creativity and Digital Storytelling." Continuum 20.2 (2006): 201-14. Carabas, Teodora, and Lynn Harter. "State-Induced Illness and Forbidden Stories: The Role of Storytelling in Healing, Individual and Social Traumas in Romania." Narratives, Health and Healing. Eds. Lynn Harter, Linda Japp, and Christina Beck. New York: Taylor and Francis, 2005. 149-69. Harter, Lynn, Linda Japp, and Christina Beck, eds. Narratives, Health & Healing. New York: Taylor & Francis. 2005. Hartley, John. "TV Stories: From Representation to Productivity." Story Circle: Digital Storytelling around the World. Eds. John Hartley and Kelly McWilliam. Oxford: Blackwell, 2009. 16-37.———. Uses of Digital Literacy. St. Lucia: U of Queensland P. 2009. Hildebrand, Lucas. "YouTube: Where Cultural Memory and Copyright Converge." Film Quarterly 61.1 (2007): 48-57. Kansteiner, Wolf. "Finding Meaning in Memory: A Methodological Critique of Collective Memory Studies." History & Theory 41 (2002): 179-97. Klaebe, Helen, and Jean Burgess. "Mediatisation and Institutions of Public Memory: Digital Storytelling and the Apology." Australian Historical Studies 41 (2002): 149-65. Lambert, Joe. "Where It All Started: The Centre of Digital Storytelling in California." Story Circle: Digital Storytelling around the World. Eds. John Hartley and Kelly McWilliam. Oxford: Blackwell, 2010. 79-90. Lundby, Kunt. Digital Storytelling, Mediatized Stories: Self-Representations in New Media. New York: Peter Lang, 2008. Meadows, Daniel. "Digital Storytelling - Research Based Practice in New Media." Visual Communication 2.2 (2003): 189-93. McWilliam, Kelly. "The Global Diffusion of a Community Media Practice: Digital Storytelling Online." Eds. John Hartley and Kelly McWilliam. Oxford: Blackwell, 2010. 37-77. Project Team. "Forgotten Australians and Former Child Migrants Oral History Project." National Library of Australia. 16 Sep. 2011 ‹http://www.nla.gov.au/oral-history/forgotten-australians-and-former-child-migrants-oral-history-project›. Social Inclusion Unit. "The Social Inclusion Agenda." Social Inclusion. Australian Government, 2011. 19 Sep. 2011 ‹http://www.socialinclusion.gov.au/›. Tacchi, Jo. "Finding a Voice: Participatory Development in Southeast Asia." Story Circle: Digital Storytelling around the World. Eds. John Hartley and Kelly McWilliam. Oxford: Blackwell, 2009. 167-75.
APA, Harvard, Vancouver, ISO, and other styles
43

Goggin, Gerard. "Broadband." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2219.

Full text
Abstract:
Connecting I’ve moved house on the weekend, closer to the centre of an Australian capital city. I had recently signed up for broadband, with a major Australian Internet company (my first contact, cf. Turner). Now I am the proud owner of a larger modem than I have ever owned: a white cable modem. I gaze out into our new street: two thick black cables cosseted in silver wire. I am relieved. My new home is located in one of those streets, double-cabled by Telstra and Optus in the data-rush of the mid-1990s. Otherwise, I’d be moth-balling the cable modem, and the thrill of my data percolating down coaxial cable. And it would be off to the computer supermarket to buy an ASDL modem, then to pick a provider, to squeeze some twenty-first century connectivity out of old copper (the phone network our grandparents and great-grandparents built). If I still lived in the country, or the outskirts of the city, or anywhere else more than four kilometres from the phone exchange, and somewhere that cable pay TV will never reach, it would be a dish for me — satellite. Our digital lives are premised upon infrastructure, the networks through which we shape what we do, fashion the meanings of our customs and practices, and exchange signs with others. Infrastructure is not simply the material or the technical (Lamberton), but it is the dense, fibrous knotting together of social visions, cultural resources, individual desires, and connections. No more can one easily discern between ‘society’ and ‘technology’, ‘carriage’ and ‘content’, ‘base’ and ‘superstructure’, or ‘infrastructure’ and ‘applications’ (or ‘services’ or ‘content’). To understand telecommunications in action, or the vectors of fibre, we need to consider the long and heterogeneous list of links among different human and non-human actors — the long networks, to take Bruno Latour’s evocative concept, that confect our broadband networks (Latour). The co-ordinates of our infrastructure still build on a century-long history of telecommunications networks, on the nineteenth-century centrality of telegraphy preceding this, and on the histories of the public and private so inscribed. Yet we are in the midst of a long, slow dismantling of the posts-telegraph-telephone (PTT) model of the monopoly carrier for each nation that dominated the twentieth century, with its deep colonial foundations. Instead our New World Information and Communication Order is not the decolonising UNESCO vision of the late 1970s and early 1980s (MacBride, Maitland). Rather it is the neoliberal, free trade, market access model, its symbol the 1984 US judicial decision to require the break-up of AT&T and the UK legislation in the same year that underpinned the Thatcherite twin move to privatize British Telecom and introduce telecommunications competition. Between 1984 and 1999, 110 telecommunications companies were privatized, and the ‘acquisition of privatized PTOs [public telecommunications operators] by European and American operators does follow colonial lines’ (Winseck 396; see also Mody, Bauer & Straubhaar). The competitive market has now been uneasily installed as the paradigm for convergent communications networks, not least with the World Trade Organisation’s 1994 General Agreement on Trade in Services and Annex on Telecommunications. As the citizen is recast as consumer and customer (Goggin, ‘Citizens and Beyond’), we rethink our cultural and political axioms as well as the axes that orient our understandings in this area. Information might travel close to the speed of light, and we might fantasise about optical fibre to the home (or pillow), but our terrain, our band where the struggle lies today, is narrower than we wish. Begging for broadband, it seems, is a long way from warchalking for WiFi. Policy Circuits The dreary everyday business of getting connected plugs the individual netizen into a tangled mess of policy circuits, as much as tricky network negotiations. Broadband in mid-2003 in Australia is a curious chimera, welded together from a patchwork of technologies, old and newer communications industries, emerging economies and patterns of use. Broadband conjures up grander visions, however, of communication and cultural cornucopia. Broadband is high-speed, high-bandwidth, ‘always-on’, networked communications. People can send and receive video, engage in multimedia exchanges of all sorts, make the most of online education, realise the vision of home-based work and trading, have access to telemedicine, and entertainment. Broadband really entered the lexicon with the mass takeup of the Internet in the early to mid-1990s, and with the debates about something called the ‘information superhighway’. The rise of the Internet, the deregulation of telecommunications, and the involuted convergence of communications and media technologies saw broadband positioned at the centre of policy debates nearly a decade ago. In 1993-1994, Australia had its Broadband Services Expert Group (BSEG), established by the then Labor government. The BSEG was charged with inquiring into ‘issues relating to the delivery of broadband services to homes, schools and businesses’. Stung by criticisms of elite composition (a narrow membership, with only one woman among its twelve members, and no consumer or citizen group representation), the BSEG was prompted into wider public discussion and consultation (Goggin & Newell). The then Bureau of Transport and Communications Economics (BTCE), since transmogrified into the Communications Research Unit of the Department of Communications, Information Technology and the Arts (DCITA), conducted its large-scale Communications Futures Project (BTCE and Luck). The BSEG Final report posed the question starkly: As a society we have choices to make. If we ignore the opportunities we run the risk of being left behind as other countries introduce new services and make themselves more competitive: we will become consumers of other countries’ content, culture and technologies rather than our own. Or we could adopt new technologies at any cost…This report puts forward a different approach, one based on developing a new, user-oriented strategy for communications. The emphasis will be on communication among people... (BSEG v) The BSEG proposed a ‘National Strategy for New Communications Networks’ based on three aspects: education and community access, industry development, and the role of government (BSEG x). Ironically, while the nation, or at least its policy elites, pondered the weighty question of broadband, Australia’s two largest telcos were doing it. The commercial decision of Telstra/Foxtel and Optus Vision, and their various television partners, was to nail their colours (black) to the mast, or rather telegraph pole, and to lay cable in the major capital cities. In fact, they duplicated the infrastructure in cities such as Sydney and Melbourne, then deciding it would not be profitable to cable up even regional centres, let alone small country towns or settlements. As Terry Flew and Christina Spurgeon observe: This wasteful duplication contrasted with many other parts of the country that would never have access to this infrastructure, or to the social and economic benefits that it was perceived to deliver. (Flew & Spurgeon 72) The implications of this decision for Australia’s telecommunications and television were profound, but there was little, if any, public input into this. Then Minister Michael Lee was very proud of his anti-siphoning list of programs, such as national sporting events, that would remain on free-to-air television rather than screen on pay, but was unwilling, or unable, to develop policy on broadband and pay TV cable infrastructure (on the ironies of Australia’s television history, see Given’s masterly account). During this period also, it may be remembered, Australia’s Internet was being passed into private hands, with the tendering out of AARNET (see Spurgeon for discussion). No such national strategy on broadband really emerged in the intervening years, nor has the market provided integrated, accessible broadband services. In 1997, landmark telecommunications legislation was enacted that provided a comprehensive framework for competition in telecommunications, as well as consolidating and extending consumer protection, universal service, customer service standards, and other reforms (CLC). Carrier and reseller competition had commenced in 1991, and the 1997 legislation gave it further impetus. Effective competition is now well established in long distance telephone markets, and in mobiles. Rivalrous competition exists in the market for local-call services, though viable alternatives to Telstra’s dominance are still few (Fels). Broadband too is an area where there is symbolic rivalry rather than effective competition. This is most visible in advertised ADSL offerings in large cities, yet most of the infrastructure for these services is comprised by Telstra’s copper, fixed-line network. Facilities-based duopoly competition exists principally where Telstra/Foxtel and Optus cable networks have been laid, though there are quite a number of ventures underway by regional telcos, power companies, and, most substantial perhaps, the ACT government’s TransACT broadband network. Policymakers and industry have been greatly concerned about what they see as slow takeup of broadband, compared to other countries, and by barriers to broadband competition and access to ‘bottleneck’ facilities (such as Telstra or Optus’s networks) by potential competitors. The government has alternated between trying to talk up broadband benefits and rates of take up and recognising the real difficulties Australia faces as a large country with a relative small and dispersed population. In March 2003, Minister Alston directed the ACCC to implement new monitoring and reporting arrangements on competition in the broadband industry. A key site for discussion of these matters has been the competition policy institution, the Australian Competition and Consumer Commission, and its various inquiries, reports, and considerations (consult ACCC’s telecommunications homepage at http://www.accc.gov.au/telco/fs-telecom.htm). Another key site has been the Productivity Commission (http://www.pc.gov.au), while a third is the National Office on the Information Economy (NOIE - http://www.noie.gov.au/projects/access/access/broadband1.htm). Others have questioned whether even the most perfectly competitive market in broadband will actually provide access to citizens and consumers. A great deal of work on this issue has been undertaken by DCITA, NOIE, the regulators, and industry bodies, not to mention consumer and public interest groups. Since 1997, there have been a number of governmental inquiries undertaken or in progress concerning the takeup of broadband and networked new media (for example, a House of Representatives Wireless Broadband Inquiry), as well as important inquiries into the still most strategically important of Australia’s companies in this area, Telstra. Much of this effort on an ersatz broadband policy has been piecemeal and fragmented. There are fundamental difficulties with the large size of the Australian continent and its harsh terrain, the small size of the Australian market, the number of providers, and the dominant position effectively still held by Telstra, as well as Singtel Optus (Optus’s previous overseas investors included Cable & Wireless and Bell South), and the larger telecommunications and Internet companies (such as Ozemail). Many consumers living in metropolitan Australia still face real difficulties in realising the slogan ‘bandwidth for all’, but the situation in parts of rural Australia is far worse. Satellite ‘broadband’ solutions are available, through Telstra Countrywide or other providers, but these offer limited two-way interactivity. Data can be received at reasonable speeds (though at far lower data rates than how ‘broadband’ used to be defined), but can only be sent at far slower rates (Goggin, Rural Communities Online). The cultural implications of these digital constraints may well be considerable. Computer gamers, for instance, are frustrated by slow return paths. In this light, the final report of the January 2003 Broadband Advisory Group (BAG) is very timely. The BAG report opens with a broadband rhapsody: Broadband communications technologies can deliver substantial economic and social benefits to Australia…As well as producing productivity gains in traditional and new industries, advanced connectivity can enrich community life, particularly in rural and regional areas. It provides the basis for integration of remote communities into national economic, cultural and social life. (BAG 1, 7) Its prescriptions include: Australia will be a world leader in the availability and effective use of broadband...and to capture the economic and social benefits of broadband connectivity...Broadband should be available to all Australians at fair and reasonable prices…Market arrangements should be pro-competitive and encourage investment...The Government should adopt a National Broadband Strategy (BAG 1) And, like its predecessor nine years earlier, the BAG report does make reference to a national broadband strategy aiming to maximise “choice in work and recreation activities available to all Australians independent of location, background, age or interests” (17). However, the idea of a national broadband strategy is not something the BAG really comes to grips with. The final report is keen on encouraging broadband adoption, but not explicit on how barriers to broadband can be addressed. Perhaps this is not surprising given that the membership of the BAG, dominated by representatives of large corporations and senior bureaucrats was even less representative than its BSEG predecessor. Some months after the BAG report, the Federal government did declare a broadband strategy. It did so, intriguingly enough, under the rubric of its response to the Regional Telecommunications Inquiry report (Estens), the second inquiry responsible for reassuring citizens nervous about the full-privatisation of Telstra (the first inquiry being Besley). The government’s grand $142.8 million National Broadband Strategy focusses on the ‘broadband needs of regional Australians, in partnership with all levels of government’ (Alston, ‘National Broadband Strategy’). Among other things, the government claims that the Strategy will result in “improved outcomes in terms of services and prices for regional broadband access; [and] the development of national broadband infrastructure assets.” (Alston, ‘National Broadband Strategy’) At the same time, the government announced an overall response to the Estens Inquiry, with specific safeguards for Telstra’s role in regional communications — a preliminary to the full Telstra sale (Alston, ‘Future Proofing’). Less publicised was the government’s further initiative in indigenous telecommunications, complementing its Telecommunications Action Plan for Remote Indigenous Communities (DCITA). Indigenous people, it can be argued, were never really contemplated as citizens with the ken of the universal service policy taken to underpin the twentieth-century government monopoly PTT project. In Australia during the deregulatory and re-regulatory 1990s, there was a great reluctance on the part of Labor and Coalition Federal governments, Telstra and other industry participants, even to research issues of access to and use of telecommunications by indigenous communicators. Telstra, and to a lesser extent Optus (who had purchased AUSSAT as part of their licence arrangements), shrouded the issue of indigenous communications in mystery that policymakers were very reluctant to uncover, let alone systematically address. Then regulator, the Australian Telecommunications Authority (AUSTEL), had raised grave concerns about indigenous telecommunications access in its 1991 Rural Communications inquiry. However, there was no government consideration of, nor research upon, these issues until Alston commissioned a study in 2001 — the basis for the TAPRIC strategy (DCITA). The elision of indigenous telecommunications from mainstream industry and government policy is all the more puzzling, if one considers the extraordinarily varied and significant experiments by indigenous Australians in telecommunications and Internet (not least in the early work of the Tanami community, made famous in media and cultural studies by the writings of anthropologist Eric Michaels). While the government’s mid-2003 moves on a ‘National Broadband Strategy’ attend to some details of the broadband predicament, they fall well short of an integrated framework that grasps the shortcomings of the neoliberal communications model. The funding offered is a token amount. The view from the seat of government is a glance from the rear-view mirror: taking a snapshot of rural communications in the years 2000-2002 and projecting this tableau into a safety-net ‘future proofing’ for the inevitable turning away of a fully-privately-owned Telstra from its previously universal, ‘carrier of last resort’ responsibilities. In this aetiolated, residualist policy gaze, citizens remain constructed as consumers in a very narrow sense in this incremental, quietist version of state securing of market arrangements. What is missing is any more expansive notion of citizens, their varied needs, expectations, uses, and cultural imaginings of ‘always on’ broadband networks. Hybrid Networks “Most people on earth will eventually have access to networks that are all switched, interactive, and broadband”, wrote Frances Cairncross in 1998. ‘Eventually’ is a very appropriate word to describe the parlous state of broadband technology implementation. Broadband is in a slow state of evolution and invention. The story of broadband so far underscores the predicament for Australian access to bandwidth, when we lack any comprehensive, integrated, effective, and fair policy in communications and information technology. We have only begun to experiment with broadband technologies and understand their evolving uses, cultural forms, and the sense in which they rework us as subjects. Our communications networks are not superhighways, to invoke an enduring artefact from an older technology. Nor any longer are they a single ‘public’ switched telecommunications network, like those presided over by the post-telegraph-telephone monopolies of old. Like roads themselves, or the nascent postal system of the sixteenth century, broadband is a patchwork quilt. The ‘fibre’ of our communications networks is hybrid. To be sure, powerful corporations dominate, like the Tassis or Taxis who served as postmasters to the Habsburg emperors (Briggs & Burke 25). Activating broadband today provides a perspective on the path dependency of technology history, and how we can open up new threads of a communications fabric. Our options for transforming our multitudinous networked lives emerge as much from everyday tactics and strategies as they do from grander schemes and unifying policies. We may care to reflect on the waning potential for nation-building technology, in the wake of globalisation. We no longer gather our imagined community around a Community Telephone Plan as it was called in 1960 (Barr, Moyal, and PMG). Yet we do require national and international strategies to get and stay connected (Barr), ideas and funding that concretely address the wider dimensions of access and use. We do need to debate the respective roles of Telstra, the state, community initiatives, and industry competition in fair telecommunications futures. Networks have global reach and require global and national integration. Here vision, co-ordination, and resources are urgently required for our commonweal and moral fibre. To feel the width of the band we desire, we need to plug into and activate the policy circuits. Thanks to Grayson Cooke, Patrick Lichty, Ned Rossiter, John Pace, and an anonymous reviewer for helpful comments. Works Cited Alston, Richard. ‘ “Future Proofing” Regional Communications.’ Department of Communications, Information Technology and the Arts, Canberra, 2003. 17 July 2003 <http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115485,00.php> —. ‘A National Broadband Strategy.’ Department of Communications, Information Technology and the Arts, Canberra, 2003. 17 July 2003 <http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115486,00.php>. Australian Competition and Consumer Commission (ACCC). Broadband Services Report March 2003. Canberra: ACCC, 2003. 17 July 2003 <http://www.accc.gov.au/telco/fs-telecom.htm>. —. Emerging Market Structures in the Communications Sector. Canberra: ACCC, 2003. 15 July 2003 <http://www.accc.gov.au/pubs/publications/utilities/telecommu... ...nications/Emerg_mar_struc.doc>. Barr, Trevor. new media.com: The Changing Face of Australia’s Media and Telecommunications. Sydney: Allen & Unwin, 2000. Besley, Tim (Telecommunications Service Inquiry). Connecting Australia: Telecommunications Service Inquiry. Canberra: Department of Information, Communications and the Arts, 2000. 17 July 2003 <http://www.telinquiry.gov.au/final_report.php>. Briggs, Asa, and Burke, Peter. A Social History of the Internet: From Gutenberg to the Internet. Cambridge: Polity, 2002. Broadband Advisory Group. Australia’s Broadband Connectivity: The Broadband Advisory Group’s Report to Government. Melbourne: National Office on the Information Economy, 2003. 15 July 2003 <http://www.noie.gov.au/publications/NOIE/BAG/report/index.htm>. Broadband Services Expert Group. Networking Australia’s Future: Final Report. Canberra: Australian Government Publishing Service (AGPS), 1994. Bureau of Transport and Communications Economics (BTCE). Communications Futures Final Project. Canberra: AGPS, 1994. Cairncross, Frances. The Death of Distance: How the Communications Revolution Will Change Our Lives. London: Orion Business Books, 1997. Communications Law Centre (CLC). Australian Telecommunications Regulation: The Communications Law Centre Guide. 2nd edition. Sydney: Communications Law Centre, University of NSW, 2001. Department of Communications, Information Technology and the Arts (DCITA). Telecommunications Action Plan for Remote Indigenous Communities: Report on the Strategic Study for Improving Telecommunications in Remote Indigenous Communities. Canberra: DCITA, 2002. Estens, D. Connecting Regional Australia: The Report of the Regional Telecommunications Inquiry. Canberra: DCITA, 2002. <http://www.telinquiry.gov.au/rti-report.php>, accessed 17 July 2003. Fels, Alan. ‘Competition in Telecommunications’, speech to Australian Telecommunications Users Group 19th Annual Conference. 6 March, 2003, Sydney. <http://www.accc.gov.au/speeches/2003/Fels_ATUG_6March03.doc>, accessed 15 July 2003. Flew, Terry, and Spurgeon, Christina. ‘Television After Broadcasting’. In The Australian TV Book. Ed. Graeme Turner and Stuart Cunningham. Allen & Unwin, Sydney. 69-85. 2000. Given, Jock. Turning Off the Television. Sydney: UNSW Press, 2003. Goggin, Gerard. ‘Citizens and Beyond: Universal service in the Twilight of the Nation-State.’ In All Connected?: Universal Service in Telecommunications, ed. Bruce Langtry. Melbourne: University of Melbourne Press, 1998. 49-77 —. Rural Communities Online: Networking to link Consumers to Providers. Melbourne: Telstra Consumer Consultative Council, 2003. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Disability in New Media. Lanham, MD: Rowman & Littlefield, 2003. House of Representatives Standing Committee on Communications, Information Technology and the Arts (HoR). Connecting Australia!: Wireless Broadband. Report of Inquiry into Wireless Broadband Technologies. Canberra: Parliament House, 2002. <http://www.aph.gov.au/house/committee/cita/Wbt/report.htm>, accessed 17 July 2003. Lamberton, Don. ‘A Telecommunications Infrastructure is Not an Information Infrastructure’. Prometheus: Journal of Issues in Technological Change, Innovation, Information Economics, Communication and Science Policy 14 (1996): 31-38. Latour, Bruno. Science in Action: How to Follow Scientists and Engineers Through Society. Cambridge, MA: Harvard University Press, 1987. Luck, David. ‘Revisiting the Future: Assessing the 1994 BTCE communications futures project.’ Media International Australia 96 (2000): 109-119. MacBride, Sean (Chair of International Commission for the Study of Communication Problems). Many Voices, One World: Towards a New More Just and More Efficient World Information and Communication Order. Paris: Kegan Page, London. UNESCO, 1980. Maitland Commission (Independent Commission on Worldwide Telecommunications Development). The Missing Link. Geneva: International Telecommunications Union, 1985. Michaels, Eric. Bad Aboriginal Art: Tradition, Media, and Technological Horizons. Sydney: Allen & Unwin, 1994. Mody, Bella, Bauer, Johannes M., and Straubhaar, Joseph D., eds. Telecommunications Politics: Ownership and Control of the Information Highway in Developing Countries. Mahwah, NJ: Erlbaum, 1995. Moyal, Ann. Clear Across Australia: A History of Telecommunications. Melbourne: Thomas Nelson, 1984. Post-Master General’s Department (PMG). Community Telephone Plan for Australia. Melbourne: PMG, 1960. Productivity Commission (PC). Telecommunications Competition Regulation: Inquiry Report. Report No. 16. Melbourne: Productivity Commission, 2001. <http://www.pc.gov.au/inquiry/telecommunications/finalreport/>, accessed 17 July 2003. Spurgeon, Christina. ‘National Culture, Communications and the Information Economy.’ Media International Australia 87 (1998): 23-34. Turner, Graeme. ‘First Contact: coming to terms with the cable guy.’ UTS Review 3 (1997): 109-21. Winseck, Dwayne. ‘Wired Cities and Transnational Communications: New Forms of Governance for Telecommunications and the New Media’. In The Handbook of New Media: Social Shaping and Consequences of ICTs, ed. Leah A. Lievrouw and Sonia Livingstone. London: Sage, 2002. 393-409. World Trade Organisation. General Agreement on Trade in Services: Annex on Telecommunications. Geneva: World Trade Organisation, 1994. 17 July 2003 <http://www.wto.org/english/tratop_e/serv_e/12-tel_e.htm>. —. Fourth protocol to the General Agreement on Trade in Services. Geneva: World Trade Organisation. 17 July 2003 <http://www.wto.org/english/tratop_e/serv_e/4prote_e.htm>. Links http://www.accc.gov.au/pubs/publications/utilities/telecommunications/Emerg_mar_struc.doc http://www.accc.gov.au/speeches/2003/Fels_ATUG_6March03.doc http://www.accc.gov.au/telco/fs-telecom.htm http://www.aph.gov.au/house/committee/cita/Wbt/report.htm http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115485,00.html http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115486,00.html http://www.noie.gov.au/projects/access/access/broadband1.htm http://www.noie.gov.au/publications/NOIE/BAG/report/index.htm http://www.pc.gov.au http://www.pc.gov.au/inquiry/telecommunications/finalreport/ http://www.telinquiry.gov.au/final_report.html http://www.telinquiry.gov.au/rti-report.html http://www.wto.org/english/tratop_e/serv_e/12-tel_e.htm http://www.wto.org/english/tratop_e/serv_e/4prote_e.htm Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Goggin, Gerard. "Broadband" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/02-featurebroadband.php>. APA Style Goggin, G. (2003, Aug 26). Broadband. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/02-featurebroadband.php>
APA, Harvard, Vancouver, ISO, and other styles
44

Lambert, Anthony, and Elaine Kelly. "Coalition." M/C Journal 13, no. 6 (December 5, 2010). http://dx.doi.org/10.5204/mcj.327.

Full text
Abstract:
"Birds of a feather (and colour) will flock (and fly) together." — Old English Proverb, 1545 (approx) While the notion of the 'coalition' is one normally associated with formalised alliances between political parties, coalitional affiliations are not limited to mainstream politics, and instead share a focus on strategy and outcome across the full range of human endeavours. Parties with varying priorities will put to one side their differences in order to focus on overlapping concerns. Thus coalitions come in all shapes and sizes and cross all walks of life: from families, clubs and teams to friendships, churches and sects, from companies and co-operatives to scientific formula, mathematical groupings and multimedia/multi person online gaming environments. This issue of M/C Journal mounts a timely critical reflection on the multiple contemporary meanings and uses of 'coalition' and coalitional thinking. Some of the questions the authors of this edition have addressed include: how does the notion of coalition inform political practices and powers? How have coalitions changed in recent times? What other (non-political party) coalitions exist and how might they work? How do coalitions inform understandings and expressions of race and whiteness, gender and sexuality, class and poverty, nations and borders? What does it mean to be 'post-coalitional' and how might we map persistence and change in recent political and non-political groupings and collectives? Recent history has revealed large cracks and major shifts in public and political alliances. In Australia for example, November 2007 marked a change in politics and culture that saw the demise of then Prime Minister John Howard and his Coalition government. The coupling of neoliberalism and social conservatism was said to be the hallmark of that government's commitment to 'old Australian values', to severe forms of border control, the refusal of same-sex marriage, scepticism toward climate change, and rapid privatisation policies for public services. The Coalition, it appeared, no longer represented the interests of the public. Since then, the incumbent Labor leader was deposed from within his own party, and Australia’s first female Prime Minister, after having lost a majority, formed a new coalition with smaller parties and independents in order to keep governing. This new coalition came in the wake of Britain’s 2010 election, in which the Conservatives joined with the Liberal Democrats to form the first ever British coalition government, and later was followed by the mid-term resurgence of Republican power in the American Lower House. And of course it was not too long ago that the ‘coalition of the willing', as a collective American-led force fighting the war-or-terror, fell apart in the later stages of the Bush administration, and that the 2008 shift in American politics to Barack Obama's presidency became a singular moment of international historical significance. We ask then, as connections to particular coalitions shift, what new affiliations are formed? And which aspects of older coalitions continue in the midst of change? What do regions, nations and individuals do when the groups they belong to fall apart or lose power? Larger coalitional shifts tell us much about culture, history, law, media, technology and human behaviour. As Australia and the Western world continually move away from supporting the power and policy of previously dominant groups, questions emerge as to the nature and ethics of collectives (of all kinds) as the expression of political, social and personal change. And despite these changes, borders are strengthened, and the associated fears of difference and otherness (from racism to war, Islamaphobia to homophobia) continue to reassert themselves across the globe. This logic of coalition is systematically unpacked and interrogated in this edition’s feature essay by Nick Mansfield. In “Coalition: The Politics of Decision”, Mansfield draws upon the work of Jacques Derrida to carefully analyse the implications of coalition for contemporary politics. Coalition can be distinguished from community or family, and is more akin to friendship, according to Mansfield. This is for two fundamental reasons: firstly, coalitions involve “decision”, and secondly, coalitions are always inevitably in relation to enmity. While coalitions start with a gesture of friendship, Mansfield argues via Derrida’s reading of Schmitt, that this category can slip into enemy territory. Mansfield’s paper uses this theoretical framework in order to comment on political action today. Indeed, each of the papers presented in this volume understand and illuminate ‘coalition’ as a critical tool or useful conceptual framework. In this collection, coalition is deployed in a manner which illuminates the relationships between different parties, interest groups, affiliational thinking and behaviours, and even the bodily senses. Coalitions are understood as contesting and reiterating dominant political paradigms and socio-cultural norms. Ann Deslandes, Randall Livingstone and Christopher Phillips bring our attention to the coalitions that contest dominant forms of political power. Deslandes’s thoughtful engagement with the ‘global justice movement’ focuses on the “ethical scene of activist coalition”. Deslandes examines what she terms the three ethics of coalition, risk, prayer and gift. In so doing, she asks important questions of privileged activists, who must risk the possibility of repeating “domination”. In both Livingston and Phillips, the Internet is a primary tool and site for critical engagement. Livingstone’s paper looks at the “virtual coalition” of online editors concerned with combating Western bias on the major Web encyclopaedia Wikipedia: “WikiProject: Countering Systemic Bias”. Since its inception in 2001, Wikipedia has grown in popularity to be one of the most accessed websites available. This research provides much needed insight into the extent to which Western bias frames the information uploaded to Wiki. At a time when there is a temptation to regard the Internet as liberatory, discussion of its uneven political power is significant. After all, as Livingstone reiterates, the Web does not dissolve border and boundaries. Further exploring relations between visibility and democracy. Phillips takes Gailbraith’s A Good Society as a starting point for a discussion of how contemporary coalitions work, and what larger coalitions of previously marginalised or silenced groups might look like. In this way, Phillips asks if Gailbraith’s vision has been borne out in the American context with particular reference to the 2008 Obama campaign’s use of Internet technologies and the more recent rise of the Tea Party to a position of considerable influence. Given the surprising similarities between such opposing forces, might an understanding of the coalitional ground shared by both be possible? An ongoing theme of this edition of M/C is its engagement with the current local/global coalitional and post-coalitional conditions in which people live - from larger contexts of geopolitics through to the micropolitics of everyday practices, pleasures and identifications. Elaine Kelly engages with the changes to land rights legislation in Australia over the past five years, with the Northern Territory Intervention and more recently with the decision by the Labor Party to uphold the nomination of Muckaty as a site for nuclear waste. Kelly extends the discussion of coalition to encompass its etymology – to grow together. Framing her discussing using critical race and whiteness theory, Kelly argues that private and governmental coalitional interests are at play in land rights reform. This in turn reiterates a relationship between neoliberalism and social conservatism which prompts the question: in whose interests is this “growth”?Also in the Australian context, Anthony Lambert’s paper “Rainbow Blindness” filters contemporary government attitudes and legislative change with respect to marriage and same-sex relationships through the effects of recent coalitional changes in the Australian and global political landscape. Lambert argues that the confusion surrounding the issue of gay marriage and the blurring/changes within political positions constitutes Australia as living within a ‘post-coalitional’ framework – one defined by persistence and change, where a new sensibility towards equity and difference is accompanied by the reassertion of larger coalitional affiliations and normative regimes. Duncan McKay’s paper sees a coalitional model of engagement as potentially providing productive possibilities between governmental bodies and the Western Australian Arts community. McKay passionately critiques the WA Department of Culture and the Arts (DCA) policy document Creating Value arguing that it “may be considered that the DCA and many WA cultural producers may not be engaged in the same project at all, let alone be in effective partnership or coalition”. Blair McDonald’s poetic contribution contends that out of a reading of Foucauldian resistance to sexual norms, new coalitions of behaviour and identity may be possible. In a coalitional context, Foucault cannot and does not simply seek to exit the networks of power and sexuality that he himself constructs. In retracing Foucault’s attention to power and sex-desire, the author seeks a movement toward “new coalitions” or “rallying points” at the limits of bodies and pleasures; in the bodies that are as yet ”unformed” and pleasures that are as yet “unknown”. Meanwhile, Lauren Cruikshank’s “Synaestheory: Fleshing Out a Coalition of the Senses” demonstrates how understanding the relationship between senses as coalitional breaks down the Cartesian dominance regarding subjectivity as exemplified by the mind/body split. Cruikshank’s careful analysis also challenges the privileging of vision in Western culture. As noted above, around the world, many new coalitional minority governments have taken power in recent times. In Australia, Christopher Payne of the Liberal Party referred to the negotiations following the August 2010 election (which resulted in a hung parliament) as Labor, the Independents and the Greens “trying to put together a coalition of the mongoose and the cobra” (ABC). Here, Payne attempts to cast doubt over the stability of this sort of coalition, by positing the Greens as the cobra and the Independents as potential pray to be attacked and devoured. More importantly, Payne has referenced, as this collection of papers does, the changeability of coalitions, and the sometimes antagonistic relationships that may need to co-exist in coalitions of all kinds. ReferencesAustralian Broadcasting Authority (ABC) Online News. “Pyne Warns of Labor ‘Mongoose and Cobra Coalition.” 4 Sep. 2010. 1 Dec. 2010 ‹http://www.abc.net.au/news/stories/2010/09/04/3002524.htm›.
APA, Harvard, Vancouver, ISO, and other styles
45

Holloway, Donell Joy, Lelia Green, and Kylie Stevenson. "Digitods: Toddlers, Touch Screens and Australian Family Life." M/C Journal 18, no. 5 (August 20, 2015). http://dx.doi.org/10.5204/mcj.1024.

Full text
Abstract:
Introduction Children are beginning to use digital technologies at younger and younger ages. The emerging trend of very young children (babies, toddlers and pre-schoolers) using Internet connected devices, especially touch screen tablets and smartphones, has elicited polarising opinions from early childhood experts. At present there is little actual research about the risks or benefits of tablet and smartphone use by very young children. Current usage recommendations, based on research into passive television watching which claims that screen time is detrimental, is in conflict with advice from education experts and app developers who commend interactive screen time as engaging and educational. Guidelines from the health professions typically advise strict time limits on very young children’s screen-time. Based for the most part on policy developed by the American Academy of Paediatrics, it is usually recommended that children under two have no screen time at all (Brown), and children over this age have no more than two hours a day (Strasburger, et al.). On the other hand, early childhood education guidelines promote the development of digital literacy skills (Department of Education). Further, education-based research indicates that access to computers and the Internet in the preschool years is associated with overall educational achievement (Bittman et al.; Cavanaugh et al; Judge et al; Neumann). The US based National Association for Education of Young Children’s position statement on technology for zero to eight year-olds declares that “when used intentionally and appropriately, technology and interactive media are effective tools to support learning and development” (NAEYC). This article discusses the notion of Digitods—a name for those children born since the introduction of the iPhone in 2007 who have ready access to touchscreen technologies since birth. It reports on the limited availability of evidence-based research about these children’s ICT use concluding that current research and recommendations are not grounded in the everyday life of very young children and their families. The article then reports on the beginnings of a research project funded by the Australian Research Council entitled Toddlers and Tablets: exploring the risks and benefits 0-5s face online. This research project recognises that at this stage it is parents who “are the real experts in their toddlers’ use of screen technologies. Accordingly, the project’s methodological approach draws on parents, pre-schoolers and their families as communities of practice in the construction of social meaning around toddlers’ use of touch screen technology. Digitods In 2000 Bill Gates introduced the notion of Generation I to describe the first cohort of children raised with the Internet as a reality in their lives. They are those born after the 1990s and will, in most cases; have no memory of life without the Net. [...] Generation I will be able to conceive of the Internet’s possibilities far more profoundly than we can today. This new generation will become agents of change as the limits of the Internet expand to include educational, scientific, and business applications that we cannot even imagine. (Gates)Digitods, on the other hand, is a term that has been used in education literature (Leathers et al.) to describe those children born after the introduction of the iPhone in 2007. These children often begin their lives with ready access to the Internet via easily usable touch screen devices, which could have been designed with toddlers’ touch and swipe movements in mind. Not only are they the youngest group of children to actively engage with the Internet they are the first group to grow up with a range of mobile Internet devices (Leathers et al.). The difference between Digitods and Gates’s Generation I is that Digitods are the first pre-verbal, non-ambulant infants to have ready access to digital technologies. Somewhere around the age of 10 months to fourteen months a baby learns to point with his or her forefinger. At this stage the child is ready to swipe and tap a touch screen (Leathers et al.). This is in contrast to laptops and PCs given that very young children often need assistance to use a mouse or keyboard. The mobility of touch screen devices allows very young children to play at the kitchen table, in the bedroom or on a car trip. These mobile devices have, of course, a myriad of mobile apps to go with them. These apps create an immediacy of access for infants and pre-schoolers who do not need to open a web browser to find their favourite sites. In the lives of these children it seems that it has always been possible to touch and swipe their way into games, books and creative and communicative experiences (Holloway et al. 149). The interactivity of most pre-school apps, as opposed to more passive screen activities such as watching television shows or videos (both offline or online), requires toddlers and pre-schoolers to pay careful attention, think about things and act purposefully (Leathers et al.). It is this interactivity which is the main point of difference, one which holds the potential to engage and educate our youngest children. It should be noted within this discussion about Digitods that, while the trope Digital Natives tends to homogenise an entire generation, the authors do not assume that all children born today are Digitods by default. Many children do not have the same privileged opportunities as others, or the (parental) cultural capital, to enable access, ease of use and digital skill development. In addition to this it is not implied that Digitods will be more tech savvy than their older siblings. The term is used more to describe and distinguish those children who have digital access almost since birth—in order to differentiate or tease out everyday family practices around these children’s ICT use and the possible risks and benefits this access affords babies, toddlers and pre-schoolers. While the term Digital Native has also been criticised as being a white middle class phenomenon this is not necessarily the case with Digitods. In the Southeast Asia and the Pacific region developed countries like Japan, Korea, New Zealand and Singapore have extremely high rates of touchscreen use by very young children (Child Sciences; Jie; Goh; Unantenne). Other countries such as the Philippines and Indonesia have moved to a high smart phone usage by very young children while at the same time have only nascent ICT access and instruction within their education systems (Unantenne). The Digitod Parent Parents of Digitods are usually experienced Internet users themselves, and many are comfortable with their children using these child-friendly touch screen devices (Findahl). Digital technologies are integral to their everyday lives, often making daily life easier and improving communication with family and friends, even during the high pressure parenting years of raising toddlers and pre-schoolers. Even though many parents and caregivers are enabling very young children’s use of touch screen technologies, they are also concerned about the changes they are making. This is because very young children’s use of touch screen devices “has become another area where they fear possible criticism and in which their parental practices risk negative evaluation by others” (Holloway et al). The tensions between expert advice regarding young children’s screen-time and parents’ and caregivers’ own judgments are also being played out online. Parenting blogs, online magazines and discussion groups are all joining in the debate: On the one hand, parents want their children to swim expertly in the digital stream that they will have to navigate all their lives; on the other hand, they fear that too much digital media, too early, will sink them. Parents end up treating tablets like precision surgical instruments, gadgets that might perform miracles for their child’s IQ and help him win some nifty robotics competition—but only if they are used just so. (Rosin)Thus, with over 80 000 children’s apps marketed as educational in the Apple App Store alone, parents can find it difficult to choose apps that are worth purchasing (Yelland). Nonetheless, recent research regarding Australian children shows that three to five year olds who access touch screen devices will typically have five or more specific apps to choose from (5.23 on average) (Neumann). With little credible evidence or considered debate, parents have been left to make their own choices about the pros and cons of their young children’s access to touch screens. Nonetheless, one immediate benefit that comes to mind is toddlers and pre-schoolers video chatting with dispersed family member—due to increased globalisation, guest worker arrangements, FIFO (fly-in fly-out) workforces and family separation or divorce. Such clear benefits around sociability and youngsters’ connection with significant others make previous screen-related guidelines out of date and no longer contextually relevant. Little Research Attention Family ownership of tablet devices as well as touch screen phones has risen dramatically in the last five years. With very young children being loaned these technologies by mum or dad, and a tendency in Australia to rely on market-orientated research regarding ownership and usage, there is very little knowledge about touch screen usage rates for very young Australian children. UK and US usage figures indicate that over the last few years there has been a five-fold increase in tablet uptake by zero to eight year olds (Ofcom; Rideout). Although large scale, comparative Australian data is not available, previous research regarding older children indicates that Australia is similar to high use countries like some Scandinavian nations and the UK (Green et al.). In addition to this, two small research projects in Australia, with under 160 participant families each, indicate that two thirds of these children (0-5) use touchscreen devices (Neumann; Coenenna et. al.). Beyond usage figures, there is also very limited evidence-based research about very young children’s app use. Interactive technologies available via touch screen technologies have been available domestically for a very short time. Consequently, “valid scientific research has not been completed and replicated due to [the lack of] available time” (Leathers el al. 129) and longitudinal studies which rely on an intervention group (in this case exposure to children’s apps) and a control group (no exposure) are even fewer and more time-consuming. Interestingly, researchers have revisited the issue of passive screen viewing. A recent 2015 review of previous 2007 research, which linked babies watching videos with poor language development, has found that there was statistical and methodological issues with the 2007 study and that there are no strong inferences to be drawn between media exposure and language development (Ferguson and Donellan). Thus, there seems to be no conclusive evidence-based research on which to inform parents and educators about the possible downside or benefits of touch screen use. Nonetheless, early childhood experts have been quick to weigh in on the possible effects of screen usage, some providing restrictive guidelines and recommendations, with others advocating the use of interactive apps for very young children for their educational value. This knowledge-gap disguises what is actually happening in the lives of real Australian families. Due to the lack of local data, as well as worldwide research, it is essential that Australian researchers obtain a comprehensive understanding about actual behaviour around touch screen use in the lives of children aged between zero and five and their families. Beginning Research While research into very young children’s touch screen use is beginning to take place, few results have been published. When researching two to three year olds’ learning from interactive versus non-interactive videos Kirkorian, Choi and Pempek found that “toddlers may learn more from interactive media than from non-interactive video” (Kirkorian et al). This means that the use of interactive apps on touch screen devices may hold a greater potential for learning than passive video or television viewing for children in this age range. Another study considered the degree to which the young children could navigate to and use apps on touch screen devices by observing and analysing YouTube videos of infants and young children using touch screens (Hourcade et al.). It was found that between the ages of 12 months and 17 months the children filmed seemed to begin to “make meaningful use of the tablets [and] more than 90 per cent of children aged two [had] reached this level of ability” (1923). The kind of research mentioned above, usually the preserve of psychologists, paediatricians and some educators, does not, however, ground very young children’s use in their domestic context—in the spaces and with those people with whom most touch screen usage takes place. With funding from the Australian Research Council Australian, Irish and UK researchers are about to adopt a media studies (domestication) approach to comprehensively investigate digital media use in the everyday lives of very young children. This Australian-based research project positions very young children’s touch screen use within the family and will help provide an understanding of the everyday knowledge and strategies that this cohort of technology users (very young children and their parents) have already developed—in the knowledge vacuum left by the swift appropriation and incorporation of these new media technologies into the lives of families with very young children. Whilst using a conventional social constructionist perspective, the project will also adopt a co-creation of knowledge approach. The co-creation of knowledge approach (Fong) has links with the communities of practice literature (Wegner) and recognises that parents, care-givers and the children themselves are the current experts in this field in terms of the everyday uses of these technologies by very young children. Families’ everyday discourse and practices regarding their children’s touch screen use do not necessarily work through obvious power hierarchies (via expert opinions), but rather through a process of meaning making where they shape their own understandings and attitudes through experience and shared talk within their own everyday family communities of practice. This Toddlers and Tablets research is innovative in many ways. It seeks to capture the enthusiasm of young children’s digital interactions and to pioneer new ways of ‘beginnings’ researching with very young children, as well as with their parents. The researchers will work with parents and children in their broad domestic contexts (including in and out-of-home activities, and grandparental and wider-family involvement) to co-create knowledge about young children’s digital technologies and the social contexts in which these technologies are used. Aspects of these interactions, such as interviews and observations of everyday digital interactions will be recorded (audio and video respectively). In addition to this, data collected from media commentary, policy debates, research publications and learned articles from other disciplinary traditions will be interrogated to see if there are correlations, contrasts, trends or synergies between parents’ construction of meaning, public commentary and current research. Critical discourse tools and methods (Chouliaraki and Fairclough) will be used to analyse verbatim transcripts, video, and all written materials. Conclusion Very young children are uniquely dependent upon others for the basic necessities of life and for the tools they need, and will need to develop, to claim their place in the world. Given the ubiquitous role played by digital media in the lives of their parents and other caregivers it would be a distortion of everyday life for children to be excluded from the technologies that are routinely used to connect with other people and with information. In the same way that adults use digital media to renew and strengthen social and emotional bonds across distance, so young children delight in ‘Facetime’ and other technologies that connect them audio-visually with friends and family members who are not physically co-present. Similarly, a very short time spent in the company of toddlers using touch screens is sufficient to demonstrate the sheer delight that these young infants have in developing their sense of agency and autonomy (https://www.youtube.com/watch?v=aXV-yaFmQNk). Media, communications and cultural studies are beginning to claim a space for evidence based policy drawn from everyday activities in real life contexts. Research into the beginnings of digital life, with families who are beginning to find a way to introduce these technologies to the youngest generation, integrating them within social and emotional repertoires, may prove to be the start of new understandings into the communication skills of the preverbal and preliterate young people whose technology preferences will drive future development – with their parents likely trying to keep pace. Acknowledgment This research is supported under Australia Research Council’s Discovery Projects funding scheme (project number DP150104734). References Bittman, Michael, et al. "Digital Natives? New and Old Media and Children's Outcomes." Australian Journal of Education 55.2 (2011): 161-75. Brown, Ari. "Media Use by Children Younger than 2 Years." Pediatrics 128.5 (2011): 1040-45. Burr, Vivien. Social Constructionism. 2nd ed. London: Routledge, 2003. Cavanaugh, Cathy, et al. "The Effects of Distance Education on K–12 Student Outcomes: A Meta-Analysis." Naperville, Ill.: Learning Point Associates, 2004. 5 Mar. 2009 ‹http://www.ncrel.org/tech/distance/index.html›. Child Sciences and Parenting Research Office. Survey of Media Use by Children and Parents (Summary). Tokyo: Benesse Educational Research and Development Institute, 2014. Coenena, Pieter, Erin Howiea, Amity Campbella, and Leon Strakera. Mobile Touch Screen Device Use among Young Australian Children–First Results from a National Survey. Proceedings 19th Triennial Congress of the IEA. 2015. Chouliaraki, Lilie and Norman Fairclough. Discourse in Late Modernity: Rethinking Critical Discourse Analysis. Edinburgh: Edinburgh UP, 1999. Department of Education. "Belonging, Being and Becoming: The Early Years Learning Framework for Australia." Australian Government, 2009. Ferguson, Christopher J., and M. Brent Donnellan. "Is the Association between Children’s Baby Video Viewing and Poor Language Development Robust? A Reanalysis of Zimmerman, Christakis, and Meltzoff (2007)." Developmental Psychology 50.1 (2014): 129. Findahl, Olle. Swedes and the Internet 2013. Stockholm: The Internet Infrastructure Foundation, 2013. Fong, Patrick S.W. "Co-Creation of Knowledge by Multidisciplinary Project Teams." Management of Knowledge in Project Environments. Eds. E. Love, P. Fong, and Z. Irani. Burlington, MA: Elsevier, 2005. 41-56. Gates, Bill. "Enter 'Generation I': The Responsibility to Provide Access for All to the Most Incredible Learning Tool Ever Created." Instructor 109.6 (2000): 98. Goh, Wendy W.L., Susanna Bay, and Vivian Hsueh-Hua Chen. "Young School Children’s Use of Digital Devices and Parental Rules." Telematics and Informatics 32.4 (2015): 787-95. Green, Lelia, et al. "Risks and Safety for Australian Children on the Internet: Full Findings from the AU Kids Online Survey of 9-16 Year Olds and Their Parents." Cultural Science Journal 4.1 (2011): 1-73. Holloway, Donell, Lelia Green, and Carlie Love. "'It's All about the Apps': Parental Mediation of Pre-Schoolers' Digital Lives." Media International Australia 153 (2014): 148-56. Hourcade, Juan Pablo, Sarah Mascher, David Wu, and Luiza Pantoja. Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015. Jie S.H. "ICT Use Statistics of Households and Individuals in Korea." 10th World Telecommunication/ICT Indicators Meeting (WTIM-12). Korea Internet & Security Agency (KISA), 25-7 Sep. 2012.Judge, Sharon, Kathleen Puckett, and Sherry Mee Bell. "Closing the Digital Divide: Update from the Early Childhood Longitudinal Study." The Journal of Educational Research 100.1 (2006): 52-60. Kirkorian, H., K. Choi, and Pempek. "Toddlers' Word Learning from Contingent and Non-Contingent Video on Touchscreens." Child Development (in press). Leathers, Heather, Patti Summers, and Desollar. Toddlers on Technology: A Parents' Guide. Illinois: AuthorHouse, 2013. NAEYC. Technology and Interactive Media as Tools in Early Childhood Programs Serving Children from Birth through Age 8 [Position Statement]. Washington: National Association for the Education of Young Children, the Fred Rogers Center for Early Learning and Children’s Media at Saint Vincent College, 2012. Neumann, Michelle M. "An Examination of Touch Screen Tablets and Emergent Literacy in Australian Pre-School Children." Australian Journal of Education 58.2 (2014): 109-22. Ofcom. Children and Parents: Media Use and Attitudes Report. London, 2013. Rideout, Victoria. Zero to Eight: Children’s Media Use in America 2013. San Francisco: Common Sense Media, 2013. Rosin, Hanna. "The Touch-Screen Generation." The Atlantic, 20 Apr. 2013. Strasburger, Victor C., et al. "Children, Adolescents, and the Media." Pediatrics 132.5 (2013): 958-61. Unantenne, Nalika. Mobile Device Usage among Young Kids: A Southeast Asia Study. Singapore: The Asian Parent and Samsung Kids Time, 2014. Wenger, Etienne. Communities of Practice: Learning, Meaning, and Identity. New York: Cambridge University Press, 1998. Wenger, Etienne. "Communities of Practice and Social Learning Systems." Organization 7.2 (2000): 225-46. Yelland, Nicola. "Which Apps Are Educational and Why? It’s in the Eye of the Beholder." The Conversation 13 July 2015. 16 Aug. 2015 ‹http://theconversation.com/which-apps-are-educational-and-why-its-in-the-eye-of-the-beholder-37968›.
APA, Harvard, Vancouver, ISO, and other styles
46

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Jin, Tommaso Barbetta, and Crystal Abidin. "Influencers, Brands, and Pivots in the Time of COVID-19." M/C Journal 23, no. 6 (November 28, 2020). http://dx.doi.org/10.5204/mcj.2729.

Full text
Abstract:
In light of the COVID-19 pandemic, where income has become precarious and Internet use has soared, the influencer industry has to strategise over new ways to sustain viewer attention, maintain income flows, and innovate around formats and messaging, to avoid being excluded from continued commercial possibilities. In this article, we review the press coverage of the influencer markets in Australia, Japan, and Korea, and consider how the industry has been attempting to navigate their way through the pandemic through deviations and detours. We consider the narratives and groups of influencers who have been included and excluded in shaping the discourse about influencer strategies in the time of COVID-19. The distinction between inclusion and exclusion has been a crucial mechanism to maintain the social normativity, constructed with gender, sexuality, wealth, able-ness, education, age, and so on (Stäheli and Stichweh, par. 3; Hall and Du Gay 5; Bourdieu 162). The influencer industry is the epitome of where the inclusion-exclusion binary is noticeable. It has been criticised for serving as a locus where social norms, such as femininity and middle-class identities, are crystallised and endorsed in the form of visibility and attention (Duffy 234; Abidin 122). Many are concerned about the global expansion of the influencer industry, in which young generations are led to clickbait and sensational content and normative ways of living, in order to be “included” by their peer groups and communities and to avoid being “excluded” (Cavanagh). However, COVID-19 has changed our understanding of the “normal”: people staying home, eschewing social communications, and turning more to the online where they can feel “virtually” connected (Lu et al. 15). The influencer industry also has been affected by COVID-19, since the images of normativity cannot be curated and presented as they used to be. In this situation, it is questionable how the influencer industry that pivots on the inclusion-exclusion binary is adjusting to the “new normal” brought by COVID-19, and how the binary is challenged or maintained, especially by exploring the continuities and discontinuities in industry. Methodology This cross-cultural study draws from a corpus of articles from Australia, Japan, and Korea published between January and May 2020, to investigate how local news outlets portrayed the contingencies undergone by the influencer industry, and what narratives or groups of influencers were excluded in the process. An extended discussion of our methodology has been published in an earlier article (Abidin et al. 5-7). Using the top ranked search engine of each country (Google for Australia and Japan, Naver for Korea), we compiled search results of news articles from the first ten pages (ten results per page) of each search, prioritising reputable news sites over infotainment sites, and by using targeted keyword searches: for Australia: ‘influencer’ and ‘Australia’ and ‘COVID-19’, ‘coronavirus’, ‘pandemic’; for Japan: ‘インフルエンサー’ (influensā) and ‘コロナ’ (korona), ‘新型コロ ナ’ (shin-gata korona), ‘コロナ禍’ (korona-ka); for Korea: ‘인플루언서’ (Influencer) and ‘코로나’ (corona) and ‘팬데믹’ (pandemic). 111 articles were collected (42 for Australia, 31 for Japan, 38 for Korea). In this article, we focus on a subset of 60 articles and adopt a grounded theory approach (Glaser and Strauss 5) to manually conduct open, axial, and close coding of their headline and body text. Each headline was translated by the authors and coded for a primary and secondary ‘open code’ across seven categories: Income loss, Backlash, COVID-19 campaign, Misinformation, Influencer strategy, Industry shifts, and Brand leverage. The body text was coded in a similar manner to indicate all the relevant open codes covered in the article. In this article, we focus on the last two open codes that illustrate how brands have been working with influencers to tide through COVID-19, and what the overall industry shifts were on the three Asia-Pacific country markets. Table 1 (see Appendix) indicates a full list of our coding schema. Inclusion of the Normal in Shifting Brand Preferences In this section, we consider two main shifts in brand preferences: an increased demand for influencers, and a reliance on influencers to boost viewer/consumer traffic. We found that by expanding digital marketing through Influencers, companies attempted to secure a so-called “new normal” during the pandemic. However, their marketing strategies tended to reiterate the existing inclusion-exclusion binary and exacerbated the lack of diversity and inequality in the industry. Increased Demand for Influencers Across the three country markets, brokers and clients in the influencer industry increased their demand for influencers’ services and expertise to sustain businesses via advertising in the “aftermath of COVID-19”, as they were deemed to be more cost-efficient “viral marketing on social media” (Yoo). By outsourcing content production to influencers who could still produce content independently from their homes (Cheik-Hussein) and who engage with audiences with their “interactive communication ability” (S. Kim and Cho), many companies attempted to continue their business and maintain their relationships with prospective consumers (Forlani). As the newly enforced social distancing measures have also interrupted face-to-face contact opportunities, the mass pivot towards influencers for digital marketing is perceived to further professionalise the industry via competition and quality control in all three countries (Wilkinson; S. Kim and Cho; Yadorigi). By integrating these online personae of influencers into their marketing, the business side of each country is moving towards the new normal in different manners. In Australia, businesses launched campaigns showcasing athlete influencers engaging in meaningful activities at home (e.g. yoga, cooking), and brands and companies reorganised their marketing strategies to highlight social responsibilities (Moore). On the other hand, for some companies in the Japanese market, the disruption from the pandemic was a rare opportunity to build connections and work with “famous” and “prominent” influencers (Yadorigi), otherwise unavailable and unwilling to work for smaller campaigns during regular periods of an intensely competitive market. In Korea, by emphasising their creative ability, influencers progressed from being “mere PR tools” to becoming “active economic subjects of production” who now can play a key role in product planning for clients, mediating companies and consumers (S. Kim and Cho). The underpinning premise here is that influencers are tech-savvy and therefore competent in creating media content, forging relationships with people, and communicating with them “virtually” through social media. Reliance on Influencers to Boost Viewer/Consumer Traffic Across several industry verticals, brands relied on influencers to boost viewership and consumer traffic on their digital estates and portals, on the premise that influencers work in line with the attention economy (Duffy 234). The fashion industry’s expansion of influencer marketing was noticeable in this manner. For instance, Korean department store chains (e.g. Lotte) invited influencers to “no-audience live fashion shows” to attract viewership and advertise fashion goods through the influencers’ social media (Y. Kim), and Australian swimwear brand Vitamin A partnered with influencers to launch online contests to invite engagement and purchases on their online stores (Moore). Like most industries where aspirational middle-class lifestyles are emphasised, the travel industry also extended partnerships with their current repertoire of influencers or international influencers in order to plan for the post-COVID-19 market recovery and post-border reopening tourism boom (Moore; Yamatogokoro; J. Lee). By extension, brands without any prior relationships with influencers, whcih did not have such histories to draw on, were likely to have struggled to produce new influencer content. Such brands could thus only rely on hiring influencers specifically to leverage their follower base. The increasing demand for influencers in industries like fashion, food, and travel is especially notable. In the attention economy where (media) visibility can be obtained and maintained (Duffy 121), media users practice “visibility labor” to curate their media personas and portray branding themselves as arbiters of good taste (Abidin 122). As such, influencers in genres where personal taste can be visibly presented—e.g. fashion, travel, F&B—seem to have emerged from the economic slump with a head start, especially given their dominance on the highly visual platform of Instagram. Our analysis shows that media coverage during COVID-19 repeated the discursive correlation between influencers and such hyper-visible or visually-oriented industries. However, this dominant discourse about hyper-visible influencers and the gendered genres of their work has ultimately reinforced norms of self-presentation in the industry—e.g. being feminine, young, beautiful, luxurious—while those who deviate from such norms seem to be marginalised and excluded in media coverage and economic opportunities during the pandemic cycle. Including Newness by Shifting Format Preferences We observed the inclusion of newness in the influencer scenes in all three countries. By shifting to new formats, the previously excluded and lesser seen aspects of our lives—such as home-based content—began to be integrated into the “new normal”. There were four main shifts in format preferences, wherein influencers pivoted to home-made content, where livestreaming is the new dominant format of content, and where followers preferred more casual influencer content. Influencers Have Pivoted to Home-Made Content In all three country markets, influencers have pivoted to generating content based on life at home and ideas of domesticity. These public displays of homely life corresponded with the sudden occurrence of being wired to the Internet all day—also known as “LAN cable life” (랜선라이프, lan-seon life) in the Korean media—which influencers were chiefly responsible for pioneering (B. Kim). While some genres like gaming and esports were less impacted upon by the pivot, given that the nature and production of the content has always been confined to a desktop at home (Cheik-Hussein), pivots occurred for the likes of outdoor brands (Moore), the culinary industry (Dean), and fitness and workout brands (Perelli and Whateley). In Korea, new trends such as “home cafes” (B. Kim) and DIY coffees—like the infamous “Dalgona-Coffee” that was first introduced by a Korean YouTuber 뚤기 (ddulgi)—went viral on social media across the globe (Makalintal). In Japan, the spike in influencers showcasing at-home activities (Hayama) also encouraged mainstream TV celebrities to open social media accounts explicitly to do the same (Kamada). In light of these trends, the largest Multi-Channel Network (MCN) in Japan, UUUM, partnered with one of the country’s largest entertainment industries, Yoshimoto Kogyo, to assist the latter’s comedian talents to establish a digital video presence—a trend that was also observed in Korea (Koo), further underscoring the ubiquity of influencer practices in the time of COVID-19. Along with those creators who were already producing content in a domestic environment before COVID-19, it was the influencers with the time and resources to quickly pivot to home-made content who profited the most from the spike in Internet traffic during the pandemic (Noshita). The benefits of this boost in traffic were far from equal. For instance, many others who had to turn to makeshift work for income, and those who did not have conducive living situations to produce content at home, were likely to be disadvantaged. Livestreaming Is the New Dominant Format Amidst the many new content formats to be popularised during COVID-19, livestreaming was unanimously the most prolific. In Korea, influencers were credited for the mainstreaming and demotising (Y. Kim) of livestreaming for “live commerce” through real-time advertorials and online purchases. Livestreaming influencers were solicited specifically to keep international markets continuously interested in Korean products and cultures (Oh), and livestreaming was underscored as a main economic driver for shaping a “post-COVID-19” society (Y. Kim). In Australia, livestreaming was noted among art (Dean) and fitness influencers (Dean), and in Japan it began to be adopted among major fashion brands like Prada and Chloe (Saito). While the Australian coverage included livestreaming on platforms such as Instagram, Facebook, YouTube, Twitch, and Douyin (Cheik-Hussein; Perelli and Whateley; Webb), the Japanese coverage highlighted the potential for Instagram Live to target young audiences, increase feelings of “trustworthiness”, and increase sales via word-of-mouth advertising (Saito). In light of reduced client campaigns, influencers in Australia had also used livestreaming to provide online consulting, teaching, and coaching (Perelli and Whateley), and to partner with brands to provide masterclasses and webinars (Sanders). In this era, influencers in genres and verticals that had already adopted streaming as a normative practice—e.g. gaming and lifestyle performances—were likely to have had an edge over others, while other genres were excluded from this economic silver lining. Followers Prefer More Casual Influencer Content In general, all country markets report followers preferring more casual influencer content. In Japan, this was offered via the potential of livestreaming to deliver more “raw” feelings (Saito), while in Australia this was conveyed through specific content genres like “mental or physical health battles” (Moore); specific aesthetic choices like appearing “messier”, less “curated”, and “more unfiltered” (Wilkinson); and the growing use of specific emergent platforms like TikTok (Dean, Forlani, Perelli, and Whateley). In Korea, influencers in the photography, travel, and book genres were celebrated for their new provision of pseudo-experiences during COVID-19-imposed social distancing (Kang). Influencers on Instagram also spearheaded new social media trends, like the “#wheredoyouwannago_challenge” where Instagram users photoshopped themselves into images of famous tourist spots around the world (Kang). Conclusion In our study of news articles on the impact of COVID-19 on the Australian, Japanese, and Korean influencer industries during the first wave of the pandemic, influencer marketing was primed to be the dominant and default mode of advertising and communication in the post-COVID-19 era (Tate). In general, specific industry verticals that relied more on visual portrayals of lifestyles and consumption—e.g. fashion, F&B, travel—to continue partaking in economic recovery efforts. However, given the gendered genre norms in the industry, this meant that influencers who were predominantly feminine, young, beautiful, and luxurious experienced more opportunity over others. Further, influencers who did not have the resources or skills to pivot to the “new normals” of creating content from home, engaging in livestreaming, and performing their personae more casually were excluded from these new economic opportunities. Across the countries, there were minor differences in the overall perception of influencers. There was an increasingly positive perception of influencers in Japan and Korea, due to new norms and pandemic-related opportunities in the media ecology: in Korea, influencers were considered to be the “vanguard of growing media commerce in the post-pandemonium era” (S. Kim and Cho), and in Japan, influencers were identified as critical vehicles during a more general consumer shift from traditional media to social media, as TV watching time is reduced and home-based e-commerce purchases are increasingly popular (Yadogiri). However, in Australia, in light of the sudden influx of influencer marketing strategies during COVID-19, the market seemed to be saturated more quickly: brands were beginning to question the efficiency of influencers, cautioned that their impact has not been completely proven for all industry verticals (Stephens), and have also begun to reduce commissions for influencer affiliate programmes as a cost-cutting measure (Perelli and Whateley). While news reports on these three markets indicate that there is some level of growth and expansion for various influencers and brands, such opportunities were not experienced equally, with some genres and demographics of influencers and businesses being excluded from pandemic-related pivots and silver linings. Further, in light of the increasing commercial opportunities, pressure for more regulations also emerged; for example, the Korean government announced new investigations into tax avoidance (Han). Not backed up by talent agencies or MCNs, independent influencers are likely to be more exposed to the disciplinary power of shifting regulatory practices, a condition which might have hindered their attempt at diversifying their income streams during the pandemic. Thus, while it is tempting to focus on the privileged and novel influencers who have managed to cling on to some measure of success during the pandemic, scholarly attention should also remember those who are being excluded and left behind, lest generations, cohorts, genres, or subcultures of the once-vibrant influencer industry fade into oblivion. References Abidin, Crystal. “#In$tagLam: Instagram as a repository of taste, a burgeoning marketplace, a war of eyeballs.” Mobile Media Making in an Age of Smartphones. Eds. Marsha Berry and Max Schleser. New York: Palgrave Pivot, 2014. 119-128. <https://doi.org/10.1057/9781137469816_11>. Abidin, Crystal, Jin Lee, Tommaso Barbetta, and Miao Weishan. “Influencers and COVID-19: Reviewing Key Issues in Press Coverage across Australia, China, Japan, and South Korea.” Media International Australia (2020). <https://journals.sagepub.com/doi/10.1177/1329878X20959838>. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, Mass.: Harvard UP, 1984. Cavanagh, Emily. “‘Snapchat Dysmorphia’ Is Leading Teens to Get Plastic Surgery Based on Unrealistic Filters.” Business Inside 9 Jan. 2020. <https://www.insider.com/snapchat-dysmorphia-low-self-esteem-teenagers-2020-1>. Cheik-Hussein, Mariam. “Brands Turn to Gaming Influencers as Lockdown Gives Sector Boost.” Ad News 21 Apr. 2020. <https://www.adnews.com.au/news/brands-turn-to-gaming-influencers-as-lockdown-gives-sector-boost>. Dean, Lucy. “Coronavirus Is Changing the Influencer World.” Yahoo! Finance. 3 Apr. 2020. <https://au.finance.yahoo.com/news/coronavirus-changing-social-media-225332357.html>. Duffy, Brooke Erin. (Not) Getting Paid to Do What You Love: Gender, Social Media, and Aspirational Work. Cambridge: Yale University Press, 2017. Forlani, Cristina. “What Brands Can Learn from Influencers to Remain Relevant Post-COVID-19.” We Are Social 13 May 2020. <https://wearesocial.com/au/blog/2020/05/what-brands-can-learn-from-influencers-to-remain-relevant-post-covid-19>. Glaser, Barney G., and Anselm L. Strauss. The Discovery of Grounded Theory: Strategies for Qualitative Research. Chicago: Aldine Publishing Company. 1967. Hall, Stuart, and Paul Du Gay. Questions of Cultural Identity. Sage, 1996. Han, Hyojung. “국세청, 20만명 팔로워 가진 유명인 등 고소득 크리에이터 ‘해외광고대가검증’ 나섰다 [National Tax Service Investigates High-Profile Creators’ Income Overseas].” Sejung Ilbo 24 May 2020. <http://www.sejungilbo.com/news/articleView.html?idxno=21347>. Hayama, Riho. “コロナがインスタグラムとインフルエンサーに与える影響 [The Influence of Covid on Instagram and Influencers].” Note 19 May 2020. <https://note.com/hayamari/n/n697a0ec332ee>. Kamada, Kazuki. “動画クリエイターが「公人」に。2020年はインフルエンサー時代の転換点となるか(UUUM鎌田和樹)[Video Creators as Public Figures: Will 2020 Represent a Turning Point for Influencers? (UUUM’s Kamada Kazuki)].” QJweb 8 May 2020. <https://qjweb.jp/journal/18499/>. Kang, Jumi. "[아무튼, 주말] 황금연휴라도 아직은… 사람 드문 야외, 여행 책방, 랜선 여행으로 짧은 여행 즐겨볼까 [[Weekend Anyway] Although It’s Holiday Season, Still... How about Joining the Holiday with a Short LAN-Cable Travel, Travelling Bookstores, and Travelling to Countryside?].” Chosun Daily 25 Apr. 2020. <http://news.chosun.com/site/data/html_dir/2020/04/24/2020042403600.html?utm_source=naver&utm_medium=original&utm_campaign=news>. Kim, Bokyung. “[코로나뉴트렌드] ‘집콕 3개월’...집밖에 안나가도 살 수 있어서 신기 [[COVID-19 New Trend] Staying Home for 3 Months: Don’t Need to Go Outside].” Yonhap News 26 Apr. 2020. <https://www.yna.co.kr/view/AKR20200425045300030?input=1195m>. Kim, Sanghee, and Chulhee Cho. "코로나 이후 인플루언서 경제·사회 영향력 더 커져 [Influencers' Socioeconomic Impact Increased in Covid-19 Era].” MoneyToday 28 Apr. 2020. <https://news.mt.co.kr/mtview.php?no=2020042614390682882>. Kim, Young-Eun. "[포스트 코로나 유망 비즈니스 22]실시간 방송으로 경험하고 손가락으로 산다…판 커진 라이브 커머스 [[Growing Business 22 in Post-COVID-19] Experience with Livestreaming and Purchase with Fingers].” Hankyung Business 19 May 2020. <https://news.naver.com/main/read.nhn?mode=LSD&mid=sec&sid1=101&oid=050&aid=0000053676>. Koo, Jayoon. "코로나 언택트시대… 유튜브 업계는 '승승장구' [Fast-Growing Youtube Industry in the Covid-19 Untact Era].” Financial News 24 Apr. 2020. <https://www.fnnews.com/news/202004241650545778>. Lu, Li, et al. “Forum: COVID-19 Dispatches.” Cultural Studies ↔ Critical Methodologies, Sep. 2020. DOI: 10.1177/1532708620953190. Lee, Jihye. “[포스트 코로나] ‘일상을 여행처럼, 안전을 일상처럼’...해외 대신 국내 활성화 예고 [[Post-COVID-19] ‘Daily Life as Travelling, Safety as Daily Life’... Domestic Travel Expected to Grow].” E-News Today 26 May 2020. <http://www.enewstoday.co.kr/news/articleView.html?idxno=1389486>. Makalintal, Bettina. "People All over the World Are Making Frothy 'Dalgona' Coffee, Thanks to Quarantine." Vice 20 Mar. 2020. <https://www.vice.com/en_us/article/bvgbk8/people-all-over-the-world-are-making-frothy-dalgona-coffee-thanks-to-quarantine>. Moore, Kaleigh. “Influencers’ Currency Has Increased during Covid-19 Crisis.” Vogue Business 13 Apr. 2020. <https://www.voguebusiness.com/companies/influencers-currency-has-increased-during-covid-19-crisis-marketing>. Noshita, Tomoyuki. “コロナ禍で変わるインフルエンサー活動と企業ニーズ[インタビュー][Influencer Activity and Corporate Needs Changed by the Corona Disaster].” ExchangeWire 26 May 2020. <https://www.exchangewire.jp/2020/05/26/trenders-instagram/>. Oh, Eun-seo. "코트라, 중국·대만 6곳에 중소기업 온라인마케팅 전용 'K스튜디오' 오픈 [KOTRA Launches 6 ‘K-Studios’ in China and Taiwan for Online Marketing for SME].” Global Economics 16 May 2020. <https://news.g-enews.com/ko-kr/news/article/news_all/2020050611155064653b88961c8c_1/article.html?md=20200506141610_R>. Perelli, Amanda, and Dan Whateley. “How the Coronavirus Is Changing the Influencer Business, According to Marketers and Top Instagram and YouTube Stars.” Business Insider Australia 22 Mar. 2020. <https://www.businessinsider.com.au/how-coronavirus-is-changing-influencer-marketing-creator-industry-2020-3?r=US&IR=T>. Reid, Elise. “COVID-19 Could See Advertisers Move from Influencers to Streaming Sites.” Channel News 27 Apr. 2020. <https://www.channelnews.com.au/covid-19-could-see-advertisers-move-from-influencers-to-streaming-sites/>. Rowell, Andrew. “Coronavirus: Big Tobacco Sees an Opportunity in the Pandemic.” The Conversation 14 May 2020. <https://theconversation.com/coronavirus-big-tobacco-sees-an-opportunity-in-the-pandemic-138188>. Saito, Yurika. “コロナ禍で急増の「インスタライブ」。誰でも簡単に出来る視聴・配信方法 [The Boom of Instagram Live during the Pandemic: Anyone Can Easily Watch and Stream Content].” Forbes Japan 19 May 2020. <https://forbesjapan.com/articles/detail/34475>. Sanders, Krystal. “Perth Influencer Brooke Vulinovich Says Instagram Has Become ‘Lifeline’ for Small Businesses.” Perth Now 29 Apr. 2020. <https://www.perthnow.com.au/news/coronavirus/perth-influencer-brooke-vulinovich-says-instagram-has-become-lifeline-for-small-businesses-ng-b881533823z>. Stäheli, Urs, and Rudolf Stichweh. "Introduction: Inclusion/Exclusion–Systems Theoretical and Poststructuralist Perspectives." Inclusion/Exclusion and Socio-Cultural Identities, 2002. Stephens, Lee. “Why Influencer Marketing Will Win after COVID-19.” Ad News 9 Apr. 2020. <https://www.adnews.com.au/opinion/why-influencer-marketing-will-win-after-covid-19>. Tate, Andrew. “How Vanity Viral Marketing Ran Headlong into Coronavirus.” The New Daily 29 Apr. 2020. <https://thenewdaily.com.au/news/coronavirus/2020/04/28/how-vanity-viral-marketing-ran-headlong-into-corornavirus/>. Webb, Loren. “Brands Pivot Their Marketing Strategies in the Wake of the Coronavirus.” Dynamic Business 13 Mar. 2020. <https://dynamicbusiness.com.au/topics/news/brands-pivot-their-marketing-strategies-in-the-wake-of-the-coronavirus.html>. Wilkinson, Zoe. “Head to Head: Will the Economy of Celebrity and Influencer Endorsement Recover after the COVID-19 Crisis?” Mumbrella 28 Apr. 2020. <https://mumbrella.com.au/head-to-head-will-the-economy-of-celebrity-and-influencer-endorsement-recover-after-the-covid-19-crisis-625987>. Yadorigi, Yuki. “【第7回】コロナ禍のなかで生まれた光明、新たなアプローチによるコミュニケーション [Episode 7: A Light Emerged during the Corona Crisis, a Communication Based on a New Approach].” C-Station 28 Apr. 2020. <https://c.kodansha.net/news/detail/36286/>. Yamatogokoro. “アフターコロナの観光・インバウンドを考えるVol.4世界の観光業の取り組みから学ぶ、自治体・DMOが今まさにすべきこと [After Corona Tourism and Inbound Tourism Vol. 4: What Municipalities and DMOs Should Do Right Now to Learn from Global Tourism Initiatives].” Yamatogokoro 19 May 2020. Yoo, Hwan-In. "코로나 여파, 연예인·인플루언서 마케팅 활발 [COVID-19, Star-Influencer Marketing Becomes Active].” SkyDaily 19 May 2020. <http://www.skyedaily.com/news/news_view.html?ID=104772>. Appendix Open codes Axial codes 1) Brand leverage Targeting investors Targeting influencers Targeting new digital media formats Targeting consumers/customers/viewers Types of brands/clients 2) Industry shifts Brand preferences Content production Content format Follower preferences Type of Influencers Table 1: Full list of codes from our analysis
APA, Harvard, Vancouver, ISO, and other styles
48

King, Ben. "Invasion." M/C Journal 2, no. 2 (March 1, 1999). http://dx.doi.org/10.5204/mcj.1741.

Full text
Abstract:
The pop cultural moment that most typifies the social psychology of invasion for many of us is Orson Welles's 1938 coast to coast CBS radio broadcast of Invaders from Mars, a narration based on H.G. Wells's The War of the Worlds. News bulletins and scene broadcasts followed Welles's introduction, featuring, in contemporary journalistic style, reports of a "meteor" landing near Princeton, N.J., which "killed" 1500 people, and the discovery that it was in fact a "metal cylinder" containing strange creatures from Mars armed with "death rays" which would reduce all the inhabitants of the earth to space dust. Welles's broadcast caused thousands to believe that Martians were wreaking widespread havoc in New York and Jersey. New York streets were filled with families rushing to open spaces protecting their faces from the "gas raids", clutching sacred possessions and each other. Lines of communication were clogged, massive traffic jams ensued, and people evacuated their homes in a state of abject terror while armouries in neighbouring districts prepared to join in the "battle". Some felt it was a very cruel prank, especially after the recent war scare in Europe that featured constant interruption of regular radio programming. Many of the thousands of questions directed at police in the hours following the broadcast reflected the concerns of the residents of London and Paris during the tense days before the Munich agreement. The media had undergone that strange metamorphosis that occurs when people depend on it for information that affects themselves directly. But it was not a prank. Three separate announcements made during the broadcast stressed its fictional nature. The introduction to the program stated "the Columbia Broadcasting System and its affiliated stations present Orson Welles and the Mercury Theatre on the Air in The War of the Worlds by H.G. Wells", as did the newspaper listing of the program "Today: 8:00-9:00 -- Play: H.G. Wells's 'War of the Worlds' -- WABC". Welles, rather innocently, wanted to play with the conventions of broadcasting and grant his audience a bit of legitimately unsettling, though obviously fictitious, verisimilitude. There are not too many instances in modern history where we can look objectively at such incredible reactions to media soundbytes. That evening is a prototype for the impact media culture can have on an audience whose minds are prepped for impending disaster. The interruption of scheduled radio invoked in the audience a knee-jerk response that dramatically illustrated the susceptibility of people to the discourse of invasion, as well as the depth of the relationship between the audience and media during tense times. These days, the media itself are often regarded as the invaders. The endless procession of information that grows alongside technology's ability to present it is feared as much as it is loved. In the current climate of information and technological overload, invasion has swum from the depths of our unconscious paranoia and lurks impatiently in the shallows. There is so much invasion and so much to feel invaded about: the war in Kosovo (one of over sixty being fought today) is getting worse with the benevolence and force of the UN dwindling in a cloud of bureaucracy and failed talks, Ethiopia and Eritrea are going at it again, the ideology of the Olympic Games in Sydney has gone from a positive celebration of the millennium to a revenue-generating boys club of back scratchers, Internet smut is still everywhere, and most horrifically, Baywatch came dangerously close to being shot on location on the East Coast of Australia. In this issue of M/C we take a look at literal and allegorical invasions from a variety of cleverly examined aspects of our culture. Firstly, Axel Bruns takes a look a subtle invasion that is occurring on the Web in "Invading the Ivory Tower: Hypertext and the New Dilettante Scholars". He points to the way the Internet's function as a research tool is changing the nature of academic writing due to its interactivity and potential to be manipulated in a way that conventional written material cannot. Axel investigates the web browser's ability to invade the text and the elite world of academic publishing via the format of hypertext itself rather than merely through ideas. Felicity Meakins's article Shooting Baywatch: Resisting Cultural Invasion examines media and community reactions to the threat of having the television series Baywatch shot on Australian beaches. Felicity looks at the cultural cringe that has surrounded the relationship between Australia and America over the years and is manifested by our response to American accents in the media. American cultural imperialism has come to signify a great deal in the dwindling face of Aussie institutions like mateship and egalitarianism. In a similarly driven piece called "A Decolonising Doctor? British SF Invasion Narratives", Nick Caldwell investigates some of the implications of the "Britishness" of the cult television series Doctor Who, where insularity and cultural authority are taken to extremes during the ubiquitous intergalactic invasions. Paul Mc Cormack's article "Screen II: The Invasion of the Attention Snatchers" turns from technologically superior invaders to an invasion by technology itself -- he considers how the television has irreversibly invaded our lives and claimed a dominant place in the domestic sphere. Recently, the (Internet-connected) personal computer has begun a similar invasion: what space will it eventually claim? Sandra Brunet's "Is Sustainable Tourism Really Sustainable? Protecting the Icon in the Commodity at Sites of Invasion" explores the often forgotten Kangaroo Island off the coast of South Australia. She looks at ways in which the image of the island is constructed by the government and media for eco-tourism and how faithful this representation is to the farmers, fishermen and other inhabitants of the island. Paul Starr's article "Special Effects and the Invasive Camera: Enemy of the State and The Conversation" rounds off the issue with a look at the troubled relationship between cutting-edge special effects in Hollywood action movies and the surveillance technologies that recent movies such as Enemy of the State show as tools in government conspiracies. The depiction of high-tech gadgetry as 'cool' and 'evil' at the same time, he writes, leads to a collapse of meaning. This issue of M/C succeeds in pointing out sites of invasion in unusual places, continuing the journal's tradition of perception in the face of new media culture. I hope you enjoy this second issue of the second volume: 'invasion'. Ben King 'Invasion' Issue Editor Citation reference for this article MLA style: Ben King. "Editorial: 'Invasion'." M/C: A Journal of Media and Culture 2.2 (1999). [your date of access] <http://www.uq.edu.au/mc/9903/edit.php>. Chicago style: Ben King, "Editorial: 'Invasion'," M/C: A Journal of Media and Culture 2, no. 2 (1999), <http://www.uq.edu.au/mc/9903/edit.php> ([your date of access]). APA style: Ben King. (1999) Editorial: 'invasion'. M/C: A Journal of Media and Culture 2(2). <http://www.uq.edu.au/mc/9903/edit.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
49

Pedersen, Isabel, and Kristen Aspevig. "Being Jacob: Young Children, Automedial Subjectivity, and Child Social Media Influencers." M/C Journal 21, no. 2 (April 25, 2018). http://dx.doi.org/10.5204/mcj.1352.

Full text
Abstract:
Introduction Children are not only born digital, they are fashioned toward a lifestyle that needs them to be digital all the time (Palfrey and Gasser). They click, tap, save, circulate, download, and upload the texts of their lives, their friends’ lives, and the anonymous lives of the people that surround them. They are socialised as Internet consumers ready to participate in digital services targeted to them as they age such as Snapchat, Instagram, and YouTube. But they are also fashioned as producers, whereby their lives are sold as content on these same markets. As commodities, the minutiae of their lives become the fodder for online circulation. Paradoxically, we also celebrate these digital behaviours as a means to express identity. Personal profile-building for adults is considered agency-building (Beer and Burrows), and as a consequence, we praise children for mimicking these acts of adult lifestyle. This article reflects on the Kids, Creative Storyworlds, and Wearables project, which involved an ethnographic study with five young children (ages 4-7), who were asked to share their autobiographical stories, creative self-narrations, and predictions about their future mediated lives (Atkins et al.). For this case study, we focus on commercialised forms of children’s automedia, and we compare discussions we had with 6-year old Cayden, a child we met in the study who expresses the desire to make himself famous online, with videos of Jacob, a child vlogger on YouTube’s Kinder Playtime, who clearly influences children like Cayden. We argue that child social influencers need consideration both as autobiographical agents and as child subjects requiring a sheltered approach to their online lives.Automedia Automedia is an emergent genre of autobiography (Smith and Watson Reading 190; “Virtually Me” 78). Broadcasting one’s life online takes many forms (Kennedy “Vulnerability”). Ümit Kennedy argues “Vlogging on YouTube is a contemporary form of autobiography in which individuals engage in a process of documenting their life on a daily or weekly basis and, in doing so, construct[ing] their identity online” (“Exploring”). Sidonie Smith and Julia Watson write that “visual and digital modes are projecting and circulating not just new subjects but new notions of subjectivity through the effects of automediality” with the result that “the archive of the self in time, in space and in relation expands and is fundamentally reorganized” (Reading 190). Emma Maguire addresses what online texts “tell us about cultural understandings of selfhood and what it means to communicate ‘real’ life through media” naming one tool, “automedia”. Further, Julie Rak calls on scholars “to rethink ‘life’ and ‘writing’ as automedia” to further “characterize the enactment of a personal life story in a new media environment.” We define automedia as a genre that involves the practices of creating, performing, sharing, circulating, and (at times) preserving one’s digital life narrative meant for multiple publics. Automedia revises identity formation, embodiment, or corporealities in acts of self-creation (Brophy and Hladki 4). Automedia also emphasizes circulation. As shared digital life texts now circulate through the behaviours of other human subjects, and automatically via algorithms in data assemblages, we contend that automediality currently involves a measure of relinquishing control over perpetually evolving mediatised environments. One cannot control how a shared life narrative will meet a public in the future, which is a revised way of thinking about autobiography. For the sake of this paper, we argue that children’s automedia ought to be considered a creative, autobiographical act, in order to afford child authors who create them the consideration they deserve as agents, now and in the future. Automedial practices often begin when children receive access to a device. The need for a distraction activity is often the reason parents hand a young child a smartphone, iPad, or even a wearable camera (Nansen). Mirroring the lives of parents, children aspire to share representations of their own personal lives in pursuit of social capital. They are often encouraged to use technologies and apps as adults do–to track aspects of self, broadcast life stories and eventually “live share” them—effectively creating, performing, sharing, and at times, seeking to preserve a public life narrative. With this practice, society inculcates children into spheres of device ubiquity, “socializing them to a future digital lifestyle that will involve always carrying a computer in some form” (Atkins et al. 49). Consequently, their representations become inculcated in larger media assemblages. Writing about toddlers, Nansen describes how the “archiving, circulation and reception of these images speaks to larger assemblages of media in which software protocols and algorithms are increasingly embedded in and help to configure everyday life (e.g. Chun; Gillespie), including young children’s media lives (Ito)” (Nansen). Children, like adult citizens, are increasingly faced with choices “not structured by their own preferences but by the economic imperatives of the private corporations that have recently come to dominate the internet” (Andrejevic). Recent studies have shown that for children and youth in the digital age, Internet fame, often characterized by brand endorsements, is a major aspiration (Uhls and Greenfield, 2). However, despite the ambition to participate as celebrity digital selves, children are also mired in the calls to shield them from exposure to screens through institutions that label these activities detrimental. In many countries, digital “protections” are outlined by privacy commissioners and federal or provincial/state statutes, (e.g. Office of the Privacy Commissioner of Canada). Consequently, children are often caught in a paradox that defines them either as literate digital agents able to compose or participate with their online selves, or as subjectified wards caught up in commercial practices that exploit their lives for commercial gain.Kids, Creative Storyworlds and Wearables ProjectBoth academic and popular cultural critics continually discuss the future but rarely directly engage the people who will be empowered (or subjugated) by it as young adults in twenty years. To address children’s lack of agency in these discussions, we launched the Kids, Creative Storyworlds and Wearables project to bring children into a dialogue about their own digital futures. Much has been written on childhood agency and participation in culture and mediated culture from the discipline of sociology (James and James; Jenks; Jenkins). In previous work, we addressed the perspective of child autobiographical feature filmmakers to explore issues of creative agency and consent when adult gatekeepers facilitate children in film production (Pedersen and Aspevig “My Eyes”; Pedersen and Aspevig “Swept”). Drawing on that previous work, this project concentrates on children’s automediated lives and the many unique concerns that materialize with digital identity-building. Children are categorised as a vulnerable demographic group necessitating special policy and legislation, but the lives they project as children will eventually become subsumed in their own adult lives, which will almost certainly be treated and mediated in a much different manner in the future. We focused on this landscape, and sought to query the children on their futures, also considering the issues that arise when adult gatekeepers get involved with child social media influencers. In the Storyworlds ethnographic study, children were given a wearable toy, a Vtech smartwatch called Kidizoom, to use over a month’s timeframe to serve as a focal point for ethnographic conversations. The Kidizoom watch enables children to take photos and videos, which are uploaded to a web interface. Before we gave them the tech, we asked them questions about their lives, including What are machines going to be like in the future? Can you imagine yourself wearing a certain kind of computer? Can you tell/draw a story about that? If you could wear a computer that gave you a super power, what would it be? Can you use your imagination to think of a person in a story who would use technology? In answering, many of them drew autobiographical drawings of technical inventions, and cast themselves in the images. We were particularly struck by the comments made by one participant, Cayden (pseudonym), a 6-year-old boy, and the stories he told us about himself and his aspirations. He expressed the desire to host a YouTube channel about his life, his activities, and the wearable technologies his family already owned (e.g. a GroPro camera) and the one we gave him, the Kidizoom smartwatch. He talked about how he would be proud to publically broadcast his own videos on YouTube, and about the role he had been allowed to play in the making of videos about his life (that were not broadcast). To contextualize Cayden’s commentary and his automedial aspirations, we extended our study to explore child social media influencers who broadcast components of their personal lives for the deliberate purpose of popularity and the financial gain of their parents.We selected the videos of Jacob, a child vlogger because we judged them to be representative of the kinds that Cayden watched. Jacob reviews toys through “unboxing videos,” a genre in which a child tells an online audience her or his personal experiences using new toys in regular, short videos on a social media site. Jacob appears on a YouTube channel called Kinder Playtime, which appears to be a parent-run channel that states that, “We enjoy doing these things while playing with our kids: Jacob, Emily, and Chloe” (see Figure 1). In one particular video, Jacob reviews the Kidizoom watch, serving as a child influencer for the product. By understanding Jacob’s performance as agent-driven automedia, as well as being a commercialised, mediatised form of advertising, we get a clearer picture of how the children in the study are coming to terms with their own digital selfhood and the realisation that circulated, life-exposing videos are the expectation in this context.Children are implicated in a range of ways through “family” influencer and toy unboxing videos, which are emergent entertainment industries (Abidin 1; Nansen and Nicoll; Craig and Cunningham 77). In particular, unboxing videos do impact child viewers, especially when children host them. Jackie Marsh emphasizes the digital literacy practices at play here that co-construct viewers as “cyberflâneur[s]” and she states that “this mode of cultural transmission is a growing feature of online practices for this age group” (369). Her stress, however, is on how the child viewer enjoys “the vicarious pleasure he or she may get from viewing the playing of another child with the toy” (376). Marsh writes that her study subject, a child called “Gareth”, “was not interested in being made visible to EvanHD [a child celebrity social media influencer] or other online peers, but was content to consume” the unboxing videos. The concept of the cyberflâneur, then, is fitting as a mediatising co-constituting process of identity-building within discourses of consumerism. However, in our study, the children, and especially Cayden, also expressed the desire to create, host, and circulate their own videos that broadcast their lives, also demonstrating awareness that videos are valorised in their social circles. Child viewers watch famous children perform consumer-identities to create an aura of influence, but viewers simultaneously aspire to become influencers using automedial performances, in essence, becoming products, themselves. Jacob, Automedial Subjects and Social Media InfluencersJacob is a vlogger on YouTube whose videos can garner millions of views, suggesting that he is also an influencer. In one video, he appears to be around the age of six as he proudly sits with folded hands, bright eyes, and a beaming, but partly toothless smile (see Figure 2). He says, “Welcome to Kinder Playtime! Today we have the Kidi Zoom Smartwatch DX. It’s from VTech” (Kinder Playtime). We see the Kidi Zoom unboxed and then depicted in stylized animations amid snippets of Jacob’s smiling face. The voice and hands of a faceless parent guide Jacob as he uses his new wearable toy. We listen to both parent and child describe numerous features for recording and enhancing the wearer’s daily habits (e.g. calculator, calendar, fitness games), and his dad tells him it has a pedometer “which tracks your steps” (Kinder Playtime). But the watch is also used by Jacob to mediate himself and his world. We see that Jacob takes pictures of himself on the tiny watch screen as he acts silly for the camera. He also uses the watch to take personal videos of his mother and sister in his home. The video ends with his father mentioning bedtime, which prompts a “thank you” to VTech for giving him the watch, and a cheerful “Bye!” from Jacob (Kinder Playtime). Figure 1: Screenshot of Kinder Playtime YouTube channel, About page Figure 2: Screenshot of “Jacob,” a child vlogger at Kinder Playtime We chose Jacob for three reasons. First, he is the same age as the children in the Storyworlds study. Second, he reviews the smart watch artifact that we gave to the study children, so there was a common use of automedia technology. Third, Jacob’s parents were involved with his broadcasts, and we wanted to work within the boundaries of parent-sanctioned practices. However, we also felt that his playful approach was a good example of how social media influence overlaps with automediality. Jacob is a labourer trading his public self-representations in exchange for free products and revenue earned through the monetisation of his content on YouTube. It appears that much of what Jacob says is scripted, particularly the promotional statements, like, “Today we have the Kidizoom Smartwatch DX. It’s from VTech. It’s the smartest watch for kids” (Kinder Playtime). Importantly, as an automedial subject Jacob reveals aspects of his self and his identity, in the manner of many child vloggers on public social media sites. His product reviews are contextualised within a commoditised space that provides him a means for the public performance of his self, which, via YouTube, has the potential to reach an enormous audience. YouTube claims to have “over a billion users—almost one-third of all people on the Internet—and every day people watch hundreds of millions of hours on YouTube and generate billions of views” (YouTube). Significantly, he is not only filmed by others, Jacob is also a creative practitioner, as Cayden aspired to become. Jacob uses high-tech toys, in this case, a new wearable technology for self-compositions (the smart watch), to record himself, friends, family or simply the goings-on around him. Strapped to his wrist, the watch toy lets him play at being watched, at being quantified and at recording the life stories of others, or constructing automediated creations for himself, which he may upload to numerous social media sites. This is the start of his online automediated life, which will be increasingly under his ownership as he ages. To greater or lesser degrees, he will later be able to curate, add to, and remediate his body of automedia, including his digital past. Kennedy points out that “people are using YouTube as a transformative tool, and mirror, to document, construct, and present their identity online” (“Exploring”). Her focus is on adult vloggers who consent to their activities. Jacob’s automedia is constructed collaboratively with his parents, and it is unclear how much awareness he has of himself as an automedia creator. However, if we don’t afford Jacob the same consideration as we afford adult autobiographers, that the depiction of his life is his own, we will reduce his identity performance to pure artifice or advertisement. The questions Jacob’s videos raise around agency, consent, and creativity are important here. Sidonie Smith asks “Can there be a free, agentic space; and if so, where in the world can it be found?” (Manifesto 188). How much agency does Jacob have? Is there a liberating aspect in the act of putting personal technology into the hands of a child who can record his life, himself? And finally, how would an adult Jacob feel about his childhood self advertising these products online? Is this really automediality if Jacob does not fully understand what it means to publicly tell a mediated life story?These queries lead to concerns over child social media influence with regard to legal protection, marketing ethics, and user consent. The rise of “fan marketing” presents a nexus of stealth marketing to children by other children. Stealth marketing involves participants, in this case, fans, who do not know they are involved in an advertising scheme. For instance, the popular Minecon Minecraft conference event sessions have pushed their audience to develop the skills to become advocates and advertisers of their products, for example by showing audiences how to build a YouTube channel and sharing tips for growing a community. Targeting children in marketing ploys seems insidious. Marketing analyst Sandy Fleisher describes the value of outsourcing marketing to fan labourers:while Grand Theft Auto spent $120 million on marketing its latest release, Minecraft fans are being taught how to create and market promotional content themselves. One [example] is Minecraft YouTuber, SkydoesMinecraft. His nearly 7 million strong YouTube army, almost as big as Justin Bieber’s, means his daily videos enjoy a lot of views; 1,419,734,267 to be precise. While concerns about meaningful consent that practices like this raise have led some government bodies, and consumer and child protection groups to advocate restrictions for children, other critics have questioned the limits placed on children’s free expression by such restrictions. Tech commentator Larry Magid has written that, “In the interest of protecting children, we sometimes deny them the right to access material and express themselves.” Meghan M. Sweeney notes that “the surge in collaborative web models and the emphasis on interactivity—frequently termed Web 2.0—has meant that children are not merely targets of global media organizations” but have “multiple opportunities to be active, critical, and resistant producers”...and ”may be active agents in the production and dissemination of information” (68). Nevertheless, writes Sweeney, “corporate entities can have restrictive effects on consumers” (68), by for example, limiting imaginative play to the choices offered on a Disney website, or limiting imaginative topics to commercial products (toys, video games etc), as in YouTube review videos. Automedia is an important site from which to consider young children’s online practices in public spheres. Jacob’s performance is indeed meant to influence the choice to buy a toy, but it is also meant to influence others in knowing Jacob as an identity. He means to share and circulate his self. Julie Rak recalls Paul John Eakin’s claims about life-writing that the “process does not even occur at the level of writing, but at the level of living, so that identity formation is the result of narrative-building.” We view Jacob’s performance along these lines. Kinder Playtime offers him a constrained, parent-sanctioned (albeit commercialised) space for role-playing, a practice bound up with identity-formation in the life of most children. To think through the legality of recognising Jacob’s automedial content as his life, Rak is also useful: “In Eakin’s work in particular, we can see evidence of John Locke’s contention that identity is the expression of consciousness which is continuous over time, but that identity is also a product, one’s own property which is a legal entity”. We have argued that children are often caught in the paradox that defines them either as literate digital creators composing and circulating their online selves or as subjectified personas caught up in commercial advertising practices that use their lives for commercial gain. However, through close observation of individual children, one who we met and questioned in our study, Cayden, the other who we met through his mediated, commercialized, and circulated online persona, Jacob, we argue that child social influencers need consideration as autobiographical agents expressing themselves through automediality. As children create, edit, and grow digital traces of their lives and selves, how these texts are framed becomes increasingly important, in part because their future adult selves have such a stake in the matter: they are being formed through automedia. Moreover, these children’s coming of age may bring legal questions about the ownership of their automedial products such as YouTube videos, an enduring legacy they are leaving behind for their adult selves. Crucially, if we reduce identity performances such as unboxing, toy review videos, and other forms of children’s fan marketing to pure advertisement, we cannot afford Jacob and other child influencers the agency that their self representation is legally and artistically their own.ReferencesAbidin, Crystal. “#familygoals: Family Influencers, Calibrated Amateurism, and Justifying Young Digital Labor.” Social Media + Society 3.2 (2017): 1-15.Andrejevic, Mark. “Privacy, Exploitation, and the Digital Enclosure.” Amsterdam Law Forum 1.4 (2009). <http://amsterdamlawforum.org/article/view/94/168>.Atkins, Bridgette, Isabel Pedersen, Shirley Van Nuland, and Samantha Reid. “A Glimpse into the Kids, Creative Storyworlds and Wearables Project: A Work-in-Progress.” ICET 60th World Assembly: Teachers for a Better World: Creating Conditions for Quality Education – Pedagogy, Policy and Professionalism. 2017. 49-60.Beer, David, and Roger Burrows. “Popular Culture, Digital Archives and the New Social Life of Data.” Theory, Culture & Society 30.4 (2013): 47–71.Brophy, Sarah, and Janice Hladki. Introduction. Pedagogy, Image Practices, and Contested Corporealities. Eds. Sarah Brophy and Janice Hladki. New York, NY: Routledge, 2014. 1-6.Craig, David, and Stuart Cunningham. “Toy Unboxing: Living in a(n Unregulated) Material World.” Media International Australia 163.1 (2017): 77-86.Fleischer, Sandy. “Watch Out for That Creeper: What Minecraft Teaches Us about Marketing.” Digital Marketing Magazine. 30 May 2014. <http://digitalmarketingmagazine.co.uk/articles/watch-out-for-that-creeper-what-minecraft-teaches-us-about-marketing>.James, Allison, and Adrian James. Key Concepts in Childhood Studies. London: Sage, 2012.Jenkins, Henry. The Childhood Reader. New York: NYU P, 1998.Jenks, Chris. Childhood. 2nd ed. London: Routledge, 2015.Kennedy, Ümit. "Exploring YouTube as a Transformative Tool in the 'The Power of MAKEUP!' Movement." M/C Journal 19.4 (2016). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1127>.———. “The Vulnerability of Contemporary Digital Autobiography” a/b: Auto/Biography Studies 32.2 (2017): 409-411.Kinder Playtime. “VTech Kidizoom Smart Watch DX Review by Kinder Playtime.” YouTube, 4 Nov. 2015. <https://www.youtube.com/watch?v=JaxCSjwZjcA&t=28s>.Magid, Larry. “Protecting Children Online Needs to Allow for Their Right to Free Speech.” ConnectSafely 29 Aug. 2014. <http://www.connectsafely.org/protecting-children-online-needs-to-allow-for-their-right-to-free-speech/>.Maguire, Emma. “Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website.” M/C Journal 17.3 (2014). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/821>.Marsh, Jackie. “‘Unboxing’ Videos: Co-construction of the Child as Cyberflâneur.” Discourse: Studies in the Cultural Politics of Education 37.3 (2016): 369-380.Nansen, Bjorn. “Accidental, Assisted, Automated: An Emerging Repertoire of Infant Mobile Media Techniques.” M/C Journal 18.5 (2015). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1026>.———, and Benjamin Nicoll. “Toy Unboxing Videos and the Mimetic Production of Play.” Paper presented at the 18th Annual Conference of Internet Researchers (AoIR), Tartu, Estonia. 2017.Palfrey, John, and Urs Gasser. Born Digital: How Children Grow Up in a Digital Age. New York: Basic Books, 2016.Pedersen, Isabel, and Kristen Aspevig. “‘My Eyes Ended Up at My Fingertips, My Ears, My Nose, My Mouth’: Antoine, Autobiographical Documentary, and the Cinematic Depiction of a Blind Child Subject.” Biography: An Interdisciplinary Quarterly 34.4 (2011).Pedersen, Isabel, and Kristen Aspevig. “‘Swept to the Sidelines and Forgotten’: Cultural Exclusion, Blind Persons’ Participation, and International Film Festivals.” Canadian Journal of Disability Studies 3.3 (2014): 29-52.Rak, Julie. “First Person? Life Writing versus Automedia.” International Association for Biography and Autobiography Europe (IABA Europe). Vienna, Austria. 30 Oct. – 3 Nov. 2013.Smith, Sidonie. “The Autobiographical Manifesto.” Ed. Shirely Neuman. Autobiography and Questions of Gender. London: Frank Cass, 1991.———, and Julia Watson. Reading Autobiography. Minneapolis: U of Minnesota P, 2010.———. “Virtually Me: A Toolbox about Online Self-Presentation.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison: U of Wisconsin P, 2014. 70-95.Sweeney, Meghan. “‘Where Happily Ever After Happens Every Day’: Disney's Official Princess Website and the Commodification of Play.” Jeunesse: Young People, Texts, Cultures 3.2 (2011): 66-87.Uhls, Yalda, and Particia Greenfield. “The Value of Fame: Preadolescent Perceptions of Popular Media and Their Relationship to Future Aspirations.” Developmental Psychology 48.2 (2012): 315-326.YouTube. “YouTube for Press.” 2017. <https://www.youtube.com/yt/about/press/>.
APA, Harvard, Vancouver, ISO, and other styles
50

Fredericks, Bronwyn, and Abraham Bradfield. "‘I’m Not Afraid of the Dark’." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2761.

Full text
Abstract:
Introduction Darkness is often characterised as something that warrants heightened caution and scrutiny – signifying increased danger and risk. Within settler-colonial settings such as Australia, cautionary and negative connotations of darkness are projected upon Black people and their bodies, forming part of continuing colonial regimes of power (Moreton-Robinson). Negative stereotypes of “dark” continues to racialise all Indigenous peoples. In Australia, Indigenous peoples are both Indigenous and Black regardless of skin colour, and this plays out in a range of ways, some of which will be highlighted within this article. This article demonstrates that for Indigenous peoples, associations of fear and danger are built into the structural mechanisms that shape and maintain colonial understandings of Indigenous peoples and their bodies. It is this embodied form of darkness, and its negative connotations, and responses that we explore further. Figure 1: Megan Cope’s ‘I’m not afraid of the Dark’ t-shirt (Fredericks and Heemsbergen 2021) Responding to the anxieties and fears of settlers that often surround Indigenous peoples, Quandamooka artist and member of the art collective ProppaNow, Megan Cope, has produced a range of t-shirts, one of which declares “I’m not afraid of the Dark” (fig. 1). The wording ‘reflects White Australia’s fear of blackness’ (Dark + Dangerous). Exploring race relations through the theme of “darkness”, we begin by discussing how negative connotations of darkness are represented through everyday lexicons and how efforts to shift prejudicial and racist language are often met with defensiveness and resistance. We then consider how fears towards the dark translate into everyday practices, reinforced by media representations. The article considers how stereotype, conjecture, and prejudice is inflicted upon Indigenous people and reflects white settler fears and anxieties, rooting colonialism in everyday language, action, and norms. The Language of Fear Indigenous people and others with dark skin tones are often presented as having a proclivity towards threatening, aggressive, deceitful, and negative behaviours. This works to inform how Indigenous peoples are “known” and responded to by hegemonic (predominantly white) populations. Negative connotations of Indigenous people are a means of reinforcing and legitimising the falsity that European knowledge systems, norms, and social structures are superior whilst denying the contextual colonial circumstances that have led to white dominance. In Australia, such denial corresponds to the refusal to engage with the unceded sovereignty of Aboriginal peoples or acknowledge Indigenous resistance. Language is integral to the ways in which dominant populations come to “know” and present the so-called “Other”. Such language is reflected in digital media, which both produce and maintain white anxieties towards race and ethnicity. When part of mainstream vernacular, racialised language – and the value judgments associated with it – often remains in what Moreton-Robinson describes as “invisible regimes of power” (75). Everyday social structures, actions, and habits of thought veil oppressive and discriminatory attitudes that exist under the guise of “normality”. Colonisation and the dominance of Eurocentric ways of knowing, being, and doing has fixated itself on creating a normality that associates Indigeneity and darkness with negative and threatening connotations. In doing so, it reinforces power balances that presents an image of white superiority built on the invalidation of Indigeneity and Blackness. White fears and anxieties towards race made explicit through social and digital media are also manifest via subtle but equally pervasive everyday action (Carlson and Frazer; Matamoros-Fernández). Confronting and negotiating such fears becomes a daily reality for many Indigenous people. During the height of the 2020 Black Lives Matter protests in the United States, which extended to Australia and were linked to deaths in custody and police violence, African American poet Saul Williams reminded his followers of the power of language in constructing racialised fears (saulwilliams). In an Instagram post, Williams draws back the veil of an uncontested normality to ask that we take personal responsibility over the words we use. He writes: here’s a tip: Take the words DARK or BLACK in connection to bad, evil, ominous or scary events out of your vocabulary. We learn the stock market crashed on Black Monday, we read headlines that purport “Dark Days Ahead”. There’s “dark” or “black” humour which implies an undertone of evil, and then there are people like me who grow up with dark skin having to make sense of the English/American lexicon and its history of “fair complexions” – where “fair” can mean “light; blond.” OR “in accordance with rules or standards; legitimate.” We may not be fully responsible for the duplicitous evolution of language and subtle morphing of inherited beliefs into description yet we are in full command of the words we choose even as they reveal the questions we’ve left unasked. Like the work of Moreton-Robinson and other scholars, Williams implores his followers to take a reflexive position to consider the questions often left unasked. In doing so, he calls for the transcendence of anonymity and engagement with the realities of colonisation – no matter how ugly, confronting, and complicit one may be in its continuation. In the Australian context this means confronting how terms such as “dark”, “darkie”, or “darky” were historically used as derogatory and offensive slurs for Aboriginal peoples. Such language continues to be used today and can be found in the comment sections of social media, online news platforms, and other online forums (Carlson “Love and Hate”). Taking the move to execute personal accountability can be difficult. It can destabilise and reframe the ways in which we understand and interact with the world (Rose 22). For some, however, exposing racism and seemingly mundane aspects of society is taken as a personal attack which is often met with reactionary responses where one remains closed to new insights (Whittaker). This feeds into fears and anxieties pertaining to the perceived loss of power. These fears and anxieties continue to surface through conversations and calls for action on issues such as changing the date of Australia Day, the racialised reporting of news (McQuire), removing of plaques and statues known to be racist, and requests to change placenames and the names of products. For example, in 2020, Australian cheese producer Saputo Dairy Australia changed the name of it is popular brand “Coon” to “Cheer Tasty”. The decision followed a lengthy campaign led by Dr Stephen Hagan who called for the rebranding based on the Coon brand having racist connotations (ABC). The term has its racist origins in the United States and has long been used as a slur against people with dark skin, liking them to racoons and their tendency to steal and deceive. The term “Coon” is used in Australia by settlers as a racist term for referring to Aboriginal peoples. Claims that the name change is example of political correctness gone astray fail to acknowledge and empathise with the lived experience of being treated as if one is dirty, lazy, deceitful, or untrustworthy. Other brand names have also historically utilised racist wording along with imagery in their advertising (Conor). Pear’s soap for example is well-known for its historical use of racist words and imagery to legitimise white rule over Indigenous colonies, including in Australia (Jackson). Like most racial epithets, the power of language lies in how the words reflect and translate into actions that dehumanise others. The words we use matter. The everyday “ordinary” world, including online, is deeply politicised (Carlson and Frazer “They Got Filters”) and comes to reflect attitudes and power imbalances that encourage white people to internalise the falsity that they are superior and should have control over Black people (Conor). Decisions to make social change, such as that made by Saputo Dairy Australia, can manifest into further white anxieties via their ability to force the confrontation of the circumstances that continue to contribute to one’s own prosperity. In other words, to unveil the realities of colonialism and ask the questions that are too often left in the dark. Lived Experiences of Darkness Colonial anxieties and fears are driven by the fact that Black populations in many areas of the world are often characterised as criminals, perpetrators, threats, or nuisances, but are rarely seen as victims. In Australia, the repeated lack of police response and receptivity to concerns of Indigenous peoples expressed during the Black Lives Matter campaign saw tens of thousands of people take to the streets to protest. Protestors at the same time called for the end of police brutality towards Indigenous peoples and for an end to Indigenous deaths in custody. The protests were backed by a heavy online presence that sought to mobilise people in hope of lifting the veil that shrouds issues relating to systemic racism. There have been over 450 Aboriginal and Torres Strait Islander people to die in custody since the end of the Royal Commission into Aboriginal Deaths in Custody in 1991 (The Guardian). The tragedy of the Indigenous experience gains little attention internationally. The negative implications of being the object of white fear and anxiety are felt by Indigenous and other Black communities daily. The “safety signals” (Daniella Emanuel) adopted by white peoples in response to often irrational perceptions of threat signify how Indigenous and other Black peoples and communities are seen and valued by the hegemony. Memes played out in social media depicting “Karens” – a term that corresponds to caricaturised white women (but equally applicable to men) who exhibit behaviours of entitlement – have increasing been used in media to expose the prevalence of irrational racial fears (also see Wong). Police are commonly called on Indigenous people and other Black people for simply being within spaces such as shopping malls, street corners, parks, or other spaces in which they are considered not to belong (Mohdin). Digital media are also commonly envisioned as a space that is not natural or normal for Indigenous peoples, a notion that maintains narratives of so-called Indigenous primitivity (Carlson and Frazer). Media connotations of darkness as threatening are associated with, and strategically manipulated by, the images that accompany stories about Indigenous peoples and other Black peoples. Digital technologies play significant roles in producing and disseminating the images shown in the media. Moreover, they have a “role in mediating and amplifying old and new forms of abuse, hate, and discrimination” (Matamoros-Fernández and Farkas). Daniels demonstrates how social media sites can be spaces “where race and racism play out in interesting, sometimes disturbing, ways” (702), shaping ongoing colonial fears and anxieties over Black peoples. Prominent footballer Adam Goodes, for example, faced a string of attacks after he publicly condemned racism when he was called an “Ape” by a spectator during a game celebrating Indigenous contributions to the sport (Coram and Hallinan). This was followed by a barrage of personal attacks, criticisms, and booing that spread over the remaining years of his football career. When Goodes performed a traditional war dance as a form of celebration during a game in 2015, many turned to social media to express their outrage over his “confrontational” and “aggressive” behaviour (Robinson). Goodes’s affirmation of his Indigeneity was seen by many as a threat to their own positionality and white sensibility. Social media were therefore used as a mechanism to control settler narratives and maintain colonial power structures by framing the conversation through a white lens (Carlson and Frazer “They Got Filters”). Indigenous peoples in other highly visible fields have faced similar backlash. In 1993, Elaine George was the first Aboriginal person to feature on the cover of Vogue magazine, a decision considered “risky” at the time (Singer). The editor of Vogue later revealed that the cover was criticised by some who believed George’s skin tone was made to appear lighter than it actually was and that it had been digitally altered. The failure to accept a lighter skin colour as “Aboriginal” exposes a neglect to accept ethnicity and Blackness in all its diversity (Carlson and Frazer “They Got Filters”; Carlson “Love and Hate”). Where Adam Goodes was criticised for his overt expression of Blackness, George was critisised for not being “black enough”. It was not until seventeen years later that another Aboriginal model, Samantha Harris, was featured on the cover of Vogue (Marks). While George inspired and pathed the way for those to come, Harris experienced similar discrimination within the industry and amongst the public (Carson and Ky). Singer Jessica Mauboy (in Hornery) also explains how her identity was managed by others. She recalls, I was pretty young when I first received recognition, and for years I felt as though I couldn't show my true identity. What I was saying in public was very dictated by other people who could not handle my sense of culture and identity. They felt they had to take it off my hands. Mauboy’s experience not only demonstrates how Blackness continues to be seen as something to “handle”, but also how power imbalances play out. Scholar Chelsea Watego offers numerous examples of how this occurs in different ways and arenas, for example through relationships between people and within workplaces. Bargallie’s scholarly work also provides an understanding of how Indigenous people experience racism within the Australian public service, and how it is maintained through the structures and systems of power. The media often represents communities with large Indigenous populations as being separatist and not contributing to wider society and problematic (McQuire). Violence, and the threat of violence, is often presented in media as being normalised. Recently there have been calls for an increased police presence in Alice Springs, NT, and other remotes communities due to ongoing threats of “tribal payback” and acts of “lawlessness” (Sky News Australia; Hildebrand). Goldberg uses the phrase “Super/Vision” to describe the ways that Black men and women in Black neighbourhoods are continuously and erroneously supervised and surveilled by police using apparatus such as helicopters and floodlights. Simone Browne demonstrates how contemporary surveillance practices are rooted in anti-black domination and are operationalised through a white gaze. Browne uses the term “racializing surveillance” to describe a ”technology of social control where surveillance practices, policies, and performances concern the production of norms pertaining to race and exercise a ‘power to define what is in or out of place’” (16). The outcome is often discriminatory treatment to those negatively racialised by such surveillance. Narratives that associate Indigenous peoples with darkness and danger fuel colonial fears and uphold the invisible regimes of power by instilling the perception that acts of surveillance and the restrictions imposed on Indigenous peoples’ autonomy are not only necessary but justified. Such myths fail to contextualise the historic colonial factors that drive segregation and enable a forgetting that negates personal accountability and complicity in maintaining colonial power imbalances (Riggs and Augoustinos). Inayatullah and Blaney (165) write that the “myth we construct calls attention to a darker, tragic side of our ethical engagement: the role of colonialism in constituting us as modern actors.” They call for personal accountability whereby one confronts the notion that we are both products and producers of a modernity rooted in a colonialism that maintains the misguided notion of white supremacy (Wolfe; Mignolo; Moreton-Robinson). When Indigenous and other Black peoples enter spaces that white populations don’t traditionally associate as being “natural” or “fitting” for them (whether residential, social, educational, a workplace, online, or otherwise), alienation, discrimination, and criminalisation often occurs (Bargallie; Mohdin; Linhares). Structural barriers are erected, prohibiting career or social advancement while making the space feel unwelcoming (Fredericks; Bargallie). In workplaces, Indigenous employees become the subject of hyper-surveillance through the supervision process (Bargallie), continuing to make them difficult work environments. This is despite businesses and organisations seeking to increase their Indigenous staff numbers, expressing their need to change, and implementing cultural competency training (Fredericks and Bargallie). As Barnwell correctly highlights, confronting white fears and anxieties must be the responsibility of white peoples. When feelings of shock or discomfort arise when in the company of Indigenous peoples, one must reflexively engage with the reasons behind this “fear of the dark” and consider that perhaps it is they who are self-segregating. Mohdin suggests that spaces highly populated by Black peoples are best thought of not as “black spaces” or “black communities”, but rather spaces where white peoples do not want to be. They stand as reminders of a failed colonial regime that sought to deny and dehumanise Indigenous peoples and cultures, as well as the continuation of Black resistance and sovereignty. Conclusion In working towards improving relationships between Black and white populations, the truths of colonisation, and its continuing pervasiveness in local and global settings must first be confronted. In this article we have discussed the association of darkness with instinctual fears and negative responses to the unknown. White populations need to reflexively engage and critique how they think, act, present, address racism, and respond to Indigenous peoples (Bargallie; Moreton-Robinson; Whittaker), cultivating a “decolonising consciousness” (Bradfield) to develop new habits of thinking and relating. To overcome fears of the dark, we must confront that which remains unknown, and the questions left unasked. This means exposing racism and power imbalances, developing meaningful relationships with Indigenous peoples, addressing structural change, and implementing alternative ways of knowing and doing. Only then may we begin to embody Megan Cope’s message, “I’m not afraid of the Dark”. Acknowledgements We thank Dr Debbie Bargallie for her feedback on our article, which strengthened the work. References ABC News. "Coon Cheese Changes Name to Cheer Cheese, Pledging to 'Build a Culture of Acceptance'." 13 Jan. 2021. <https://www.abc.net.au/news/2021-01-13/coon-cheese-changes-name-cheer-racist-slur-stephen-hagan/13053524>. Alter, Adam L., et al. "The “Bad Is Black” Effect: Why People Believe Evildoers Have Darker Skin than Do-Gooders." Personality and Social Psychology Bulletin 42.12 (2016): 1653-1665. <https://doi.org/10.1177/0146167216669123>. Assari, Shervin, and Cleopatra Howard Caldwell. "Darker Skin Tone Increases Perceived Discrimination among Male but Not Female Caribbean Black Youth." Children 4.12 (2017): 107. <https://doi.org/10.3390/children4120107>. Attwood, Brian. The Making of the Aborigines. Routledge, 2020. Bargallie, Debbie. Unmasking the Racial Contract: Indigenous Voices on Racism in the Australian Public Service. Aboriginal Studies Press, 2020. Barnwell, William. "White Fears, Black People: Voluntary Segregation and How to Stop It." The Lens, 28 Jan 2020. 4 Aug. 2020 <https://thelensnola.org/2020/01/28/voluntary-segregation-and-how-to-stop-it/>. Bradfield, Abraham. "Decolonizing the Intercultural: A Call for Decolonizing Consciousness in Settler-Colonial Australia." Religions 10.8 (2019): 469. <https://www.mdpi.com/2077-1444/10/8/469>. Browne, Simone. Dark Matters: On the Surveillance of Blackness. Duke University Press, 2015. Carlson, Bronwyn. "Love and Hate at the Cultural Interface: Indigenous Australians and Dating Apps." Journal of Sociology 56.2 (2020): 133-50. <https://doi.org/10.1177%2F1440783319833181>. ———. The Politics of Identity: Who Counts as Aboriginal Today? Aboriginal Studies Press, 2016. Carlson, Bronwyn, and Ryan Frazer. Social Media Mob: Being Indigenous Online. Macquarie University, 2018. ———. "’They Got Filters’: Indigenous Social Media, the Settler Gaze, and a Politics of Hope." Social Media+ Society 6.2 (2017): 107. <https://doi.org/10.1177/2056305120925261>. Carson, Sarah, and Jenny Ky. "Samantha Harris Speaks Out on Racism in the Modelling Industry." 7 News, 2020. 29 Jan. 2021 <https://7news.com.au/the-morning-show/samantha-harris-speaks-out-on-racism-in-the-modelling-industry-c-1111266>. Conor, Liz. "Dove, Real Beauty and the Racist History of Skin Whitening." Mumbrella, 10 Oct. 2017. 15 Mar. 2021 <https://mumbrella.com.au/dove-real-beauty-racist-history-skin-whitening-476801>. Coram, Stella, and Chris Hallinan. "Critical Race Theory and the Orthodoxy of Race Neutrality: Examining the Denigration of Adam Goodes." Australian Aboriginal Studies 1 (2017): 99-111. <https://search.informit.com.au/documentSummary;dn=907032851637853;res=IELAPA>. Daniels, Jessie. “Race and Racism in Internet Studies: A Review and Critique.” New Media & Society 15.5 (2013): 695-719. Dark + Disturbing. "I’m Not Afraid of the Dark." 10 Dec. 2020 <https://www.darkanddisturbing.com.au/shop/im-not-afraid-of-the-dark/>. Doyle, Michael. “The Drum.” ABC TV, 15 Apr. 2021. <https://iview.abc.net.au/video/NC2107H054S00>. Emanuel, Daniella. "The Psychology of Black and Why We’re Scared of the Dark." CNN Health, 1 Sep . 2017. 5 Aug. 2020 <https://edition.cnn.com/2017/09/01/health/colorscope-black-fear-of-darkness/index.html>. Fredericks, Bronwyn. "Collaborative Creative Processes That Challenge Us as "Anomaly", and Affirm Our Indigeneity and Enact Our Sovereignty." M/C Journal 23.5 (2020). <https://doi.org/10.5204/mcj.1674>. ———. "'We Don't Leave Our Identities at the City Limits': Aboriginal and Torres Strait Islander People Living in Urban Localities." Australian Aboriginal Studies 1 (2013): 4-16. <https://search.informit.org/doi/abs/10.3316/informit.422915104662241>. Fredericks, Bronwyn, and Debbie Bargallie. “Situating Race in Cultural Competency Training: A Site of Self-Revelation.” M/C Journal 23.4 (2020). <https://journal.media-culture.org.au/index.php/mcjournal/article/view/1660>. Goldberg, David Theo. Racial Subjects: Writing on Race in America. Psychology Press, 1997. Grewal, Daisy "The "Bad Is Black" Effect." Scientific American 17 Jan. 2017. 5 Dec. 2020 <https://www.scientificamerican.com/article/the-bad-is-black-effect/>. Hebl, Michelle R., et al. "Selectively Friending: Racial Stereotypicality and Social Rejection." Journal of Experimental Social Psychology 48.6 (2012): 1329-1335. <https://doi.org/10.1016/j.jesp.2012.05.019>. Hildebrand, Joe. "Jacinta Price Exposes Hypocrisy of ‘So-Called Progressives’ on Indigenous Violence ‘Epidemic’." Sky News Australia, 2021. 19 Apr. 2021 <https://www.skynews.com.au/details/_6249296751001>. Hornery, Andrew. "Jessica Mauboy Is Discovering Her Much-Loved Voice Can Do More than Just Sing." The Age, 17 Dec. 2019. 28 Jan. 2021 <https://www.theage.com.au/culture/celebrity/jessica-mauboy-is-discovering-her-much-loved-voice-can-do-more-than-just-sing-20191217-p53kpz.html>. Inayatullah, Naeem, and David L. Blaney. "The Dark Heart of Kindness: The Social Construction of Deflection." International Studies Perspectives 13.2 (2012): 164-175. <https://www.jstor.org/stable/44218688>. Jackson, Lauren Michele. “We Need to Talk about Digital Blackface in Reaction GIFs.” Teen Vogue, 2 Aug. 2017. <https://www.teenvogue.com/story/digital-blackface-reaction-gifs>. Jackson, Kathleen. "'Nulla-Nulla: Australia’s White Hope, the Best Household Soap' 1920s." 18 1 (2015): 70-74. <https://www.researchgate.net/profile/Jillian_Barnes/publication/306379190_Representation_and_Power_A_Picture_is_Worth_a_Thousand_Words_-_'Nulla-Nulla_Australia's_White_Hope_The_Best_Household_Soap'_1920s/links/57bbf86e08ae9fdf82ef41d6/Representation-and-Power-A-Picture-is-Worth-a-Thousand-Words-Nulla-Nulla-Australias-White-Hope-The-Best-Household-Soap-1920s.pdf>. Jackson, Reggie. "Scared while White: Hysteria about Peple of Color due to Paranoid Fear of Retribution." Milwaukee Independent, 14 May 2018. 4 Aug. 2020 <http://www.milwaukeeindependent.com/featured/scared-white-hysteria-people-color-due-paranoid-fear-retribution/>. Kahn, Kimberly Barsamian, and Paul G. Davies. "Differentially Dangerous? Phenotypic Racial Stereotypicality Increases Implicit Bias among Ingroup and Outgroup Members." Group Processes & Intergroup Relations 14.4 (2011): 569-580. <https://doi.org/10.1177/1368430210374609>. Kahn, Kimberly Barsamian, et al. "Protecting Whiteness: White Phenotypic Racial Stereotypicality Reduces Police Use of Force." Social Psychological and Personality Science 7.5 (2016): 403-411. <https://doi.org/10.1177/1948550616633505>. Kibria, Nazli, et al. "Imagining the Radicalized Muslim: Race, Anti-Muslim Discourse, and Media Narratives of the 2013 Boston Marathon Bombers." Sociology of Race and Ethnicity 4.2 (2018): 192-205. <https://doi.org/10.1177/2332649217731113>. Lawrence, John. "Indigenous Lives Matter." Arena Magazine 163 (Dec. 2019): 22-24. <https://search-informit-org.ezproxy.library.uq.edu.au/doi/10.3316/informit.920791245017394>. Linhares, Zachary. "Overcoming Our Fear of Black Skin." UMKC: University News, 19 Oct. 2016. 5 Aug. 2020 <https://info.umkc.edu/unews/overcoming-our-fear-of-black-skin/>. Loury, Glenn C. "When Black Lives Matter: Thoughts on the Persistence of Racial Inequality in America." Horizons: Journal of International Relations and Sustainable Development 17 (2020): 190-207. DOI:10.2307/48590573. Marks, Kathy. "Australian Fashionistas Embrace the New Aboriginal Face of ‘Vogue’." Independent, 2011. 29 Jan. 2021 <https://www.independent.co.uk/news/world/australasia/australian-fashionistas-embrace-new-aboriginal-face-vogue-1970013.html>. Matamoros-Fernández, Ariadna. “Platformed Racism: The Mediation and Circulation of an Australian Race-Based Controversy on Twitter, Facebook and YouTube.” Information, Communication & Society 20.6 (2017): 930–46. Matamoros- Fernández, Ariadna, and Johan Farkas. “Racism, Hate Speech, and Social Media: A Systemic Review and Critique.” Television & New Media 22.2 (2021): 205-224. McQuire, Amy. “Black and White Witness.” Meanjin Quarterly, 2019. <https://meanjin.com.au/essays/black-and-white-witness/>. Mignolo, Walter. Local Histories/Global Designs: Coloniality, Subaltern Knowledges, and Border Thinking. Princeton University Press, 2012. Mohdin, Aamna. "Us History Explains That White Fear Is Just Another Way to Enforce Racial Segregation." Quartz, 25 May 2018. 4 Aug. 2020 <https://qz.com/1288067/us-history-explains-that-white-fear-of-black-people-is-just-another-tool-to-enforce-racial-segregation/>. Moreton-Robinson, Aileen. "Whiteness, Epistemology and Indigenous Representation." Whitening Race: Essays in Social and Cultural Criticism. Ed. Aileen Moreton-Robinson. Aboriginal Studies Press, 2004. 75-88. Quadrant. "Stan Grant Given a Good Tanning." Quadrant, 29 Aug. 2017. 25 Feb. 2021 <https://quadrant.org.au/stan-grant-given-good-tanning/>. Riggs, Damien W., and Martha Augoustinos. "The Psychic Life of Colonial Power: Racialised Subjectivities, Bodies and Methods." Journal of Community & Applied Social Psychology 15.6 (2005): 461-477. <https://doi.org/10.1002/casp.838>. Riggs, Damien Wayne. "Benevolence and the Management of Stake: On Being 'Good White People'." Philament 4 (Aug. 2004). <http://hdl.handle.net/2328/14258>. Robinson, Mark. "Adam Goodes’ War Cry Social Media Reaction Shows We’re at War with Ourselves, Says Mark Robinson." Herald Sun, 2015. 13 Jan. 2021 <https://www.news.com.au/adam-goodes-war-cry-social-media-reaction-shows-were-at-war-with-ourselves-says-mark-robinson/news-story/b553ef775ceb9611132a0502456eff35>. Rose, Deborah Bird. Reports from a Wild Country: Ethics for Decolonisation. Sydney: University of New South Wales Press, 2004. saulwilliams. "Here’s a Tip." Instagram, 3 June 2020. <https://www.instagram.com/p/CA8Na0LheY3/?igshid=1vxmglle09nl2>. Schaller, M., et al. "Fear of the Dark: Interactive Effects of Beliefs about Danger and Ambient Darkness on Ethnic Stereotypes." Pers Soc Psychol Bull 29.5 (2003): 637-649. DOI:10.1177/0146167203029005008. Singer, Melissa. "The ‘Risky’ Vogue Cover That Made History but Almost Never Happened." Sydney Morning Herald, 18 Sep. 2020. 18 Jan. 2021 <https://www.smh.com.au/lifestyle/fashion/the-risky-vogue-cover-that-made-history-but-almost-never-happened-20200918-p55wxo.html>. Sky News Australia. "Police Presence Needed to Counter Indigenous ‘Tribal Oayback’ Traditions: Price." 2021. 19 Apr. 2021 <https://www.skynews.com.au/details/_6249296751001>. The Guardian. "Deaths Inside: Every Indigenous Death in Custody since 2008." 10 Dec. 2020 <https://www.theguardian.com/australia-news/ng-interactive/2018/aug/28/deaths-inside-indigenous-australian-deaths-in-custody>. Watego, Chelsea. “Because She Is Black.” IndigenousX, 28 May 2018. <https://indigenousx.com.au/chelsea-bond-because-she-is-black/>. ———. “The Irony of the Aboriginal academic.” IndigenousX, 20 May 2018. <https://indigenousx.com.au/chelsea-bond-the-irony-of-the-aboriginal-academic/>. Westbrook, Dmitri C. "Opinion Editorial: Why Is It That So Many White People Fear Black Men?" College Student Affairs Leadership 1.2 (2014). <http://scholarworks.gvsu.edu/csal/vol1/iss2/4>. Whittaker, Alison. “So White. So What.” Meanjin Quarterly (Autumn 2020). <https://meanjin.com.au/essays/so-white-so-what/>. Wolfe, Patrick. "Settler Colonialism and the Elimination of the Native." Journal of Genocide Research 8.4 (2006): 387-409. DOI:10.1080/14623520601056240. Wong, Julia "The Year of Karen: How a Meme Changed the Way Americans Talked about Racism." The Guardian, 27 Dec. 2020. 15 Jan. 2021 <https://www.theguardian.com/world/2020/dec/27/karen-race-white-women-black-americans-racism>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography