Journal articles on the topic 'Mining corporations Australia Information services'

To see the other types of publications on this topic, follow the link: Mining corporations Australia Information services.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 journal articles for your research on the topic 'Mining corporations Australia Information services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Idrees, Amira M., and Ayman E. Khedr. "A Collaborative Mining-Based Decision Support Model for Granting Personal Loans in the Banking Sector." International Journal of E-Services and Mobile Applications 14, no. 1 (January 2022): 1–23. http://dx.doi.org/10.4018/ijesma.296573.

Full text
Abstract:
One main potential objective for financial corporations is to retain long-term customers. Configuring customer knowledge is no doubt mandatory to lower the risk level. Loans and credit cards granting are two services that are offered by the banking corporations which can be categorized as high-risk services. Therefore, it is highly recommended for the corporations to have intelligent support for providing an accurate granting decision which naturally leads to minimizing the associated risk. In this research, a decision support model is proposed for loans granting. The proposed model applies a set of data mining techniques in a collaborative environment that aims at applying different techniques with considering their results according to the technique’s evaluation weight. The proposed model results present the recommendation for each customer’s loan granting a request to be either accepted or rejected. The proposed approach has been applied the on a loan granting dataset and the evaluation results revealed its superiority by 92% success in reaching high accurate decisions.
APA, Harvard, Vancouver, ISO, and other styles
2

Amoako, Kwame Oduro, Beverley R. Lord, and Keith Dixon. "Sustainability reporting." Meditari Accountancy Research 25, no. 2 (June 5, 2017): 186–215. http://dx.doi.org/10.1108/medar-02-2016-0020.

Full text
Abstract:
Purpose Sustainability reporting serves as a means of communication between corporations and their stakeholders on sustainability issues. This study aims to identify and account for the contents of sustainability reporting communicated through the websites of the plants in five continents of the same multinational mining corporation. Design/methodology/approach This study uses data published by Newmont Mining Corporation. The corporation has regional headquarters in five continents: Africa, Asia, Australia and North America and South America. The data were drawn from the websites of the five plants adjacent to those regional headquarters. Economic, environmental and social aspects of sustainability as reported by each plant were identified; to do so, a disclosure analysis based on the elements of the Global Reporting Initiative and the United Nations Division for Sustainability Development was used. These aspects were then compared and contrasted to highlight if, and to what extent, institutional isomorphism influences variations in sustainability disclosures among plants compared with the parent company. Findings It was found that most of the reporting about sustainability matters comprises narratives; there were also a few physical measures but very little financial information. Notwithstanding that the websites of all five plants used similar headings, the contents of reports differed. The reports from the plants in Australia, South America and Africa were more comprehensive than those from the plants in Asia and North America. The authors attribute these differences to institutionalisation of location-specific characteristics, including management discretion, legislation and societal pressures influencing sustainability reporting. The authors argue that managers responsible for preparing sustainability reports and who work essentially as sustainability accountants should develop templates and measures to raise the standard and comprehensiveness of reports for improved communication, information and behaviour. Originality/value Extant studies on sustainability reporting have focused mainly on comparisons between sustainability reports published by different corporations or sustainability reports published in different years by the same corporation. The authors believe that this is one of the first studies to have examined differences in sustainability information published by different subsidiaries within the same large corporation and the first to show how concurrent disclosures can differ.
APA, Harvard, Vancouver, ISO, and other styles
3

Buttery, Alan, and Rick Tamaschke. "Marketing Decision Support Systems and Australian Businesses: A Queensland Case Study and Implications Towards 2000." Journal of Management & Organization 3, no. 1 (January 1997): 51–58. http://dx.doi.org/10.1017/s183336720000599x.

Full text
Abstract:
AbstractLittle is known about the extent to which the Marketing Decision Support System (MDSS) technology is currently used in Australia, or about the scope for the technology in Australia towards the year 2000. This paper reports the results of recent survey research into MDSS in Queensland by industry sector (agriculture and mining, manufacturing, construction, and services). The results suggest that there is an urgent need to boost the pace of MDSS development in all industry sectors, and that this should be given a high priority in government policy initiatives to enhance Australia's competitive advantage. It is possible, otherwise, that the present gap in information usage between Australia and its competitors will widen, with consequent negative implications for the nation's current account deficit, foreign debt and unemployment.
APA, Harvard, Vancouver, ISO, and other styles
4

Buttery, Alan, and Rick Tamaschke. "Marketing Decision Support Systems and Australian Businesses: A Queensland Case Study and Implications Towards 2000." Journal of the Australian and New Zealand Academy of Management 3, no. 1 (January 1997): 51–58. http://dx.doi.org/10.5172/jmo.1997.3.1.51.

Full text
Abstract:
AbstractLittle is known about the extent to which the Marketing Decision Support System (MDSS) technology is currently used in Australia, or about the scope for the technology in Australia towards the year 2000. This paper reports the results of recent survey research into MDSS in Queensland by industry sector (agriculture and mining, manufacturing, construction, and services). The results suggest that there is an urgent need to boost the pace of MDSS development in all industry sectors, and that this should be given a high priority in government policy initiatives to enhance Australia's competitive advantage. It is possible, otherwise, that the present gap in information usage between Australia and its competitors will widen, with consequent negative implications for the nation's current account deficit, foreign debt and unemployment.
APA, Harvard, Vancouver, ISO, and other styles
5

Cox, Andrew M., Mary Anne Kennan, Liz Lyon, Stephen Pinfield, and Laura Sbaffi. "Maturing research data services and the transformation of academic libraries." Journal of Documentation 75, no. 6 (September 26, 2019): 1432–62. http://dx.doi.org/10.1108/jd-12-2018-0211.

Full text
Abstract:
Purpose A major development in academic libraries in the last decade has been recognition of the need to support research data management (RDM). The purpose of this paper is to capture how library research data services (RDS) have developed and to assess the impact of this on the nature of academic libraries. Design/methodology/approach Questionnaire responses from libraries in Australia, Canada, Germany, Ireland, the Netherlands, New Zealand, the UK and USA from 2018 are compared to a previous data set from 2014. Findings The evidence supports a picture of the spread of RDS, especially advisory ones. However, future ambitions do not seem to have seen much evolution. There is limited evidence of organisational change and skills shortages remain. Most service development can be explained as the extension of traditional library services to research data. Yet there remains the potential for transformational impacts, when combined with the demands implied by other new services such as around text and data mining, bibliometrics and artificial intelligence. A revised maturity model is presented that summarises typical stages of development of services, structures and skills. Research limitations/implications The research models show how RDS are developing. It also reflects on the extent to which RDM represents a transformation of the role of academic libraries. Practical implications Practitioners working in the RDM arena can benchmark their current practices and future plans against wider patterns. Originality/value The study offers a clear picture of the evolution of research data services internationally and proposes a maturity model to capture typical stages of development. It contributes to the wider discussion of how the nature of academic libraries are changing.
APA, Harvard, Vancouver, ISO, and other styles
6

Gide, Ergun, and Shakir Karim. "A comprehensive analysis on the adaption of Big Data in e-commerce: Overview of small to midsized enterprises-smes in Australia." Global Journal of Computer Sciences: Theory and Research 6, no. 2 (April 16, 2017): 54–67. http://dx.doi.org/10.18844/gjcs.v6i2.1476.

Full text
Abstract:
Big Data contains every part of aspects of existence, as well as personal actions, disciplines and corporations. Big Data promises to make the world more demanding and helps to take the prompt decisions not only on the basis of limited knowledge of expertise but also on the huge quantity of data from the realism. The gathering, exercise, distribution and networking of Big Data associates economic, legal, social, ethical and political issues may result possible positive and negative results. This report provides a primary analysis of economic, legal, social, ethical and political issues in e-commerce contents-SMEs in Australia that are relevant to the consequences formed by Big Data. Identifying the subjects can help in an improved and clear perceptive of extents for prospective development and advance within the Big Data industry and support e-commerce sector of Australia. This paper mainly has used secondary research method to provide an extensive investigation of the positive and negative consequences of issues relevant to Big Data, the architects of the consequences and those exaggerated by the consequences. The secondary study is subject to journal articles, reports, media articles, corporation based documents and other appropriate information. The study found that Big Data and e-commerce are steadily transforming the way businesses to be conducted and changing the small to midsized enterprises in Australia. Big Data and e-commerce can provide quicker and trustworthy services to the potential and happy clients. They not only can develop new competitive advantages, also can improve relationships with customers and make better the economy by increasing effectiveness and behind the small to mid-sized new business models and innovation. Keywords: big data, economic, ethical and political ıssues, e-commerce, small to midsized enterprise-smes.
APA, Harvard, Vancouver, ISO, and other styles
7

Gomes da Silva, Jonas. "Thailand Performance and Best Management Practices that saved lives against Covid-19: a comparison against ten critical countries." International Journal for Innovation Education and Research 8, no. 11 (November 1, 2020): 119–54. http://dx.doi.org/10.31686/ijier.vol8.iss11.2725.

Full text
Abstract:
After 265 days, since the first reported case of Covid-19, the world has reported the lost of almost one million (969.018) precious lives (WORLDOMETERS, 2020). The pandemic is a challenge for all countries, most of them eager to learn from nations that are successful against the virus. In addition, an international survey, published on April/20, by Silva (2020, p. 600), concluded that although no country is prepared to face epidemics and pandemics (NTI, JHU, and EIU, 2019), among the 16 countries investigated, Thailand, Finland, Australia, South Korea, Denmark, and Sweden are cases that Brazil could study so as not to repeat the scenarios of China, USA, Italy, and Spain. Thus, this study investigates the performance and the best management practices adopted in Thailand to save lives against Covid-19, during the first 180 days facing the pandemic. The research is useful for academy, government policymakers and authorities. It is descriptive, with the application of an online questionnaire, bibliographic and documentary research, involving the study of official sites, articles, reports, manuals, and other technical documents. A new indicator was developed (Fatality Total Index), which allowed to identify that among 20 nations with the highest number of fatal cases, the ten most critical are 1st) Mexico; 2nd) Peru; 3rd) Italy; 4th) Ecuador; 5th) Iran; 6th) Chile; 7th) UK; 8th) Belgium; 9th) Colombia; and 10th) Brazil. Some conclusions are: first) Thailand`s FTI180 is the very low, indicating that this country has learned from the lessons of the past, reason by which is the best at saving lives against the Covid-19; Third) for 86 respondents living in Thailand, wear mask, not shake hands, not hug in public, wash hands, and not wearing shoes in the house, were the five most decisive cultural practices that saved lives; Fourth) For 96 respondents living in Thailand, the ten main policy measures adopted by Thailand Government that saved lives against the Covid-19 are: first) international travel control; 2nd) public event cancellations; 3rd) schools closures; 4th) restriction on internal movement; 5th) workplaces closures; 6th) public information campaigns; 7th) effective public-private collaboration; 8th) increase the medical and personal equipment capacity; 9th) support the expansion of testing system, and 10th) wage subsidies for workers; Fifth) to save lives against Covid-19, 28 innovative products or services were identified in Thailand, with majority led by Corporations, Universities, followed by Public Sector, Start Ups, and Others.
APA, Harvard, Vancouver, ISO, and other styles
8

Nandi, Sulakshana. "Reiterating the Importance of Publicly Funded and Provided Primary Healthcare for Non-communicable Diseases: The Case of India Comment on "Universal Health Coverage for Non-communicable Diseases and Health Equity: Lessons From Australian Primary Healthcare"." International Journal of Health Policy and Management, September 22, 2021. http://dx.doi.org/10.34172/ijhpm.2021.137.

Full text
Abstract:
India has established health and wellness centres (HWCs) and appointed mid-level healthcare providers (community health officers, CHOs) to provide free and comprehensive primary healthcare (PHC), through screening, prevention, control, management and treatment for non-communicable diseases (NCDs), in addition to existing services for communicable diseases, and reproductive and child health. The range of services being provided and the number of people accessing ambulatory care in these government centres have increased, leading to more equitable healthcare access and financial protection. In policy debates, contestations exist prioritising between PHC or hospital services, and between publicly-provided healthcare or privatised and "purchased" services. Nationally and globally the influence of industries and corporations in health governance has weakened the response against NCDs. PHC initiatives for NCDs must be publicly funded and provided, located within communities, and necessitate action on the determinants of health. The experiences from Australia (a high-income country) and India (a low-and middle-income country) amply illustrate this.
APA, Harvard, Vancouver, ISO, and other styles
9

Iliadis, Andrew James, and Amelia Acker. "THE SEER AND THE SEEN: A SURVEY OF TOPICS FOUND IN PALANTIR PATENTS." AoIR Selected Papers of Internet Research, September 15, 2021. http://dx.doi.org/10.5210/spir.v2021i0.12187.

Full text
Abstract:
Palantir is one of the most secretive technology firms in the US. The company supplies information technology (IT) solutions to governments, nonprofits, and corporations, focusing on data integration and surveillance services. To investigate Palantir’s opaque technology practices, this article presents findings from a topic modeling of Palantir patents (n=155) filed from 2006-2019 in the US, Germany, Australia, UK, and EU. This approach follows recent literature that uses patents as data for researching opaque IT firms. We begin by summarizing scholarship on Palantir and IT for policing, intelligence, and security. Our findings show that Palantir’s IT produces infrastructural layers of meaning/context via metadata that are wrapped ‘on top’ of previously held legacy data. We thus use the concept of infrastructuring to understand Palantir’s practices, where information standards like metadata are theorized as phenomena for structuring social worlds. The paper ends by offering action items for future research into opaque IT firms.
APA, Harvard, Vancouver, ISO, and other styles
10

Jones, Russell, Marcus Cattani, Martyn Cross, Jessica Boylan, Alan Holmes, Colin Boothroyd, and Joan Mattingley. "Serious injuries in the mining industry: preparing the emergency response." Australasian Journal of Paramedicine 16 (May 1, 2019). http://dx.doi.org/10.33151/ajp.16.652.

Full text
Abstract:
IntroductionParamedics are employed by Australian and international mining and petroleum organisations to provide emergency medical response, injury prevention, health promotion, chronic disease management, medical referral, primary healthcare and repatriation co-ordination for miners in exploration, construction and production. These are challenging roles given the often isolated, potentially hazardous and clinically unpredictable nature of the sites where these paramedics work. The purpose of this article is to review injuries that occurred in the mining industry with a view to sharing this information with paramedics who work within the mining sector. Methods Data was collected under legislative authority by the Western Australian Department of Mines, Industry Regulation and Safety (DMIRS). Data efficacy was optimised via strong legislative support whereby all organisations involved in mining activities are legally compelled to report to the DMIRS all accidents involving injury. ResultsA total of 837 injuries were reported during the 6-month period between 1 July and 31 December 2013. These comprised 658 serious injuries, including three fatalities, and 179 minor injuries. Sprains and strains were the most common injury comprising 69% of injuries followed by fractures 10%, lacerations 6%, crushing injuries 5%, bruises and contusions 4%, and dislocations and displacements 2%. Foreign bodies, punctures, bites, amputations, chemical effects, thermal burns, flash and arc burns and loss of consciousness each recorded less than 1% of the injuries.ConclusionFindings presented in this article can be used by paramedics working in the mining sector across Australia and worldwide. Paramedic awareness of the nature and cause of injury is useful for optimally preparing paramedics to perform appropriate diagnosis and treatment and to minimise patient mortality and morbidity.
APA, Harvard, Vancouver, ISO, and other styles
11

Santos, Andrey Schmidt dos, Luis Felipe Riehs Camargo, and Daniel Pacheco Lacerda. "Evaluation of classification techniques for identifying fake reviews about products and services on the internet." Gestão & Produção 27, no. 4 (2020). http://dx.doi.org/10.1590/0104-530x4672-20.

Full text
Abstract:
Abstract: With the e-commerce growth, more people are buying products over the internet. To increase customer satisfaction, merchants provide spaces for product and service reviews. Products with positive reviews attract customers, while products with negative reviews lose customers. Following this idea, some individuals and corporations write fake reviews to promote their products and services or defame their competitors. The difficulty for finding these reviews was in the large amount of information available. One solution is to use data mining techniques and tools, such as the classification function. Exploring this situation, the present work evaluates classification techniques to identify fake reviews about products and services on the Internet. The research also presents a literature systematic review on fake reviews. The research used 8 classification algorithms. The algorithms were trained and tested with a hotels database. The CONCENSO algorithm presented the best result, with 88% in the precision indicator. After the first test, the algorithms classified reviews on another hotels database. To compare the results of this new classification, the Review Skeptic algorithm was used. The SVM and GLMNET algorithms presented the highest convergence with the Review Skeptic algorithm, classifying 83% of reviews with the same result. The research contributes by demonstrating the algorithms ability to understand consumers’ real reviews to products and services on the Internet. Another contribution is to be the pioneer in the investigation of fake reviews in Brazil and in production engineering.
APA, Harvard, Vancouver, ISO, and other styles
12

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text
Abstract:
Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisements which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.
APA, Harvard, Vancouver, ISO, and other styles
13

"Economic prospects for cooperation the European Union and Ukraine in the use of blockchain technologies." Journal of Economics and International Relations, no. 12 (2020). http://dx.doi.org/10.26565/2310-9513-2020-12-01.

Full text
Abstract:
The article is devoted to the research of the possibilities of cooperation between the European Union (EU) and Ukraine in the use of blockchain technologies. The transition to the blockchain allows to minimise costs and maximise the results of economic activity. The experience of using blockchain technologies by world corporations is analysed. The subject of the research in the article is the potential of economic cooperation between the EU and Ukraine in the field of implementation and use of blockchain technologies. The purpose of the article is to find out the economic prospects of cooperation between the EU and Ukraine in the use of blockchain technologies. Tasks: researching of tendencies of development of blockchain technologies and possible variants of their implantation in activity of the Ukraine’s enterprises, searching for benefits from cooperation between Ukraine and the EU in the field of use of blockchain technologies. General scientific used research methods: analysis – to determine the peculiarities of the use of blockchain technologies in the EU, synthesis – to find opportunities for cooperation between Ukraine and the EU in the use of blockchain technologies. The obtained results: based on the analysis of the dynamics of changes in the field of enterprise technology, problematic aspects are identified and the main advantages of the transition from the traditional management model to blockchain platforms are identified, and the economic benefits of locating mining farms in Ukraine compared to some EU countries are calculated. Conclusions: using of blockchain technologies by modern enterprises gives them a number of competitive advantages, including saving on labor costs, increased information security, reduced costs for quality control of products/services, etc. Blockchain allows to promote more sustainable cooperation between EU and Ukrainian companies not only in trade, but also in industry, finance and energy. By implementing joint blockchain systems with the EU, Ukraine can provide mining with low costs for electricity and wages.
APA, Harvard, Vancouver, ISO, and other styles
14

Goggin, Gerard. "Broadband." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2219.

Full text
Abstract:
Connecting I’ve moved house on the weekend, closer to the centre of an Australian capital city. I had recently signed up for broadband, with a major Australian Internet company (my first contact, cf. Turner). Now I am the proud owner of a larger modem than I have ever owned: a white cable modem. I gaze out into our new street: two thick black cables cosseted in silver wire. I am relieved. My new home is located in one of those streets, double-cabled by Telstra and Optus in the data-rush of the mid-1990s. Otherwise, I’d be moth-balling the cable modem, and the thrill of my data percolating down coaxial cable. And it would be off to the computer supermarket to buy an ASDL modem, then to pick a provider, to squeeze some twenty-first century connectivity out of old copper (the phone network our grandparents and great-grandparents built). If I still lived in the country, or the outskirts of the city, or anywhere else more than four kilometres from the phone exchange, and somewhere that cable pay TV will never reach, it would be a dish for me — satellite. Our digital lives are premised upon infrastructure, the networks through which we shape what we do, fashion the meanings of our customs and practices, and exchange signs with others. Infrastructure is not simply the material or the technical (Lamberton), but it is the dense, fibrous knotting together of social visions, cultural resources, individual desires, and connections. No more can one easily discern between ‘society’ and ‘technology’, ‘carriage’ and ‘content’, ‘base’ and ‘superstructure’, or ‘infrastructure’ and ‘applications’ (or ‘services’ or ‘content’). To understand telecommunications in action, or the vectors of fibre, we need to consider the long and heterogeneous list of links among different human and non-human actors — the long networks, to take Bruno Latour’s evocative concept, that confect our broadband networks (Latour). The co-ordinates of our infrastructure still build on a century-long history of telecommunications networks, on the nineteenth-century centrality of telegraphy preceding this, and on the histories of the public and private so inscribed. Yet we are in the midst of a long, slow dismantling of the posts-telegraph-telephone (PTT) model of the monopoly carrier for each nation that dominated the twentieth century, with its deep colonial foundations. Instead our New World Information and Communication Order is not the decolonising UNESCO vision of the late 1970s and early 1980s (MacBride, Maitland). Rather it is the neoliberal, free trade, market access model, its symbol the 1984 US judicial decision to require the break-up of AT&T and the UK legislation in the same year that underpinned the Thatcherite twin move to privatize British Telecom and introduce telecommunications competition. Between 1984 and 1999, 110 telecommunications companies were privatized, and the ‘acquisition of privatized PTOs [public telecommunications operators] by European and American operators does follow colonial lines’ (Winseck 396; see also Mody, Bauer & Straubhaar). The competitive market has now been uneasily installed as the paradigm for convergent communications networks, not least with the World Trade Organisation’s 1994 General Agreement on Trade in Services and Annex on Telecommunications. As the citizen is recast as consumer and customer (Goggin, ‘Citizens and Beyond’), we rethink our cultural and political axioms as well as the axes that orient our understandings in this area. Information might travel close to the speed of light, and we might fantasise about optical fibre to the home (or pillow), but our terrain, our band where the struggle lies today, is narrower than we wish. Begging for broadband, it seems, is a long way from warchalking for WiFi. Policy Circuits The dreary everyday business of getting connected plugs the individual netizen into a tangled mess of policy circuits, as much as tricky network negotiations. Broadband in mid-2003 in Australia is a curious chimera, welded together from a patchwork of technologies, old and newer communications industries, emerging economies and patterns of use. Broadband conjures up grander visions, however, of communication and cultural cornucopia. Broadband is high-speed, high-bandwidth, ‘always-on’, networked communications. People can send and receive video, engage in multimedia exchanges of all sorts, make the most of online education, realise the vision of home-based work and trading, have access to telemedicine, and entertainment. Broadband really entered the lexicon with the mass takeup of the Internet in the early to mid-1990s, and with the debates about something called the ‘information superhighway’. The rise of the Internet, the deregulation of telecommunications, and the involuted convergence of communications and media technologies saw broadband positioned at the centre of policy debates nearly a decade ago. In 1993-1994, Australia had its Broadband Services Expert Group (BSEG), established by the then Labor government. The BSEG was charged with inquiring into ‘issues relating to the delivery of broadband services to homes, schools and businesses’. Stung by criticisms of elite composition (a narrow membership, with only one woman among its twelve members, and no consumer or citizen group representation), the BSEG was prompted into wider public discussion and consultation (Goggin & Newell). The then Bureau of Transport and Communications Economics (BTCE), since transmogrified into the Communications Research Unit of the Department of Communications, Information Technology and the Arts (DCITA), conducted its large-scale Communications Futures Project (BTCE and Luck). The BSEG Final report posed the question starkly: As a society we have choices to make. If we ignore the opportunities we run the risk of being left behind as other countries introduce new services and make themselves more competitive: we will become consumers of other countries’ content, culture and technologies rather than our own. Or we could adopt new technologies at any cost…This report puts forward a different approach, one based on developing a new, user-oriented strategy for communications. The emphasis will be on communication among people... (BSEG v) The BSEG proposed a ‘National Strategy for New Communications Networks’ based on three aspects: education and community access, industry development, and the role of government (BSEG x). Ironically, while the nation, or at least its policy elites, pondered the weighty question of broadband, Australia’s two largest telcos were doing it. The commercial decision of Telstra/Foxtel and Optus Vision, and their various television partners, was to nail their colours (black) to the mast, or rather telegraph pole, and to lay cable in the major capital cities. In fact, they duplicated the infrastructure in cities such as Sydney and Melbourne, then deciding it would not be profitable to cable up even regional centres, let alone small country towns or settlements. As Terry Flew and Christina Spurgeon observe: This wasteful duplication contrasted with many other parts of the country that would never have access to this infrastructure, or to the social and economic benefits that it was perceived to deliver. (Flew & Spurgeon 72) The implications of this decision for Australia’s telecommunications and television were profound, but there was little, if any, public input into this. Then Minister Michael Lee was very proud of his anti-siphoning list of programs, such as national sporting events, that would remain on free-to-air television rather than screen on pay, but was unwilling, or unable, to develop policy on broadband and pay TV cable infrastructure (on the ironies of Australia’s television history, see Given’s masterly account). During this period also, it may be remembered, Australia’s Internet was being passed into private hands, with the tendering out of AARNET (see Spurgeon for discussion). No such national strategy on broadband really emerged in the intervening years, nor has the market provided integrated, accessible broadband services. In 1997, landmark telecommunications legislation was enacted that provided a comprehensive framework for competition in telecommunications, as well as consolidating and extending consumer protection, universal service, customer service standards, and other reforms (CLC). Carrier and reseller competition had commenced in 1991, and the 1997 legislation gave it further impetus. Effective competition is now well established in long distance telephone markets, and in mobiles. Rivalrous competition exists in the market for local-call services, though viable alternatives to Telstra’s dominance are still few (Fels). Broadband too is an area where there is symbolic rivalry rather than effective competition. This is most visible in advertised ADSL offerings in large cities, yet most of the infrastructure for these services is comprised by Telstra’s copper, fixed-line network. Facilities-based duopoly competition exists principally where Telstra/Foxtel and Optus cable networks have been laid, though there are quite a number of ventures underway by regional telcos, power companies, and, most substantial perhaps, the ACT government’s TransACT broadband network. Policymakers and industry have been greatly concerned about what they see as slow takeup of broadband, compared to other countries, and by barriers to broadband competition and access to ‘bottleneck’ facilities (such as Telstra or Optus’s networks) by potential competitors. The government has alternated between trying to talk up broadband benefits and rates of take up and recognising the real difficulties Australia faces as a large country with a relative small and dispersed population. In March 2003, Minister Alston directed the ACCC to implement new monitoring and reporting arrangements on competition in the broadband industry. A key site for discussion of these matters has been the competition policy institution, the Australian Competition and Consumer Commission, and its various inquiries, reports, and considerations (consult ACCC’s telecommunications homepage at http://www.accc.gov.au/telco/fs-telecom.htm). Another key site has been the Productivity Commission (http://www.pc.gov.au), while a third is the National Office on the Information Economy (NOIE - http://www.noie.gov.au/projects/access/access/broadband1.htm). Others have questioned whether even the most perfectly competitive market in broadband will actually provide access to citizens and consumers. A great deal of work on this issue has been undertaken by DCITA, NOIE, the regulators, and industry bodies, not to mention consumer and public interest groups. Since 1997, there have been a number of governmental inquiries undertaken or in progress concerning the takeup of broadband and networked new media (for example, a House of Representatives Wireless Broadband Inquiry), as well as important inquiries into the still most strategically important of Australia’s companies in this area, Telstra. Much of this effort on an ersatz broadband policy has been piecemeal and fragmented. There are fundamental difficulties with the large size of the Australian continent and its harsh terrain, the small size of the Australian market, the number of providers, and the dominant position effectively still held by Telstra, as well as Singtel Optus (Optus’s previous overseas investors included Cable & Wireless and Bell South), and the larger telecommunications and Internet companies (such as Ozemail). Many consumers living in metropolitan Australia still face real difficulties in realising the slogan ‘bandwidth for all’, but the situation in parts of rural Australia is far worse. Satellite ‘broadband’ solutions are available, through Telstra Countrywide or other providers, but these offer limited two-way interactivity. Data can be received at reasonable speeds (though at far lower data rates than how ‘broadband’ used to be defined), but can only be sent at far slower rates (Goggin, Rural Communities Online). The cultural implications of these digital constraints may well be considerable. Computer gamers, for instance, are frustrated by slow return paths. In this light, the final report of the January 2003 Broadband Advisory Group (BAG) is very timely. The BAG report opens with a broadband rhapsody: Broadband communications technologies can deliver substantial economic and social benefits to Australia…As well as producing productivity gains in traditional and new industries, advanced connectivity can enrich community life, particularly in rural and regional areas. It provides the basis for integration of remote communities into national economic, cultural and social life. (BAG 1, 7) Its prescriptions include: Australia will be a world leader in the availability and effective use of broadband...and to capture the economic and social benefits of broadband connectivity...Broadband should be available to all Australians at fair and reasonable prices…Market arrangements should be pro-competitive and encourage investment...The Government should adopt a National Broadband Strategy (BAG 1) And, like its predecessor nine years earlier, the BAG report does make reference to a national broadband strategy aiming to maximise “choice in work and recreation activities available to all Australians independent of location, background, age or interests” (17). However, the idea of a national broadband strategy is not something the BAG really comes to grips with. The final report is keen on encouraging broadband adoption, but not explicit on how barriers to broadband can be addressed. Perhaps this is not surprising given that the membership of the BAG, dominated by representatives of large corporations and senior bureaucrats was even less representative than its BSEG predecessor. Some months after the BAG report, the Federal government did declare a broadband strategy. It did so, intriguingly enough, under the rubric of its response to the Regional Telecommunications Inquiry report (Estens), the second inquiry responsible for reassuring citizens nervous about the full-privatisation of Telstra (the first inquiry being Besley). The government’s grand $142.8 million National Broadband Strategy focusses on the ‘broadband needs of regional Australians, in partnership with all levels of government’ (Alston, ‘National Broadband Strategy’). Among other things, the government claims that the Strategy will result in “improved outcomes in terms of services and prices for regional broadband access; [and] the development of national broadband infrastructure assets.” (Alston, ‘National Broadband Strategy’) At the same time, the government announced an overall response to the Estens Inquiry, with specific safeguards for Telstra’s role in regional communications — a preliminary to the full Telstra sale (Alston, ‘Future Proofing’). Less publicised was the government’s further initiative in indigenous telecommunications, complementing its Telecommunications Action Plan for Remote Indigenous Communities (DCITA). Indigenous people, it can be argued, were never really contemplated as citizens with the ken of the universal service policy taken to underpin the twentieth-century government monopoly PTT project. In Australia during the deregulatory and re-regulatory 1990s, there was a great reluctance on the part of Labor and Coalition Federal governments, Telstra and other industry participants, even to research issues of access to and use of telecommunications by indigenous communicators. Telstra, and to a lesser extent Optus (who had purchased AUSSAT as part of their licence arrangements), shrouded the issue of indigenous communications in mystery that policymakers were very reluctant to uncover, let alone systematically address. Then regulator, the Australian Telecommunications Authority (AUSTEL), had raised grave concerns about indigenous telecommunications access in its 1991 Rural Communications inquiry. However, there was no government consideration of, nor research upon, these issues until Alston commissioned a study in 2001 — the basis for the TAPRIC strategy (DCITA). The elision of indigenous telecommunications from mainstream industry and government policy is all the more puzzling, if one considers the extraordinarily varied and significant experiments by indigenous Australians in telecommunications and Internet (not least in the early work of the Tanami community, made famous in media and cultural studies by the writings of anthropologist Eric Michaels). While the government’s mid-2003 moves on a ‘National Broadband Strategy’ attend to some details of the broadband predicament, they fall well short of an integrated framework that grasps the shortcomings of the neoliberal communications model. The funding offered is a token amount. The view from the seat of government is a glance from the rear-view mirror: taking a snapshot of rural communications in the years 2000-2002 and projecting this tableau into a safety-net ‘future proofing’ for the inevitable turning away of a fully-privately-owned Telstra from its previously universal, ‘carrier of last resort’ responsibilities. In this aetiolated, residualist policy gaze, citizens remain constructed as consumers in a very narrow sense in this incremental, quietist version of state securing of market arrangements. What is missing is any more expansive notion of citizens, their varied needs, expectations, uses, and cultural imaginings of ‘always on’ broadband networks. Hybrid Networks “Most people on earth will eventually have access to networks that are all switched, interactive, and broadband”, wrote Frances Cairncross in 1998. ‘Eventually’ is a very appropriate word to describe the parlous state of broadband technology implementation. Broadband is in a slow state of evolution and invention. The story of broadband so far underscores the predicament for Australian access to bandwidth, when we lack any comprehensive, integrated, effective, and fair policy in communications and information technology. We have only begun to experiment with broadband technologies and understand their evolving uses, cultural forms, and the sense in which they rework us as subjects. Our communications networks are not superhighways, to invoke an enduring artefact from an older technology. Nor any longer are they a single ‘public’ switched telecommunications network, like those presided over by the post-telegraph-telephone monopolies of old. Like roads themselves, or the nascent postal system of the sixteenth century, broadband is a patchwork quilt. The ‘fibre’ of our communications networks is hybrid. To be sure, powerful corporations dominate, like the Tassis or Taxis who served as postmasters to the Habsburg emperors (Briggs & Burke 25). Activating broadband today provides a perspective on the path dependency of technology history, and how we can open up new threads of a communications fabric. Our options for transforming our multitudinous networked lives emerge as much from everyday tactics and strategies as they do from grander schemes and unifying policies. We may care to reflect on the waning potential for nation-building technology, in the wake of globalisation. We no longer gather our imagined community around a Community Telephone Plan as it was called in 1960 (Barr, Moyal, and PMG). Yet we do require national and international strategies to get and stay connected (Barr), ideas and funding that concretely address the wider dimensions of access and use. We do need to debate the respective roles of Telstra, the state, community initiatives, and industry competition in fair telecommunications futures. Networks have global reach and require global and national integration. Here vision, co-ordination, and resources are urgently required for our commonweal and moral fibre. To feel the width of the band we desire, we need to plug into and activate the policy circuits. Thanks to Grayson Cooke, Patrick Lichty, Ned Rossiter, John Pace, and an anonymous reviewer for helpful comments. Works Cited Alston, Richard. ‘ “Future Proofing” Regional Communications.’ Department of Communications, Information Technology and the Arts, Canberra, 2003. 17 July 2003 <http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115485,00.php> —. ‘A National Broadband Strategy.’ Department of Communications, Information Technology and the Arts, Canberra, 2003. 17 July 2003 <http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115486,00.php>. Australian Competition and Consumer Commission (ACCC). Broadband Services Report March 2003. Canberra: ACCC, 2003. 17 July 2003 <http://www.accc.gov.au/telco/fs-telecom.htm>. —. Emerging Market Structures in the Communications Sector. Canberra: ACCC, 2003. 15 July 2003 <http://www.accc.gov.au/pubs/publications/utilities/telecommu... ...nications/Emerg_mar_struc.doc>. Barr, Trevor. new media.com: The Changing Face of Australia’s Media and Telecommunications. Sydney: Allen & Unwin, 2000. Besley, Tim (Telecommunications Service Inquiry). Connecting Australia: Telecommunications Service Inquiry. Canberra: Department of Information, Communications and the Arts, 2000. 17 July 2003 <http://www.telinquiry.gov.au/final_report.php>. Briggs, Asa, and Burke, Peter. A Social History of the Internet: From Gutenberg to the Internet. Cambridge: Polity, 2002. Broadband Advisory Group. Australia’s Broadband Connectivity: The Broadband Advisory Group’s Report to Government. Melbourne: National Office on the Information Economy, 2003. 15 July 2003 <http://www.noie.gov.au/publications/NOIE/BAG/report/index.htm>. Broadband Services Expert Group. Networking Australia’s Future: Final Report. Canberra: Australian Government Publishing Service (AGPS), 1994. Bureau of Transport and Communications Economics (BTCE). Communications Futures Final Project. Canberra: AGPS, 1994. Cairncross, Frances. The Death of Distance: How the Communications Revolution Will Change Our Lives. London: Orion Business Books, 1997. Communications Law Centre (CLC). Australian Telecommunications Regulation: The Communications Law Centre Guide. 2nd edition. Sydney: Communications Law Centre, University of NSW, 2001. Department of Communications, Information Technology and the Arts (DCITA). Telecommunications Action Plan for Remote Indigenous Communities: Report on the Strategic Study for Improving Telecommunications in Remote Indigenous Communities. Canberra: DCITA, 2002. Estens, D. Connecting Regional Australia: The Report of the Regional Telecommunications Inquiry. Canberra: DCITA, 2002. <http://www.telinquiry.gov.au/rti-report.php>, accessed 17 July 2003. Fels, Alan. ‘Competition in Telecommunications’, speech to Australian Telecommunications Users Group 19th Annual Conference. 6 March, 2003, Sydney. <http://www.accc.gov.au/speeches/2003/Fels_ATUG_6March03.doc>, accessed 15 July 2003. Flew, Terry, and Spurgeon, Christina. ‘Television After Broadcasting’. In The Australian TV Book. Ed. Graeme Turner and Stuart Cunningham. Allen & Unwin, Sydney. 69-85. 2000. Given, Jock. Turning Off the Television. Sydney: UNSW Press, 2003. Goggin, Gerard. ‘Citizens and Beyond: Universal service in the Twilight of the Nation-State.’ In All Connected?: Universal Service in Telecommunications, ed. Bruce Langtry. Melbourne: University of Melbourne Press, 1998. 49-77 —. Rural Communities Online: Networking to link Consumers to Providers. Melbourne: Telstra Consumer Consultative Council, 2003. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Disability in New Media. Lanham, MD: Rowman & Littlefield, 2003. House of Representatives Standing Committee on Communications, Information Technology and the Arts (HoR). Connecting Australia!: Wireless Broadband. Report of Inquiry into Wireless Broadband Technologies. Canberra: Parliament House, 2002. <http://www.aph.gov.au/house/committee/cita/Wbt/report.htm>, accessed 17 July 2003. Lamberton, Don. ‘A Telecommunications Infrastructure is Not an Information Infrastructure’. Prometheus: Journal of Issues in Technological Change, Innovation, Information Economics, Communication and Science Policy 14 (1996): 31-38. Latour, Bruno. Science in Action: How to Follow Scientists and Engineers Through Society. Cambridge, MA: Harvard University Press, 1987. Luck, David. ‘Revisiting the Future: Assessing the 1994 BTCE communications futures project.’ Media International Australia 96 (2000): 109-119. MacBride, Sean (Chair of International Commission for the Study of Communication Problems). Many Voices, One World: Towards a New More Just and More Efficient World Information and Communication Order. Paris: Kegan Page, London. UNESCO, 1980. Maitland Commission (Independent Commission on Worldwide Telecommunications Development). The Missing Link. Geneva: International Telecommunications Union, 1985. Michaels, Eric. Bad Aboriginal Art: Tradition, Media, and Technological Horizons. Sydney: Allen & Unwin, 1994. Mody, Bella, Bauer, Johannes M., and Straubhaar, Joseph D., eds. Telecommunications Politics: Ownership and Control of the Information Highway in Developing Countries. Mahwah, NJ: Erlbaum, 1995. Moyal, Ann. Clear Across Australia: A History of Telecommunications. Melbourne: Thomas Nelson, 1984. Post-Master General’s Department (PMG). Community Telephone Plan for Australia. Melbourne: PMG, 1960. Productivity Commission (PC). Telecommunications Competition Regulation: Inquiry Report. Report No. 16. Melbourne: Productivity Commission, 2001. <http://www.pc.gov.au/inquiry/telecommunications/finalreport/>, accessed 17 July 2003. Spurgeon, Christina. ‘National Culture, Communications and the Information Economy.’ Media International Australia 87 (1998): 23-34. Turner, Graeme. ‘First Contact: coming to terms with the cable guy.’ UTS Review 3 (1997): 109-21. Winseck, Dwayne. ‘Wired Cities and Transnational Communications: New Forms of Governance for Telecommunications and the New Media’. In The Handbook of New Media: Social Shaping and Consequences of ICTs, ed. Leah A. Lievrouw and Sonia Livingstone. London: Sage, 2002. 393-409. World Trade Organisation. General Agreement on Trade in Services: Annex on Telecommunications. Geneva: World Trade Organisation, 1994. 17 July 2003 <http://www.wto.org/english/tratop_e/serv_e/12-tel_e.htm>. —. Fourth protocol to the General Agreement on Trade in Services. Geneva: World Trade Organisation. 17 July 2003 <http://www.wto.org/english/tratop_e/serv_e/4prote_e.htm>. Links http://www.accc.gov.au/pubs/publications/utilities/telecommunications/Emerg_mar_struc.doc http://www.accc.gov.au/speeches/2003/Fels_ATUG_6March03.doc http://www.accc.gov.au/telco/fs-telecom.htm http://www.aph.gov.au/house/committee/cita/Wbt/report.htm http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115485,00.html http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115486,00.html http://www.noie.gov.au/projects/access/access/broadband1.htm http://www.noie.gov.au/publications/NOIE/BAG/report/index.htm http://www.pc.gov.au http://www.pc.gov.au/inquiry/telecommunications/finalreport/ http://www.telinquiry.gov.au/final_report.html http://www.telinquiry.gov.au/rti-report.html http://www.wto.org/english/tratop_e/serv_e/12-tel_e.htm http://www.wto.org/english/tratop_e/serv_e/4prote_e.htm Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Goggin, Gerard. "Broadband" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/02-featurebroadband.php>. APA Style Goggin, G. (2003, Aug 26). Broadband. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/02-featurebroadband.php>
APA, Harvard, Vancouver, ISO, and other styles
15

Noyce, Diana Christine. "Coffee Palaces in Australia: A Pub with No Beer." M/C Journal 15, no. 2 (May 2, 2012). http://dx.doi.org/10.5204/mcj.464.

Full text
Abstract:
The term “coffee palace” was primarily used in Australia to describe the temperance hotels that were built in the last decades of the 19th century, although there are references to the term also being used to a lesser extent in the United Kingdom (Denby 174). Built in response to the worldwide temperance movement, which reached its pinnacle in the 1880s in Australia, coffee palaces were hotels that did not serve alcohol. This was a unique time in Australia’s architectural development as the economic boom fuelled by the gold rush in the 1850s, and the demand for ostentatious display that gathered momentum during the following years, afforded the use of richly ornamental High Victorian architecture and resulted in very majestic structures; hence the term “palace” (Freeland 121). The often multi-storied coffee palaces were found in every capital city as well as regional areas such as Geelong and Broken Hill, and locales as remote as Maria Island on the east coast of Tasmania. Presented as upholding family values and discouraging drunkenness, the coffee palaces were most popular in seaside resorts such as Barwon Heads in Victoria, where they catered to families. Coffee palaces were also constructed on a grand scale to provide accommodation for international and interstate visitors attending the international exhibitions held in Sydney (1879) and Melbourne (1880 and 1888). While the temperance movement lasted well over 100 years, the life of coffee palaces was relatively short-lived. Nevertheless, coffee palaces were very much part of Australia’s cultural landscape. In this article, I examine the rise and demise of coffee palaces associated with the temperance movement and argue that coffee palaces established in the name of abstinence were modelled on the coffee houses that spread throughout Europe and North America in the 17th and 18th centuries during the Enlightenment—a time when the human mind could be said to have been liberated from inebriation and the dogmatic state of ignorance. The Temperance Movement At a time when newspapers are full of lurid stories about binge-drinking and the alleged ill-effects of the liberalisation of licensing laws, as well as concerns over the growing trend of marketing easy-to-drink products (such as the so-called “alcopops”) to teenagers, it is difficult to think of a period when the total suppression of the alcohol trade was seriously debated in Australia. The cause of temperance has almost completely vanished from view, yet for well over a century—from 1830 to the outbreak of the Second World War—the control or even total abolition of the liquor trade was a major political issue—one that split the country, brought thousands onto the streets in demonstrations, and influenced the outcome of elections. Between 1911 and 1925 referenda to either limit or prohibit the sale of alcohol were held in most States. While moves to bring about abolition failed, Fitzgerald notes that almost one in three Australian voters expressed their support for prohibition of alcohol in their State (145). Today, the temperance movement’s platform has largely been forgotten, killed off by the practical example of the United States, where prohibition of the legal sale of alcohol served only to hand control of the liquor traffic to organised crime. Coffee Houses and the Enlightenment Although tea has long been considered the beverage of sobriety, it was coffee that came to be regarded as the very antithesis of alcohol. When the first coffee house opened in London in the early 1650s, customers were bewildered by this strange new drink from the Middle East—hot, bitter, and black as soot. But those who tried coffee were, reports Ellis, soon won over, and coffee houses were opened across London, Oxford, and Cambridge and, in the following decades, Europe and North America. Tea, equally exotic, entered the English market slightly later than coffee (in 1664), but was more expensive and remained a rarity long after coffee had become ubiquitous in London (Ellis 123-24). The impact of the introduction of coffee into Europe during the seventeenth century was particularly noticeable since the most common beverages of the time, even at breakfast, were weak “small beer” and wine. Both were safer to drink than water, which was liable to be contaminated. Coffee, like beer, was made using boiled water and, therefore, provided a new and safe alternative to alcoholic drinks. There was also the added benefit that those who drank coffee instead of alcohol began the day alert rather than mildly inebriated (Standage 135). It was also thought that coffee had a stimulating effect upon the “nervous system,” so much so that the French called coffee une boisson intellectuelle (an intellectual beverage), because of its stimulating effect on the brain (Muskett 71). In Oxford, the British called their coffee houses “penny universities,” a penny then being the price of a cup of coffee (Standage 158). Coffee houses were, moreover, more than places that sold coffee. Unlike other institutions of the period, rank and birth had no place (Ellis 59). The coffee house became the centre of urban life, creating a distinctive social culture by treating all customers as equals. Egalitarianism, however, did not extend to women—at least not in London. Around its egalitarian (but male) tables, merchants discussed and conducted business, writers and poets held discussions, scientists demonstrated experiments, and philosophers deliberated ideas and reforms. For the price of a cup (or “dish” as it was then known) of coffee, a man could read the latest pamphlets and newsletters, chat with other patrons, strike business deals, keep up with the latest political gossip, find out what other people thought of a new book, or take part in literary or philosophical discussions. Like today’s Internet, Twitter, and Facebook, Europe’s coffee houses functioned as an information network where ideas circulated and spread from coffee house to coffee house. In this way, drinking coffee in the coffee house became a metaphor for people getting together to share ideas in a sober environment, a concept that remains today. According to Standage, this information network fuelled the Enlightenment (133), prompting an explosion of creativity. Coffee houses provided an entirely new environment for political, financial, scientific, and literary change, as people gathered, discussed, and debated issues within their walls. Entrepreneurs and scientists teamed up to form companies to exploit new inventions and discoveries in manufacturing and mining, paving the way for the Industrial Revolution (Standage 163). The stock market and insurance companies also had their birth in the coffee house. As a result, coffee was seen to be the epitome of modernity and progress and, as such, was the ideal beverage for the Age of Reason. By the 19th century, however, the era of coffee houses had passed. Most of them had evolved into exclusive men’s clubs, each geared towards a certain segment of society. Tea was now more affordable and fashionable, and teahouses, which drew clientele from both sexes, began to grow in popularity. Tea, however, had always been Australia’s most popular non-alcoholic drink. Tea (and coffee) along with other alien plants had been part of the cargo unloaded onto Australian shores with the First Fleet in 1788. Coffee, mainly from Brazil and Jamaica, remained a constant import but was taxed more heavily than tea and was, therefore, more expensive. Furthermore, tea was much easier to make than coffee. To brew tea, all that is needed is to add boiling water, coffee, in contrast, required roasting, grinding and brewing. According to Symons, until the 1930s, Australians were the largest consumers of tea in the world (19). In spite of this, and as coffee, since its introduction into Europe, was regarded as the antidote to alcohol, the temperance movement established coffee palaces. In the early 1870s in Britain, the temperance movement had revived the coffee house to provide an alternative to the gin taverns that were so attractive to the working classes of the Industrial Age (Clarke 5). Unlike the earlier coffee house, this revived incarnation provided accommodation and was open to men, women and children. “Cheap and wholesome food,” was available as well as reading rooms supplied with newspapers and periodicals, and games and smoking rooms (Clarke 20). In Australia, coffee palaces did not seek the working classes, as clientele: at least in the cities they were largely for the nouveau riche. Coffee Palaces The discovery of gold in 1851 changed the direction of the Australian economy. An investment boom followed, with an influx of foreign funds and English banks lending freely to colonial speculators. By the 1880s, the manufacturing and construction sectors of the economy boomed and land prices were highly inflated. Governments shared in the wealth and ploughed money into urban infrastructure, particularly railways. Spurred on by these positive economic conditions and the newly extended inter-colonial rail network, international exhibitions were held in both Sydney and Melbourne. To celebrate modern technology and design in an industrial age, international exhibitions were phenomena that had spread throughout Europe and much of the world from the mid-19th century. According to Davison, exhibitions were “integral to the culture of nineteenth century industrialising societies” (158). In particular, these exhibitions provided the colonies with an opportunity to demonstrate to the world their economic power and achievements in the sciences, the arts and education, as well as to promote their commerce and industry. Massive purpose-built buildings were constructed to house the exhibition halls. In Sydney, the Garden Palace was erected in the Botanic Gardens for the 1879 Exhibition (it burnt down in 1882). In Melbourne, the Royal Exhibition Building, now a World Heritage site, was built in the Carlton Gardens for the 1880 Exhibition and extended for the 1888 Centennial Exhibition. Accommodation was required for the some one million interstate and international visitors who were to pass through the gates of the Garden Palace in Sydney. To meet this need, the temperance movement, keen to provide alternative accommodation to licensed hotels, backed the establishment of Sydney’s coffee palaces. The Sydney Coffee Palace Hotel Company was formed in 1878 to operate and manage a number of coffee palaces constructed during the 1870s. These were designed to compete with hotels by “offering all the ordinary advantages of those establishments without the allurements of the drink” (Murdoch). Coffee palaces were much more than ordinary hotels—they were often multi-purpose or mixed-use buildings that included a large number of rooms for accommodation as well as ballrooms and other leisure facilities to attract people away from pubs. As the Australian Town and Country Journal reveals, their services included the supply of affordable, wholesome food, either in the form of regular meals or occasional refreshments, cooked in kitchens fitted with the latest in culinary accoutrements. These “culinary temples” also provided smoking rooms, chess and billiard rooms, and rooms where people could read books, periodicals and all the local and national papers for free (121). Similar to the coffee houses of the Enlightenment, the coffee palaces brought businessmen, artists, writers, engineers, and scientists attending the exhibitions together to eat and drink (non-alcoholic), socialise and conduct business. The Johnson’s Temperance Coffee Palace located in York Street in Sydney produced a practical guide for potential investors and businessmen titled International Exhibition Visitors Pocket Guide to Sydney. It included information on the location of government departments, educational institutions, hospitals, charitable organisations, and embassies, as well as a list of the tariffs on goods from food to opium (1–17). Women, particularly the Woman’s Christian Temperance Union (WCTU) were a formidable force in the temperance movement (intemperance was generally regarded as a male problem and, more specifically, a husband problem). Murdoch argues, however, that much of the success of the push to establish coffee palaces was due to male politicians with business interests, such as the one-time Victorian premiere James Munro. Considered a stern, moral church-going leader, Munro expanded the temperance movement into a fanatical force with extraordinary power, which is perhaps why the temperance movement had its greatest following in Victoria (Murdoch). Several prestigious hotels were constructed to provide accommodation for visitors to the international exhibitions in Melbourne. Munro was responsible for building many of the city’s coffee palaces, including the Victoria (1880) and the Federal Coffee Palace (1888) in Collins Street. After establishing the Grand Coffee Palace Company, Munro took over the Grand Hotel (now the Windsor) in 1886. Munro expanded the hotel to accommodate some of the two million visitors who were to attend the Centenary Exhibition, renamed it the Grand Coffee Palace, and ceremoniously burnt its liquor licence at the official opening (Murdoch). By 1888 there were more than 50 coffee palaces in the city of Melbourne alone and Munro held thousands of shares in coffee palaces, including those in Geelong and Broken Hill. With its opening planned to commemorate the centenary of the founding of Australia and the 1888 International Exhibition, the construction of the Federal Coffee Palace, one of the largest hotels in Australia, was perhaps the greatest monument to the temperance movement. Designed in the French Renaissance style, the façade was embellished with statues, griffins and Venus in a chariot drawn by four seahorses. The building was crowned with an iron-framed domed tower. New passenger elevators—first demonstrated at the Sydney Exhibition—allowed the building to soar to seven storeys. According to the Federal Coffee Palace Visitor’s Guide, which was presented to every visitor, there were three lifts for passengers and others for luggage. Bedrooms were located on the top five floors, while the stately ground and first floors contained majestic dining, lounge, sitting, smoking, writing, and billiard rooms. There were electric service bells, gaslights, and kitchens “fitted with the most approved inventions for aiding proficients [sic] in the culinary arts,” while the luxury brand Pears soap was used in the lavatories and bathrooms (16–17). In 1891, a spectacular financial crash brought the economic boom to an abrupt end. The British economy was in crisis and to meet the predicament, English banks withdrew their funds in Australia. There was a wholesale collapse of building companies, mortgage banks and other financial institutions during 1891 and 1892 and much of the banking system was halted during 1893 (Attard). Meanwhile, however, while the eastern States were in the economic doldrums, gold was discovered in 1892 at Coolgardie and Kalgoorlie in Western Australia and, within two years, the west of the continent was transformed. As gold poured back to the capital city of Perth, the long dormant settlement hurriedly caught up and began to emulate the rest of Australia, including the construction of ornately detailed coffee palaces (Freeman 130). By 1904, Perth had 20 coffee palaces. When the No. 2 Coffee Palace opened in Pitt Street, Sydney, in 1880, the Australian Town and Country Journal reported that coffee palaces were “not only fashionable, but appear to have acquired a permanent footing in Sydney” (121). The coffee palace era, however, was relatively short-lived. Driven more by reformist and economic zeal than by good business sense, many were in financial trouble when the 1890’s Depression hit. Leading figures in the temperance movement were also involved in land speculation and building societies and when these schemes collapsed, many, including Munro, were financially ruined. Many of the palaces closed or were forced to apply for liquor licences in order to stay afloat. Others developed another life after the temperance movement’s influence waned and the coffee palace fad faded, and many were later demolished to make way for more modern buildings. The Federal was licensed in 1923 and traded as the Federal Hotel until its demolition in 1973. The Victoria, however, did not succumb to a liquor licence until 1967. The Sydney Coffee Palace in Woolloomooloo became the Sydney Eye Hospital and, more recently, smart apartments. Some fine examples still survive as reminders of Australia’s social and cultural heritage. The Windsor in Melbourne’s Spring Street and the Broken Hill Hotel, a massive three-story iconic pub in the outback now called simply “The Palace,” are some examples. Tea remained the beverage of choice in Australia until the 1950s when the lifting of government controls on the importation of coffee and the influence of American foodways coincided with the arrival of espresso-loving immigrants. As Australians were introduced to the espresso machine, the short black, the cappuccino, and the café latte and (reminiscent of the Enlightenment), the post-war malaise was shed in favour of the energy and vigour of modernist thought and creativity, fuelled in at least a small part by caffeine and the emergent café culture (Teffer). Although the temperance movement’s attempt to provide an alternative to the ubiquitous pubs failed, coffee has now outstripped the consumption of tea and today’s café culture ensures that wherever coffee is consumed, there is the possibility of a continuation of the Enlightenment’s lively discussions, exchange of news, and dissemination of ideas and information in a sober environment. References Attard, Bernard. “The Economic History of Australia from 1788: An Introduction.” EH.net Encyclopedia. 5 Feb. (2012) ‹http://eh.net/encyclopedia/article/attard.australia›. Blainey, Anna. “The Prohibition and Total Abstinence Movement in Australia 1880–1910.” Food, Power and Community: Essays in the History of Food and Drink. Ed. Robert Dare. Adelaide: Wakefield Press, 1999. 142–52. Boyce, Francis Bertie. “Shall I Vote for No License?” An address delivered at the Convention of the Parramatta Branch of New South Wales Alliance, 3 September 1906. 3rd ed. Parramatta: New South Wales Alliance, 1907. Clarke, James Freeman. Coffee Houses and Coffee Palaces in England. Boston: George H. Ellis, 1882. “Coffee Palace, No. 2.” Australian Town and Country Journal. 17 Jul. 1880: 121. Davison, Graeme. “Festivals of Nationhood: The International Exhibitions.” Australian Cultural History. Eds. S. L. Goldberg and F. B. Smith. Cambridge: Cambridge UP, 1989. 158–77. Denby, Elaine. Grand Hotels: Reality and Illusion. London: Reaktion Books, 2002. Ellis, Markman. The Coffee House: A Cultural History. London: Weidenfeld & Nicolson, 2004. Federal Coffee Palace. The Federal Coffee Palace Visitors’ Guide to Melbourne, Its Suburbs, and Other Parts of the Colony of Victoria: Views of the Principal Public and Commercial Buildings in Melbourne, With a Bird’s Eye View of the City; and History of the Melbourne International Exhibition of 1880, etc. Melbourne: Federal Coffee House Company, 1888. Fitzgerald, Ross, and Trevor Jordan. Under the Influence: A History of Alcohol in Australia. Sydney: Harper Collins, 2009. Freeland, John. The Australian Pub. Melbourne: Sun Books, 1977. Johnson’s Temperance Coffee Palace. International Exhibition Visitors Pocket Guide to Sydney, Restaurant and Temperance Hotel. Sydney: Johnson’s Temperance Coffee Palace, 1879. Mitchell, Ann M. “Munro, James (1832–1908).” Australian Dictionary of Biography. Canberra: National Centre of Biography, Australian National U, 2006-12. 5 Feb. 2012 ‹http://adb.anu.edu.au/biography/munro-james-4271/text6905›. Murdoch, Sally. “Coffee Palaces.” Encyclopaedia of Melbourne. Eds. Andrew Brown-May and Shurlee Swain. 5 Feb. 2012 ‹http://www.emelbourne.net.au/biogs/EM00371b.htm›. Muskett, Philip E. The Art of Living in Australia. New South Wales: Kangaroo Press, 1987. Standage, Tom. A History of the World in 6 Glasses. New York: Walker & Company, 2005. Sydney Coffee Palace Hotel Company Limited. Memorandum of Association of the Sydney Coffee Palace Hotel Company, Ltd. Sydney: Samuel Edward Lees, 1879. Symons, Michael. One Continuous Picnic: A Gastronomic History of Australia. Melbourne: Melbourne UP, 2007. Teffer, Nicola. Coffee Customs. Exhibition Catalogue. Sydney: Customs House, 2005.
APA, Harvard, Vancouver, ISO, and other styles
16

Bellamy, Craig. "Post-Logo." M/C Journal 6, no. 3 (June 1, 2003). http://dx.doi.org/10.5204/mcj.2214.

Full text
Abstract:
Spurred by global institutions and treaties such as the General Agreement on Tariffs and Trade (GATT) and its’ bantling the World Trade Organisation (WTO), the past three decades have seen many nations of the world develop an economic interconnectedness that parallels the great free trade movement of the late Nineteenth and early Twentieth Centuries. Free trade and the resultant economic ‘globalisation’ have had mixed results for many countries and groups within countries and has incited a complex, inarticulate, and sometimes contradictory debate across all segments of our society. Some groups and geographical locales have benefited handsomely from the structural changes that we generally understand as globalisation, whilst other groups and geographical regions have become economically marginalised through disconnectedness from global flows of money and goods and services. Rural and regional Australia, for instance, has experienced a steady decline in recent years and in fact in rural Victoria, a gloomy report from the Bureau of Statistics, suggests that not one new full-time job has been created in more than thirteen years (Colbatch). In other parts of the country, particularly Sydney and Melbourne, things could not seem better; property values have doubled, unemployment is at record lows, and the new middle classes cram the cafés of the gentrified inner-cities. Wages have risen by up to fifty percent in many of Australia’s inner cities during the late 1990s (Birnbauer and Gurrera). By the end of the 1990s, in response to some of the inequalities of globalisation—particularly between developed and developing countries—a large globally-linked protest movement arose out of Seattle in the United States. The movement formed as a protest against the policies of the WTO and was an eclectic arrangement of political groups who believed that free trade was not the answer to a more equitable world. The problem was that some of the leading thinkers of the movement—in a movement that claimed to have no leaders—were far too short-sighted to see beyond the popular zeitgeist of the time. The turn of the century zeitgeist was based on a well-meaning utopian-libertarian vision of a frictionless and equitable world. The problem was that this vision had no place for nations and thus citizen-based democratically elected national governments. There had apparently been a coup and governments were now captured by shoe manufacturers. One of the best-known authors of the turn of the century globalisation protest movement was the inner-city Canadian journalist Naomi Klein with her popularly acclaimed book No Logo (Klein). Although shrewdly timed, there was nothing particularly ground-breaking about Klein’s work; anxieties about corporate power, exploited workers, and the power of the ideologically potent media industries have for most of the Twentieth Century been the focus of relations between governments and the private sphere everywhere. The book relied heavily on the popular journalistic branding of the time, the ‘new economy’, which was believed to be represented by the industries of the Information and Communication Technology (ICT) sector, advertising, and shoe manufacturers. The new economy never existed; it was merely a popularly accepted business-journalism term that perhaps described parts of the more complex corpus of work on ‘post-industrialism’. Many thinkers have been attempting to understand issues of equity and post-industrialism for more than three decades; perhaps one the best-known authors in Australia is the ex-Labor minister Barry Jones with his celebrated 1982 book Sleeper Wake; Technology and the Future of Work (Jones). The turn of the century globalisation protest movement was in essence a utopian-libertarian movement and even at times claimed to be ‘natural’ and ‘leaderless’. Pithily, the WTO could also be described as ‘utopian-libertarian’ as much of its post-war ideological base stems from the belief that national borders are a hindrance (and the world would be better without them), and national governments should not interfere with its ‘natural’ globalisation schema. The ‘global’ just like the ‘nation’ is an unwieldy meta-structure and can be interpreted in many ways and for many ends. The minimal working definitions of globalisation, or dare I say ‘globalism’, circulate around the processes in which complex interconnections are said to be rapidly developing between societies, institutions, cultures, collectives, and individuals worldwide. These connections are believed to be between cultural, political, and economic practices that are local, national, technological, and corporate. And if there really is such a thing as globalisation, then it is far from a ‘natural’ process, but has developed as the direct result of strategic choices by governments and corporations in the past thirty years. In Australia, our engagement with the dominant form of globalisation was exacerbated by the Hawke/Keating Labor governments (1984-1996) that deregulated large portions of the economy, floated our currency, and embraced the all-trade-is-good mantra of global economic policy. Not surprisingly, the rich countries define the dominant ideologies of globalisation and corporations are the main catalyst (Everend). Many corporations are involved in cultural production thus creating their own world culture and value system. This value system is based on consumerism (like buying sports shoes) and the triumph of individual consumer agency over collective economic practices (like free education). The end of the east-west logic of the Cold War ended the eighty-year ideological wrestle between centralised state economic planning and market driven models. Eric Hobsbawn, in his masterful empirical history, The Age of Extremes, claims that what we understand as the Twentieth Century ended in 1991 with the collapse of the Soviet Union (Hobsbawn). What we are left with is a world with only one major superpower, one major economic model, and one major Liberal ideology that is increasing the wealth gap between and within societies everywhere (Landes). We do need to urgently understand the forces beyond the nation state, but this should not be at the expense of a political engagement with the democratic processes that make up the nation state. The utopian-libertarian critique of the turn of the century globalisation protest movement was far too simplistic. The Twentieth Century often disastrously taught us that ideas of the nation can be interpreted in many ways, and likewise, ideas of ‘the global’ are contested meta-structures that can be multifariously interpreted. There are no effortless solutions to understanding globalisation processes and those that tell us what the ‘global’ is largely control what it is. This is similar to the history of Australia. Historically Australia has had different ways to see ourselves based on what group has been in power and the particular requirements of this group. The requirements of an elite group of Australians at the moment is perhaps no government at all so that ‘the people’ can consume in peace and not have bothersome local governments do nasty ‘state-authoritarian’ things like build kindergartens or repair street lights. If ‘the people’ loose faith in citizen based democracy then we undermine the only real power that we have as individuals. The simple act of many activists to communicate between various countries and exchange ideas and strategies is not end in itself; it is merely one component of a significant beginning. If we don’t have a major war, or an economic catastrophe, globalisation will probably further arrive over the next few decades. And we need to have representative, fair, collective and geographically specific processes to deal with this. Most of the collective institutional solutions we already have, and it is up to a new generation to take control of their democratic inheritance (like every other generation before us) rather than conjure one-dimensional utopian-libertarian visions that are oppressively close to those of the WTO. Works Cited www.milkbar.com.au Birnbauer, William and Guerrera, Orietta “Rich Shun Easter Suburbs for Inner City” in The Age, Melbourne, June 18. 2002, <http://www.theage.com.au/articles/2002/06/17/1023864403482.php> (Accessed 11 May, 2003) Colbatch, Tim “Part-time work spawns rural underclass” in The Age, 26 April 2003, <http://www.theage.com.au/text/articles/2003/04/25/1050777401... ...309.htm> (Accessed 27 April, 2003) Everand, Jerry Virtual States: The Internet and the Boundaries of the Nation State,Routledge, London, 2000. Hobsbawn, Eric Age of Extremes: The short Twentieth Century 1914-1991, Abacus, London, 1994. Jones, Barry Sleepers Wake: Technology and the Future of Work, Oxford University Press, Melbourne, 1982. Klein, Naomi No Logo, Flamingo, London, 2000. Landes, Richard S The Wealth and Poverty of Nations, WW Norton, New York, 1999. Links http://www.milkbar.com.au http://www.theage.com.au/articles/2002/06/17/1023864403482.html http://www.theage.com.au/text/articles/2003/04/25/1050777401309.htm Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Bellamy, Craig. "Post-Logo " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0306/13-postlogo.php>. APA Style Bellamy, C. (2003, Jun 19). Post-Logo . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0306/13-postlogo.php>
APA, Harvard, Vancouver, ISO, and other styles
17

Robards, Brady, Benjamin Lyall, Claire Moran, Jean Burgess, Kath Albury, Rowan Wilken, Anthony McCosker, and Terri Senft. "DATA SELVES: TRUST, CONTROL AND SELF-REPRESENTATION IN DIGITAL SOCIETY." AoIR Selected Papers of Internet Research 2019 (October 31, 2019). http://dx.doi.org/10.5210/spir.v2019i0.10944.

Full text
Abstract:
A considerable amount of personal data is now collected on and by individuals: footsteps on Fitbits, screen time in Apple’s iOS, conversations on dating apps, sleeping patterns in baby tracker apps, and viewing habits on Netflix and YouTube. What value do these data have, for individuals but also for corporations, governments, and researchers? When these data are provided back to users, how do people make sense of it? What ‘truth claims’ do quantified personal data make? How do we navigate anxieties around datafied selves, and in what ways are bodies rendered visible or invisible through processes of datafication in digital society? In this panel we explore these questions through four papers centered on the notion of the “data-selfie.” Data-selfies take different forms, including but not limited to:- Visuals that reference the “status” or “progress” of a user’s physical body, as in 3-D scans, or charts generated by self-monitoring apps for health and fitness.- Visuals that reference the remapping of photographic self-expression to biometric, corporate and state surveillance, such as airport facial recognition check points that ask flyers to pose for a selfie, or sex offender databases that now contain images first posted to hook up apps by consenting teenagers.- Representations of the embodied or commoditized self, produced not as stand-alone expression, but as conversational prompts that encourage qualitative, “story-driven” data, in the interests of pedagogy, therapy, activism, etc.- Profiles that reference users as “targets” whose chief value is the metadata they generate. Using proprietary algorithms, platforms mine this metadata—which can include information about a users’ device, physical location, and their activities online—categorizing it for internal use, and selling it to third parties interested in influencing the consumer, social and/or political preferences of the “targets” in question. In Paper 1, Authors 1, 2, and 3 develop a new conceptualisation for understanding how individuals reveal themselves through their own quantified personal data. They call this the ‘confessional data selfie’. Drawing on a sample of 59 examples from the top posts in subreddit r/DataIsBeautiful, they argue that the confessional data selfie represents an aspect of one’s self, through visualisations of personal data, inviting analysis, eliciting responses and personal story-telling, and opening one’s life up to others. In Paper 2, Authors 4, 5, and 6 take a political economy of communication approach to analyse the data markets of dating apps. They consider three cases: Grindr, Match Group (parent company of Tinder), and Bumble. Drawing on trade press reportage, financial reports, and other materials associated with the apps and publishers in question, they point to the increased global concentration in ownership of dating app services and raise questions about the ways in which dating apps are now in the ‘data business’, using personal data to profile users and monetise private interactions. In Paper 3, Author 7 reports on experiences of ‘data anxiety’ among older people in Australia. Author 7 draws on data literacy workshops, home-based interviews and focus groups with older internet users, that led to discussions of control over personal data, control over social interactions, and the resulting implications for exposure, openness, and visibility. Also key to this study was the taking and sharing of selfies in a closed Facebook group, serving as the starting point for reflections on these various experiences of control. Many of these older participants questioned whether or not ongoing participation in social media and broader data structures were ‘worthwhile’. This raises broader questions about the extent to which users are willing to sacrifice control over personal data - or the feeling of control - in order to participate and be visible. Finally, in Paper 4, Author 8 asks: when is the face data? Moving from examples of ‘deepfake’ video exhibitions to Google Art as a repository of ‘face-data’ as cultural and social capital, Author 8 goes on to examine how notions of face-as-data apply to individuals living with the neurological condition of autism. Can facial recognition apps help people with autism to read and decode human expressions? Taken together, these four papers each engage with questions about the relationship between personal data and broader structures of power and representation: from corporations like Grindr and Tinder using dating app data to profile users, to Google using uploaded selfies to train facial recognition algorithms; through to re-purposing and narrativising personal data as part of practices of self-representation; and the feelings of anxiety, unease or creepiness that accompany the increased datafication of personal identity. Self-representation is also a key recurrent thread in these papers, from confessional data selfies as acts of revelation through personal quantified data, through to the photographic selfie as a research exercise that prompts discussions of control and data privacy.
APA, Harvard, Vancouver, ISO, and other styles
18

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2750.

Full text
Abstract:
Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. & Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology & Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. <https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html>. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 <https://ieeexplore.ieee.org/document/8699186>. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 <https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/>. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 <https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/>. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media & Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 <https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/>. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 <https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov>. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law & Security Review 36 (2020) 13 Apr. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887>. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.
APA, Harvard, Vancouver, ISO, and other styles
19

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
20

Burns, Alex. "Oblique Strategies for Ambient Journalism." M/C Journal 13, no. 2 (April 15, 2010). http://dx.doi.org/10.5204/mcj.230.

Full text
Abstract:
Alfred Hermida recently posited ‘ambient journalism’ as a new framework for para- and professional journalists, who use social networks like Twitter for story sources, and as a news delivery platform. Beginning with this framework, this article explores the following questions: How does Hermida define ‘ambient journalism’ and what is its significance? Are there alternative definitions? What lessons do current platforms provide for the design of future, real-time platforms that ‘ambient journalists’ might use? What lessons does the work of Brian Eno provide–the musician and producer who coined the term ‘ambient music’ over three decades ago? My aim here is to formulate an alternative definition of ambient journalism that emphasises craft, skills acquisition, and the mental models of professional journalists, which are the foundations more generally for journalism practices. Rather than Hermida’s participatory media context I emphasise ‘institutional adaptiveness’: how journalists and newsrooms in media institutions rely on craft and skills, and how emerging platforms can augment these foundations, rather than replace them. Hermida’s Ambient Journalism and the Role of Journalists Hermida describes ambient journalism as: “broad, asynchronous, lightweight and always-on communication systems [that] are creating new kinds of interactions around the news, and are enabling citizens to maintain a mental model of news and events around them” (Hermida 2). His ideas appear to have two related aspects. He conceives ambient journalism as an “awareness system” between individuals that functions as a collective intelligence or kind of ‘distributed cognition’ at a group level (Hermida 2, 4-6). Facebook, Twitter and other online social networks are examples. Hermida also suggests that such networks enable non-professionals to engage in ‘communication’ and ‘conversation’ about news and media events (Hermida 2, 7). In a helpful clarification, Hermida observes that ‘para-journalists’ are like the paralegals or non-lawyers who provide administrative support in the legal profession and, in academic debates about journalism, are more commonly known as ‘citizen journalists’. Thus, Hermida’s ambient journalism appears to be: (1) an information systems model of new platforms and networks, and (2) a normative argument that these tools empower ‘para-journalists’ to engage in journalism and real-time commentary. Hermida’s thesis is intriguing and worthy of further discussion and debate. As currently formulated however it risks sharing the blind-spots and contradictions of the academic literature that Hermida cites, which suffers from poor theory-building (Burns). A major reason is that the participatory media context on which Hermida often builds his work has different mental models and normative theories than the journalists or media institutions that are the target of critique. Ambient journalism would be a stronger and more convincing framework if these incorrect assumptions were jettisoned. Others may also potentially misunderstand what Hermida proposes, because the academic debate is often polarised between para-journalists and professional journalists, due to different views about institutions, the politics of knowledge, decision heuristics, journalist training, and normative theoretical traditions (Christians et al. 126; Cole and Harcup 166-176). In the academic debate, para-journalists or ‘citizen journalists’ may be said to have a communitarian ethic and desire more autonomous solutions to journalists who are framed as uncritical and reliant on official sources, and to media institutions who are portrayed as surveillance-like ‘monitors’ of society (Christians et al. 124-127). This is however only one of a range of possible relationships. Sole reliance on para-journalists could be a premature solution to a more complex media ecology. Journalism craft, which does not rely just on official sources, also has a range of practices that already provides the “more complex ways of understanding and reporting on the subtleties of public communication” sought (Hermida 2). Citizen- and para-journalist accounts may overlook micro-studies in how newsrooms adopt technological innovations and integrate them into newsgathering routines (Hemmingway 196). Thus, an examination of the realities of professional journalism will help to cast a better light on how ambient journalism can shape the mental models of para-journalists, and provide more rigorous analysis of news and similar events. Professional journalism has several core dimensions that para-journalists may overlook. Journalism’s foundation as an experiential craft includes guidance and norms that orient the journalist to information, and that includes practitioner ethics. This craft is experiential; the basis for journalism’s claim to “social expertise” as a discipline; and more like the original Linux and Open Source movements which evolved through creative conflict (Sennett 9, 25-27, 125-127, 249-251). There are learnable, transmissible skills to contextually evaluate, filter, select and distil the essential insights. This craft-based foundation and skills informs and structures the journalist’s cognitive witnessing of an event, either directly or via reconstructed, cultivated sources. The journalist publishes through a recognised media institution or online platform, which provides communal validation and verification. There is far more here than the academic portrayal of journalists as ‘gate-watchers’ for a ‘corporatist’ media elite. Craft and skills distinguish the professional journalist from Hermida’s para-journalist. Increasingly, media institutions hire journalists who are trained in other craft-based research methods (Burns and Saunders). Bethany McLean who ‘broke’ the Enron scandal was an investment banker; documentary filmmaker Errol Morris first interviewed serial killers for an early project; and Neil Chenoweth used ‘forensic accounting’ techniques to investigate Rupert Murdoch and Kerry Packer. Such expertise allows the journalist to filter information, and to mediate any influences in the external environment, in order to develop an individualised, ‘embodied’ perspective (Hofstadter 234; Thompson; Garfinkel and Rawls). Para-journalists and social network platforms cannot replace this expertise, which is often unique to individual journalists and their research teams. Ambient Journalism and Twitter Current academic debates about how citizen- and para-journalists may augment or even replace professional journalists can often turn into legitimation battles whether the ‘de facto’ solution is a social media network rather than a media institution. For example, Hermida discusses Twitter, a micro-blogging platform that allows users to post 140-character messages that are small, discrete information chunks, for short-term and episodic memory. Twitter enables users to monitor other users, to group other messages, and to search for terms specified by a hashtag. Twitter thus illustrates how social media platforms can make data more transparent and explicit to non-specialists like para-journalists. In fact, Twitter is suitable for five different categories of real-time information: news, pre-news, rumours, the formation of social media and subject-based networks, and “molecular search” using granular data-mining tools (Leinweber 204-205). In this model, the para-journalist acts as a navigator and “way-finder” to new information (Morville, Findability). Jaron Lanier, an early designer of ‘virtual reality’ systems, is perhaps the most vocal critic of relying on groups of non-experts and tools like Twitter, instead of individuals who have professional expertise. For Lanier, what underlies debates about citizen- and para-journalists is a philosophy of “cybernetic totalism” and “digital Maoism” which exalts the Internet collective at the expense of truly individual views. He is deeply critical of Hermida’s chosen platform, Twitter: “A design that shares Twitter’s feature of providing ambient continuous contact between people could perhaps drop Twitter’s adoration of fragments. We don’t really know, because it is an unexplored design space” [emphasis added] (Lanier 24). In part, Lanier’s objection is traceable back to an unresolved debate on human factors and design in information science. Influenced by the post-war research into cybernetics, J.C.R. Licklider proposed a cyborg-like model of “man-machine symbiosis” between computers and humans (Licklider). In turn, Licklider’s framework influenced Douglas Engelbart, who shaped the growth of human-computer interaction, and the design of computer interfaces, the mouse, and other tools (Engelbart). In taking a system-level view of platforms Hermida builds on the strength of Licklider and Engelbart’s work. Yet because he focuses on para-journalists, and does not appear to include the craft and skills-based expertise of professional journalists, it is unclear how he would answer Lanier’s fears about how reliance on groups for news and other information is superior to individual expertise and judgment. Hermida’s two case studies point to this unresolved problem. Both cases appear to show how Twitter provides quicker and better forms of news and information, thereby increasing the effectiveness of para-journalists to engage in journalism and real-time commentary. However, alternative explanations may exist that raise questions about Twitter as a new platform, and thus these cases might actually reveal circumstances in which ambient journalism may fail. Hermida alludes to how para-journalists now fulfil the earlier role of ‘first responders’ and stringers, in providing the “immediate dissemination” of non-official information about disasters and emergencies (Hermida 1-2; Haddow and Haddow 117-118). Whilst important, this is really a specific role. In fact, disaster and emergency reporting occurs within well-established practices, professional ethics, and institutional routines that may involve journalists, government officials, and professional communication experts (Moeller). Officials and emergency management planners are concerned that citizen- or para-journalism is equated with the craft and skills of professional journalism. The experience of these officials and planners in 2005’s Hurricane Katrina in the United States, and in 2009’s Black Saturday bushfires in Australia, suggests that whilst para-journalists might be ‘first responders’ in a decentralised, complex crisis, they are perceived to spread rumours and potential social unrest when people need reliable information (Haddow and Haddow 39). These terms of engagement between officials, planners and para-journalists are still to be resolved. Hermida readily acknowledges that Twitter and other social network platforms are vulnerable to rumours (Hermida 3-4; Sunstein). However, his other case study, Iran’s 2009 election crisis, further complicates the vision of ambient journalism, and always-on communication systems in particular. Hermida discusses several events during the crisis: the US State Department request to halt a server upgrade, how the Basij’s shooting of bystander Neda Soltan was captured on a mobile phone camera, the spread across social network platforms, and the high-velocity number of ‘tweets’ or messages during the first two weeks of Iran’s electoral uncertainty (Hermida 1). The US State Department was interested in how Twitter could be used for non-official sources, and to inform people who were monitoring the election events. Twitter’s perceived ‘success’ during Iran’s 2009 election now looks rather different when other factors are considered such as: the dynamics and patterns of Tehran street protests; Iran’s clerics who used Soltan’s death as propaganda; claims that Iran’s intelligence services used Twitter to track down and to kill protestors; the ‘black box’ case of what the US State Department and others actually did during the crisis; the history of neo-conservative interest in a Twitter-like platform for strategic information operations; and the Iranian diaspora’s incitement of Tehran student protests via satellite broadcasts. Iran’s 2009 election crisis has important lessons for ambient journalism: always-on communication systems may create noise and spread rumours; ‘mirror-imaging’ of mental models may occur, when other participants have very different worldviews and ‘contexts of use’ for social network platforms; and the new kinds of interaction may not lead to effective intervention in crisis events. Hermida’s combination of news and non-news fragments is the perfect environment for psychological operations and strategic information warfare (Burns and Eltham). Lessons of Current Platforms for Ambient Journalism We have discussed some unresolved problems for ambient journalism as a framework for journalists, and as mental models for news and similar events. Hermida’s goal of an “awareness system” faces a further challenge: the phenomenological limitations of human consciousness to deal with information complexity and ambiguous situations, whether by becoming ‘entangled’ in abstract information or by developing new, unexpected uses for emergent technologies (Thackara; Thompson; Hofstadter 101-102, 186; Morville, Findability, 55, 57, 158). The recursive and reflective capacities of human consciousness imposes its own epistemological frames. It’s still unclear how Licklider’s human-computer interaction will shape consciousness, but Douglas Hofstadter’s experiments with art and video-based group experiments may be suggestive. Hofstadter observes: “the interpenetration of our worlds becomes so great that our worldviews start to fuse” (266). Current research into user experience and information design provides some validation of Hofstadter’s experience, such as how Google is now the ‘default’ search engine, and how its interface design shapes the user’s subjective experience of online search (Morville, Findability; Morville, Search Patterns). Several models of Hermida’s awareness system already exist that build on Hofstadter’s insight. Within the information systems field, on-going research into artificial intelligence–‘expert systems’ that can model expertise as algorithms and decision rules, genetic algorithms, and evolutionary computation–has attempted to achieve Hermida’s goal. What these systems share are mental models of cognition, learning and adaptiveness to new information, often with forecasting and prediction capabilities. Such systems work in journalism areas such as finance and sports that involve analytics, data-mining and statistics, and in related fields such as health informatics where there are clear, explicit guidelines on information and international standards. After a mid-1980s investment bubble (Leinweber 183-184) these systems now underpin the technology platforms of global finance and news intermediaries. Bloomberg LP’s ubiquitous dual-screen computers, proprietary network and data analytics (www.bloomberg.com), and its competitors such as Thomson Reuters (www.thomsonreuters.com and www.reuters.com), illustrate how financial analysts and traders rely on an “awareness system” to navigate global stock-markets (Clifford and Creswell). For example, a Bloomberg subscriber can access real-time analytics from exchanges, markets, and from data vendors such as Dow Jones, NYSE Euronext and Thomson Reuters. They can use portfolio management tools to evaluate market information, to make allocation and trading decisions, to monitor ‘breaking’ news, and to integrate this information. Twitter is perhaps the para-journalist equivalent to how professional journalists and finance analysts rely on Bloomberg’s platform for real-time market and business information. Already, hedge funds like PhaseCapital are data-mining Twitter’s ‘tweets’ or messages for rumours, shifts in stock-market sentiment, and to analyse potential trading patterns (Pritchett and Palmer). The US-based Securities and Exchange Commission, and researchers like David Gelernter and Paul Tetlock, have also shown the benefits of applied data-mining for regulatory market supervision, in particular to uncover analysts who provide ‘whisper numbers’ to online message boards, and who have access to material, non-public information (Leinweber 60, 136, 144-145, 208, 219, 241-246). Hermida’s framework might be developed further for such regulatory supervision. Hermida’s awareness system may also benefit from the algorithms found in high-frequency trading (HFT) systems that Citadel Group, Goldman Sachs, Renaissance Technologies, and other quantitative financial institutions use. Rather than human traders, HFT uses co-located servers and complex algorithms, to make high-volume trades on stock-markets that take advantage of microsecond changes in prices (Duhigg). HFT capabilities are shrouded in secrecy, and became the focus of regulatory attention after several high-profile investigations of traders alleged to have stolen the software code (Bray and Bunge). One public example is Streambase (www.streambase.com), a ‘complex event processing’ (CEP) platform that can be used in HFT, and commercialised from the Project Aurora research collaboration between Brandeis University, Brown University, and Massachusetts Institute of Technology. CEP and HFT may be the ‘killer apps’ of Hermida’s awareness system. Alternatively, they may confirm Jaron Lanier’s worst fears: your data-stream and user-generated content can be harvested by others–for their gain, and your loss! Conclusion: Brian Eno and Redefining ‘Ambient Journalism’ On the basis of the above discussion, I suggest a modified definition of Hermida’s thesis: ‘Ambient journalism’ is an emerging analytical framework for journalists, informed by cognitive, cybernetic, and information systems research. It ‘sensitises’ the individual journalist, whether professional or ‘para-professional’, to observe and to evaluate their immediate context. In doing so, ‘ambient journalism’, like journalism generally, emphasises ‘novel’ information. It can also inform the design of real-time platforms for journalistic sources and news delivery. Individual ‘ambient journalists’ can learn much from the career of musician and producer Brian Eno. His personal definition of ‘ambient’ is “an atmosphere, or a surrounding influence: a tint,” that relies on the co-evolution of the musician, creative horizons, and studio technology as a tool, just as para-journalists use Twitter as a platform (Sheppard 278; Eno 293-297). Like para-journalists, Eno claims to be a “self-educated but largely untrained” musician and yet also a craft-based producer (McFadzean; Tamm 177; 44-50). Perhaps Eno would frame the distinction between para-journalist and professional journalist as “axis thinking” (Eno 298, 302) which is needlessly polarised due to different normative theories, stances, and practices. Furthermore, I would argue that Eno’s worldview was shaped by similar influences to Licklider and Engelbart, who appear to have informed Hermida’s assumptions. These influences include the mathematician and game theorist John von Neumann and biologist Richard Dawkins (Eno 162); musicians Eric Satie, John Cage and his book Silence (Eno 19-22, 162; Sheppard 22, 36, 378-379); and the field of self-organising systems, in particular cyberneticist Stafford Beer (Eno 245; Tamm 86; Sheppard 224). Eno summed up the central lesson of this theoretical corpus during his collaborations with New York’s ‘No Wave’ scene in 1978, of “people experimenting with their lives” (Eno 253; Reynolds 146-147; Sheppard 290-295). Importantly, he developed a personal view of normative theories through practice-based research, on a range of projects, and with different creative and collaborative teams. Rather than a technological solution, Eno settled on a way to encode his craft and skills into a quasi-experimental, transmittable method—an aim of practitioner development in professional journalism. Even if only a “founding myth,” the story of Eno’s 1975 street accident with a taxi, and how he conceived ‘ambient music’ during his hospital stay, illustrates how ambient journalists might perceive something new in specific circumstances (Tamm 131; Sheppard 186-188). More tellingly, this background informed his collaboration with the late painter Peter Schmidt, to co-create the Oblique Strategies deck of aphorisms: aleatory, oracular messages that appeared dependent on chance, luck, and randomness, but that in fact were based on Eno and Schmidt’s creative philosophy and work guidelines (Tamm 77-78; Sheppard 178-179; Reynolds 170). In short, Eno was engaging with the kind of reflective practices that underpin exemplary professional journalism. He was able to encode this craft and skills into a quasi-experimental method, rather than a technological solution. Journalists and practitioners who adopt Hermida’s framework could learn much from the published accounts of Eno’s practice-based research, in the context of creative projects and collaborative teams. In particular, these detail the contexts and choices of Eno’s early ambient music recordings (Sheppard 199-200); Eno’s duels with David Bowie during ‘Sense of Doubt’ for the Heroes album (Tamm 158; Sheppard 254-255); troubled collaborations with Talking Heads and David Byrne (Reynolds 165-170; Sheppard; 338-347, 353); a curatorial, mentor role on U2’s The Unforgettable Fire (Sheppard 368-369); the ‘grand, stadium scale’ experiments of U2’s 1991-93 ZooTV tour (Sheppard 404); the Zorn-like games of Bowie’s Outside album (Eno 382-389); and the ‘generative’ artwork 77 Million Paintings (Eno 330-332; Tamm 133-135; Sheppard 278-279; Eno 435). Eno is clearly a highly flexible maker and producer. Developing such flexibility would ensure ambient journalism remains open to novelty as an analytical framework that may enhance the practitioner development and work of professional journalists and para-journalists alike.Acknowledgments The author thanks editor Luke Jaaniste, Alfred Hermida, and the two blind peer reviewers for their constructive feedback and reflective insights. References Bray, Chad, and Jacob Bunge. “Ex-Goldman Programmer Indicted for Trade Secrets Theft.” The Wall Street Journal 12 Feb. 2010. 17 March 2010 ‹http://online.wsj.com/article/SB10001424052748703382904575059660427173510.html›. Burns, Alex. “Select Issues with New Media Theories of Citizen Journalism.” M/C Journal 11.1 (2008). 17 March 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/30›.———, and Barry Saunders. “Journalists as Investigators and ‘Quality Media’ Reputation.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 281-297. 17 March 2010 ‹http://eprints.vu.edu.au/15229/1/CPRF09BurnsSaunders.pdf›.———, and Ben Eltham. “Twitter Free Iran: An Evaluation of Twitter’s Role in Public Diplomacy and Information Operations in Iran’s 2009 Election Crisis.” Record of the Communications Policy and Research Forum 2009. Eds. Franco Papandrea and Mark Armstrong. Sydney: Network Insight Institute, 298-310. 17 March 2010 ‹http://eprints.vu.edu.au/15230/1/CPRF09BurnsEltham.pdf›. Christians, Clifford G., Theodore Glasser, Denis McQuail, Kaarle Nordenstreng, and Robert A. White. Normative Theories of the Media: Journalism in Democratic Societies. Champaign, IL: University of Illinois Press, 2009. Clifford, Stephanie, and Julie Creswell. “At Bloomberg, Modest Strategy to Rule the World.” The New York Times 14 Nov. 2009. 17 March 2010 ‹http://www.nytimes.com/2009/11/15/business/media/15bloom.html?ref=businessandpagewanted=all›.Cole, Peter, and Tony Harcup. Newspaper Journalism. Thousand Oaks, CA: Sage Publications, 2010. Duhigg, Charles. “Stock Traders Find Speed Pays, in Milliseconds.” The New York Times 23 July 2009. 17 March 2010 ‹http://www.nytimes.com/2009/07/24/business/24trading.html?_r=2andref=business›. Engelbart, Douglas. “Augmenting Human Intellect: A Conceptual Framework, 1962.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era. London: Phaidon Press, 2002. 60-67. Eno, Brian. A Year with Swollen Appendices. London: Faber and Faber, 1996. Garfinkel, Harold, and Anne Warfield Rawls. Toward a Sociological Theory of Information. Boulder, CO: Paradigm Publishers, 2008. Hadlow, George D., and Kim S. Haddow. Disaster Communications in a Changing Media World, Butterworth-Heinemann, Burlington MA, 2009. Hemmingway, Emma. Into the Newsroom: Exploring the Digital Production of Regional Television News. Milton Park: Routledge, 2008. Hermida, Alfred. “Twittering the News: The Emergence of Ambient Journalism.” Journalism Practice 4.3 (2010): 1-12. Hofstadter, Douglas. I Am a Strange Loop. New York: Perseus Books, 2007. Lanier, Jaron. You Are Not a Gadget: A Manifesto. London: Allen Lane, 2010. Leinweber, David. Nerds on Wall Street: Math, Machines and Wired Markets. Hoboken, NJ: John Wiley and Sons, 2009. Licklider, J.C.R. “Man-Machine Symbiosis, 1960.” Ed. Neil Spiller. Cyber Reader: Critical Writings for the Digital Era, London: Phaidon Press, 2002. 52-59. McFadzean, Elspeth. “What Can We Learn from Creative People? The Story of Brian Eno.” Management Decision 38.1 (2000): 51-56. Moeller, Susan. Compassion Fatigue: How the Media Sell Disease, Famine, War and Death. New York: Routledge, 1998. Morville, Peter. Ambient Findability. Sebastopol, CA: O’Reilly Press, 2005. ———. Search Patterns. Sebastopol, CA: O’Reilly Press, 2010.Pritchett, Eric, and Mark Palmer. ‘Following the Tweet Trail.’ CNBC 11 July 2009. 17 March 2010 ‹http://www.casttv.com/ext/ug0p08›. Reynolds, Simon. Rip It Up and Start Again: Postpunk 1978-1984. London: Penguin Books, 2006. Sennett, Richard. The Craftsman. London: Penguin Books, 2008. Sheppard, David. On Some Faraway Beach: The Life and Times of Brian Eno. London: Orion Books, 2008. Sunstein, Cass. On Rumours: How Falsehoods Spread, Why We Believe Them, What Can Be Done. New York: Farrar, Straus and Giroux, 2009. Tamm, Eric. Brian Eno: His Music and the Vertical Colour of Sound. New York: Da Capo Press, 1995. Thackara, John. In the Bubble: Designing in a Complex World. Boston, MA: The MIT Press, 1995. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Science of Mind. Boston, MA: Belknap Press, 2007.
APA, Harvard, Vancouver, ISO, and other styles
21

Pearce, Lynne. "Diaspora." M/C Journal 14, no. 2 (May 1, 2011). http://dx.doi.org/10.5204/mcj.373.

Full text
Abstract:
For the past twenty years, academics and other social commentators have, by and large, shared the view that the phase of modernity through which we are currently passing is defined by two interrelated catalysts of change: the physical movement of people and the virtual movement of information around the globe. As we enter the second decade of the new millennium, it is certainly a timely moment to reflect upon the ways in which the prognoses of the scholars and scientists writing in the late twentieth century have come to pass, especially since—during the time this special issue has been in press—the revolutions that are gathering pace in the Arab world appear to be realising the theoretical prediction that the ever-increasing “flows” of people and information would ultimately bring about the end of the nation-state and herald an era of transnationalism (Appadurai, Urry). For writers like Arjun Appadurai, moreover, the concept of diaspora was key to grasping how this new world order would take shape, and how it would operate: Diasporic public spheres, diverse amongst themselves, are the crucibles of a postnational political order. The engines of their discourse are mass media (both interactive and expressive) and the movement of refugees, activists, students, laborers. It may be that the emergent postnational order proves not to be a system of homogeneous units (as with the current system of nation-states) but a system based on relations between heterogeneous units (some social movements, some interest groups, some professional bodies, some non-governmental organizations, some armed constabularies, some judicial bodies) ... In the short run, as we can see already, it is likely to be a world of increased incivility and violence. In the longer run, free from the constraints of the nation form, we may find that cultural freedom and sustainable justice in the world do not presuppose the uniform and general existence of the nation-state. This unsettling possibility could be the most exciting dividend of living in modernity at large. (23) In this editorial, we would like to return to the “here and now” of the late 1990s in which theorists like Arjun Appaduri, Ulrich Beck, John Urry, Zygmunt Bauman, Robert Robertson and others were “imagining” the consequences of both globalisation and glocalisation for the twenty-first century in order that we may better assess what is, indeed, coming to pass. While most of their prognoses for this “second modernity” have proven remarkably accurate, it is their—self-confessed—inability to forecast either the nature or the extent of the digital revolution that most vividly captures the distance between the mid-1990s and now; and it is precisely the consequences of this extraordinary technological revolution on the twin concepts of “glocality” and “diaspora” that the research featured in this special issue seeks to capture. Glocal Imaginaries Appadurai’s endeavours to show how globalisation was rapidly making itself felt as a “structure of feeling” (Williams in Appadurai 189) as well as a material “fact” was also implicit in our conceptualisation of the conference, “Glocal Imaginaries: Writing/Migration/Place,” which gave rise to this special issue. This conference, which was the culmination of the AHRC-funded project “Moving Manchester: Literature/Migration/Place (2006-10)”, constituted a unique opportunity to gain an international, cross-disciplinary perspective on urgent and topical debates concerning mobility and migration in the early twenty-first century and the strand “Networked Diasporas” was one of the best represented on the program. Attracting papers on broadcast media as well as the new digital technologies, the strand was strikingly international in terms of the speakers’ countries of origin, as is this special issue which brings together research from six European countries, Australia and the Indian subcontinent. The “case-studies” represented in these articles may therefore be seen to constitute something of a “state-of-the-art” snapshot of how Appadurai’s “glocal imaginary” is being lived out across the globe in the early years of the twenty-first century. In this respect, the collection proves that his hunch with regards to the signal importance of the “mass-media” in redefining our spatial and temporal coordinates of being and belonging was correct: The third and final factor to be addressed here is the role of the mass-media, especially in its electronic forms, in creating new sorts of disjuncture between spatial and virtual neighborhoods. This disjuncture has both utopian and dystopian potentials, and there is no easy way to tell how these may play themselves out in the future of the production of locality. (194) The articles collected here certainly do serve as testament to the “bewildering plethora of changes in ... media environments” (195) that Appadurai envisaged, and yet it can clearly also be argued that this agent of glocalisation has not yet brought about the demise of the nation-state in the way (or at the speed) that many commentators predicted. Digital Diasporas in a Transnational World Reviewing the work of the leading social science theorists working in the field during the late 1990s, it quickly becomes evident that: (a) the belief that globalisation presented a threat to the nation-state was widely held; and (b) that the “jury” was undecided as to whether this would prove a good or bad thing in the years to come. While the commentators concerned did their best to complexify both their analysis of the present and their view of the future, it is interesting to observe, in retrospect, how the rhetoric of both utopia and dystopia invaded their discourse in almost equal measure. We have already seen how Appadurai, in his 1996 publication, Modernity at Large, looks beyond the “increased incivility and violence” of the “short term” to a world “free from the constraints of the nation form,” while Roger Bromley, following Agamben and Deleuze as well as Appadurai, typifies a generation of literary and cultural critics who have paid tribute to the way in which the arts (and, in particular, storytelling) have enabled subjects to break free from their national (af)filiations (Pearce, Devolving 17) and discover new “de-territorialised” (Deleuze and Guattari) modes of being and belonging. Alongside this “hope,” however, the forces and agents of globalisation were also regarded with a good deal of suspicion and fear, as is evidenced in Ulrich Beck’s What is Globalization? In his overview of the theorists who were then perceived to be leading the debate, Beck draws distinctions between what was perceived to be the “engine” of globalisation (31), but is clearly most exercised by the manner in which the transformation has taken shape: Without a revolution, without even any change in laws or constitutions, an attack has been launched “in the normal course of business”, as it were, upon the material lifelines of modern national societies. First, the transnational corporations are to export jobs to parts of the world where labour costs and workplace obligations are lowest. Second, the computer-generation of worldwide proximity enables them to break down and disperse goods and services, and produce them through a division of labour in different parts of the world, so that national and corporate labels inevitably become illusory. (3; italics in the original) Beck’s concern is clearly that all these changes have taken place without the nation-states of the world being directly involved in any way: transnational corporations began to take advantage of the new “mobility” available to them without having to secure the agreement of any government (“Companies can produce in one country, pay taxes in another and demand state infrastructural spending in yet another”; 4-5); the export of the labour market through the use of digital communications (stereotypically, call centres in India) was similarly unregulated; and the world economy, as a consequence, was in the process of becoming detached from the processes of either production or consumption (“capitalism without labour”; 5-7). Vis-à-vis the dystopian endgame of this effective “bypassing” of the nation-state, Beck is especially troubled about the fate of the human rights legislation that nation-states around the world have developed, with immense effort and over time (e.g. employment law, trade unions, universal welfare provision) and cites Zygmunt Bauman’s caution that globalisation will, at worst, result in widespread “global wealth” and “local poverty” (31). Further, he ends his book with a fully apocalyptic vision, “the Brazilianization of Europe” (161-3), which unapologetically calls upon the conventions of science fiction to imagine a worst-case scenario for a Europe without nations. While fourteen or fifteen years is evidently not enough time to put Beck’s prognosis to the test, most readers would probably agree that we are still some way away from such a Europe. Although the material wealth and presence of the transnational corporations strikes a chord, especially if we include the world banks and finance organisations in their number, the financial crisis that has rocked the world for the past three years, along with the wars in Iraq and Afghanistan, and the ascendancy of Al-Qaida (all things yet to happen when Beck was writing in 1997), has arguably resulted in the nations of Europe reinforcing their (respective and collective) legal, fiscal, and political might through rigorous new policing of their physical borders and regulation of their citizens through “austerity measures” of an order not seen since World War Two. In other words, while the processes of globalisation have clearly been instrumental in creating the financial crisis that Europe is presently grappling with and does, indeed, expose the extent to which the world economy now operates outside the control of the nation-state, the nation-state still exists very palpably for all its citizens (whether permanent or migrant) as an agent of control, welfare, and social justice. This may, indeed, cause us to conclude that Bauman’s vision of a world in which globalisation would make itself felt very differently for some groups than others came closest to what is taking shape: true, the transnationals have seized significant political and economic power from the nation-state, but this has not meant the end of the nation-state; rather, the change is being experienced as a re-trenching of whatever power the nation-state still has (and this, of course, is considerable) over its citizens in their “local”, everyday lives (Bauman 55). If we now turn to the portrait of Europe painted by the articles that constitute this special issue, we see further evidence of transglobal processes and practices operating in a realm oblivious to local (including national) concerns. While our authors are generally more concerned with the flows of information and “identity” than business or finance (Appaduri’s “ethnoscapes,” “technoscapes,” and “ideoscapes”: 33-7), there is the same impression that this “circulation” (Latour) is effectively bypassing the state at one level (the virtual), whilst remaining very materially bound by it at another. In other words, and following Bauman, we would suggest that it is quite possible for contemporary subjects to be both the agents and subjects of globalisation: a paradox that, as we shall go on to demonstrate, is given particularly vivid expression in the case of diasporic and/or migrant peoples who may be able to bypass the state in the manufacture of their “virtual” identities/communities) but who (Cohen) remain very much its subjects (or, indeed, “non-subjects”) when attempting movement in the material realm. Two of the articles in the collection (Leurs & Ponzanesi and Marcheva) deal directly with the exponential growth of “digital diasporas” (sometimes referred to as “e-diasporas”) since the inception of Facebook in 2004, and both provide specific illustrations of the way in which the nation-state both has, and has not, been transcended. First, it quickly becomes clear that for the (largely) “youthful” (Leurs & Ponzanesi) participants of nationally inscribed networking sites (e.g. “discovernikkei” (Japan), “Hyves” (Netherlands), “Bulgarians in the UK” (Bulgaria)), shared national identity is a means and not an end. In other words, although the participants of these sites might share in and actively produce a fond and nostalgic image of their “homeland” (Marcheva), they are rarely concerned with it as a material or political entity and an expression of their national identities is rapidly supplemented by the sharing of other (global) identity markers. Leurs & Ponzanesi invoke Deleuze and Guattari’s concept of the “rhizome” to describe the way in which social networkers “weave” a “rhizomatic path” to identity, gradually accumulating a hybrid set of affiliations. Indeed, the extent to which the “nation” disappears on such sites can be remarkable as was also observed in our investigation of the digital storytelling site, “Capture Wales” (BBC) (Pearce, "Writing"). Although this BBC site was set up to capture the voices of the Welsh nation in the early twenty-first century through a collection of (largely) autobiographical stories, very few of the participants mention either Wales or their “Welshness” in the stories that they tell. Further, where the “home” nation is (re)imagined, it is generally in an idealised, or highly personalised, form (e.g. stories about one’s own family) or through a sharing of (perceived and actual) cultural idiosyncrasies (Marcheva on “You know you’re a Bulgarian when …”) rather than an engagement with the nation-state per se. As Leurs & Ponzanesi observe: “We can see how the importance of the nation-state gets obscured as diasporic youth, through cultural hybridisation of youth culture and ethnic ties initiate subcultures and offer resistance to mainstream cultural forms.” Both the articles just discussed also note the shading of the “national” into the “transnational” on the social networking sites they discuss, and “transnationalism”—in the sense of many different nations and their diasporas being united through a common interest or cause—is also a focus of Pikner’s article on “collective actions” in Europe (notably, “EuroMayDay” and “My Estonia”) and Harb’s highly topical account of the role of both broadcast media (principally, Al-Jazeera) and social media in the revolutions and uprisings currently sweeping through the Arab world (spring 2011). On this point, it should be noted that Harb identifies this as the moment when Facebook’s erstwhile predominantly social function was displaced by a manifestly political one. From this we must conclude that both transnationalism and social media sites can be put to very different ends: while young people in relatively privileged democratic countries might embrace transnationalism as an expression of their desire to “rise above” national politics, the youth of the Arab world have engaged it as a means of generating solidarity for nationalist insurgency and liberation. Another instance of “g/local” digital solidarity exceeding national borders is to be found in Johanna Sumiala’s article on the circulatory power of the Internet in the Kauhajoki school shooting which took place Finland in 2008. As well as using the Internet to “stage manage” his rampage, the Kauhajoki shooter (whose name the author chose to withhold for ethical reasons) was subsequently found to have been a member of numerous Web-based “hate groups”, many of them originating in the United States and, as a consequence, may be understood to have committed his crime on behalf of a transnational community: what Sumiala has defined as a “networked community of destruction.” It must also be noted, however, that the school shootings were experienced as a very local tragedy in Finland itself and, although the shooter may have been psychically located in a transnational hyper-reality when he undertook the killings, it is his nation-state that has had to deal with the trauma and shame in the long term. Woodward and Brown & Rutherford, meanwhile, show that it remains the tendency of public broadcast media to uphold the raison d’être of the nation-state at the same time as embracing change. Woodward’s feature article (which reports on the AHRC-sponsored “Tuning In” project which has researched the BBC World Service) shows how the representation of national and diasporic “voices” from around the world, either in opposition to or in dialogue with the BBC’s own reporting, is key to the way in which the Commission has changed and modernised in recent times; however, she is also clear that many of the objectives that defined the service in its early days—such as its commitment to a distinctly “English” brand of education—still remain. Similarly, Brown & Rutherford’s article on the innovative Australian ABC children’s television series, My Place (which has combined traditional broadcasting with online, interactive websites) may be seen to be positively promoting the Australian nation by making visible its commitment to multiculturalism. Both articles nevertheless reveal the extent to which these public service broadcasters have recognised the need to respond to their nations’ changing demographics and, in particular, the fact that “diaspora” is a concept that refers not only to their English and Australian audiences abroad but also to their now manifestly multicultural audiences at home. When it comes to commercial satellite television, however, the relationship between broadcasting and national and global politics is rather harder to pin down. Subramanian exposes a complex interplay of national and global interests through her analysis of the Malayalee “reality television” series, Idea Star Singer. Exported globally to the Indian diaspora, the show is shamelessly exploitative in the way in which it combines residual and emergent ideologies (i.e. nostalgia for a traditional Keralayan way of life vs aspirational “western lifestyles”) in pursuit of its (massive) audience ratings. Further, while the ISS series is ostensibly a g/local phenomenon (the export of Kerala to the rest of the world rather than “India” per se), Subramanian passionately laments all the progressive national initiatives (most notably, the campaign for “women’s rights”) that the show is happy to ignore: an illustration of one of the negative consequences of globalisation predicted by Beck (31) noted at the start of this editorial. Harb, meanwhile, reflects upon a rather different set of political concerns with regards to commercial satellite broadcasting in her account of the role of Al-Jazeera and Al Arabiya in the recent (2011) Arab revolutions. Despite Al-Jazeera’s reputation for “two-sided” news coverage, recent events have exposed its complicity with the Qatari government; further, the uprisings have revealed the speed with which social media—in particular Facebook and Twitter—are replacing broadcast media. It is now possible for “the people” to bypass both governments and news corporations (public and private) in relaying the news. Taken together, then, what our articles would seem to indicate is that, while the power of the nation-state has notionally been transcended via a range of new networking practices, this has yet to undermine its material power in any guaranteed way (witness recent counter-insurgencies in Libya, Bahrain, and Syria).True, the Internet may be used to facilitate transnational “actions” against the nation-state (individual or collective) through a variety of non-violent or violent actions, but nation-states around the world, and especially in Western Europe, are currently wielding immense power over their subjects through aggressive “austerity measures” which have the capacity to severely compromise the freedom and agency of the citizens concerned through widespread unemployment and cuts in social welfare provision. This said, several of our articles provide evidence that Appadurai’s more utopian prognoses are also taking shape. Alongside the troubling possibility that globalisation, and the technologies that support it, is effectively eroding “difference” (be this national or individual), there are the ever-increasing (and widely reported) instances of how digital technology is actively supporting local communities and actions around the world in ways that bypass the state. These range from the relatively modest collective action, “My Estonia”, featured in Pikner’s article, to the ways in which the Libyan diaspora in Manchester have made use of social media to publicise and support public protests in Tripoli (Harb). In other words, there is compelling material evidence that the heterogeneity that Appadurai predicted and hoped for has come to pass through the people’s active participation in (and partial ownership of) media practices. Citizens are now able to “interfere” in the representation of their lives as never before and, through the digital revolution, communicate with one another in ways that circumvent state-controlled broadcasting. We are therefore pleased to present the articles that follow as a lively, interdisciplinary and international “state-of-the-art” commentary on how the ongoing revolution in media and communication is responding to, and bringing into being, the processes and practices of globalisation predicted by Appadurai, Beck, Bauman, and others in the 1990s. The articles also speak to the changing nature of the world’s “diasporas” during this fifteen year time frame (1996-2011) and, we trust, will activate further debate (following Cohen) on the conceptual tensions that now manifestly exist between “virtual” and “material” diasporas and also between the “transnational” diasporas whose objective is to transcend the nation-state altogether and those that deploy social media for specifically local or national/ist ends. Acknowledgements With thanks to the Arts and Humanities Research Council (UK) for their generous funding of the “Moving Manchester” project (2006-10). Special thanks to Dr Kate Horsley (Lancaster University) for her invaluable assistance as ‘Web Editor’ in the production of this special issue (we could not have managed without you!) and also to Gail Ferguson (our copy-editor) for her expertise in the preparation of the final typescript. References Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalisation. Minneapolis: U of Minnesota P, 1996. Bauman, Zygmunt. Globalization. Cambridge: Polity, 1998. Beck, Ulrich. What is Globalization? Trans. Patrick Camiller. Cambridge: Polity, 2000 (1997). Bromley, Roger. Narratives for a New Belonging: Diasporic Cultural Fictions. Edinburgh: Edinburgh UP, 2000. Cohen, Robin. Global Diasporas. 2nd ed. London and New York: Routledge, 2008. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. Brian Massumi. Minneapolis: U of Minnesota P, 1987. Latour, Bruno. Reassembling the Social: An Introduction to Actor-Network Theory. Oxford: Oxford UP, 1995. Pearce, Lynne, ed. Devolving Identities: Feminist Readings in Home and Belonging. London: Ashgate, 2000. Pearce, Lynne. “‘Writing’ and ‘Region’ in the Twenty-First Century: Epistemological Reflections on Regionally Located Art and Literature in the Wake of the Digital Revolution.” European Journal of Cultural Studies 13.1 (2010): 27-41. Robertson, Robert. Globalization: Social Theory and Global Culture. London: Sage, 1992. Urry, John. Sociology beyond Societies. London: Routledge, 1999. Williams, Raymond. Dream Worlds: Mass Consumption in Late Nineteenth-Century France. Berkeley: U of California P, 1982.
APA, Harvard, Vancouver, ISO, and other styles
22

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
APA, Harvard, Vancouver, ISO, and other styles
23

Paull, John. "Beyond Equal: From Same But Different to the Doctrine of Substantial Equivalence." M/C Journal 11, no. 2 (June 1, 2008). http://dx.doi.org/10.5204/mcj.36.

Full text
Abstract:
A same-but-different dichotomy has recently been encapsulated within the US Food and Drug Administration’s ill-defined concept of “substantial equivalence” (USFDA, FDA). By invoking this concept the genetically modified organism (GMO) industry has escaped the rigors of safety testing that might otherwise apply. The curious concept of “substantial equivalence” grants a presumption of safety to GMO food. This presumption has yet to be earned, and has been used to constrain labelling of both GMO and non-GMO food. It is an idea that well serves corporatism. It enables the claim of difference to secure patent protection, while upholding the contrary claim of sameness to avoid labelling and safety scrutiny. It offers the best of both worlds for corporate food entrepreneurs, and delivers the worst of both worlds to consumers. The term “substantial equivalence” has established its currency within the GMO discourse. As the opportunities for patenting food technologies expand, the GMO recruitment of this concept will likely be a dress rehearsal for the developing debates on the labelling and testing of other techno-foods – including nano-foods and clone-foods. “Substantial Equivalence” “Are the Seven Commandments the same as they used to be, Benjamin?” asks Clover in George Orwell’s “Animal Farm”. By way of response, Benjamin “read out to her what was written on the wall. There was nothing there now except a single Commandment. It ran: ALL ANIMALS ARE EQUAL BUT SOME ANIMALS ARE MORE EQUAL THAN OTHERS”. After this reductionist revelation, further novel and curious events at Manor Farm, “did not seem strange” (Orwell, ch. X). Equality is a concept at the very core of mathematics, but beyond the domain of logic, equality becomes a hotly contested notion – and the domain of food is no exception. A novel food has a regulatory advantage if it can claim to be the same as an established food – a food that has proven its worth over centuries, perhaps even millennia – and thus does not trigger new, perhaps costly and onerous, testing, compliance, and even new and burdensome regulations. On the other hand, such a novel food has an intellectual property (IP) advantage only in terms of its difference. And thus there is an entrenched dissonance for newly technologised foods, between claiming sameness, and claiming difference. The same/different dilemma is erased, so some would have it, by appeal to the curious new dualist doctrine of “substantial equivalence” whereby sameness and difference are claimed simultaneously, thereby creating a win/win for corporatism, and a loss/loss for consumerism. This ground has been pioneered, and to some extent conquered, by the GMO industry. The conquest has ramifications for other cryptic food technologies, that is technologies that are invisible to the consumer and that are not evident to the consumer other than via labelling. Cryptic technologies pertaining to food include GMOs, pesticides, hormone treatments, irradiation and, most recently, manufactured nano-particles introduced into the food production and delivery stream. Genetic modification of plants was reported as early as 1984 by Horsch et al. The case of Diamond v. Chakrabarty resulted in a US Supreme Court decision that upheld the prior decision of the US Court of Customs and Patent Appeal that “the fact that micro-organisms are alive is without legal significance for purposes of the patent law”, and ruled that the “respondent’s micro-organism plainly qualifies as patentable subject matter”. This was a majority decision of nine judges, with four judges dissenting (Burger). It was this Chakrabarty judgement that has seriously opened the Pandora’s box of GMOs because patenting rights makes GMOs an attractive corporate proposition by offering potentially unique monopoly rights over food. The rear guard action against GMOs has most often focussed on health repercussions (Smith, Genetic), food security issues, and also the potential for corporate malfeasance to hide behind a cloak of secrecy citing commercial confidentiality (Smith, Seeds). Others have tilted at the foundational plank on which the economics of the GMO industry sits: “I suggest that the main concern is that we do not want a single molecule of anything we eat to contribute to, or be patented and owned by, a reckless, ruthless chemical organisation” (Grist 22). The GMO industry exhibits bipolar behaviour, invoking the concept of “substantial difference” to claim patent rights by way of “novelty”, and then claiming “substantial equivalence” when dealing with other regulatory authorities including food, drug and pesticide agencies; a case of “having their cake and eating it too” (Engdahl 8). This is a clever slight-of-rhetoric, laying claim to the best of both worlds for corporations, and the worst of both worlds for consumers. Corporations achieve patent protection and no concomitant specific regulatory oversight; while consumers pay the cost of patent monopolization, and are not necessarily apprised, by way of labelling or otherwise, that they are purchasing and eating GMOs, and thereby financing the GMO industry. The lemma of “substantial equivalence” does not bear close scrutiny. It is a fuzzy concept that lacks a tight testable definition. It is exactly this fuzziness that allows lots of wriggle room to keep GMOs out of rigorous testing regimes. Millstone et al. argue that “substantial equivalence is a pseudo-scientific concept because it is a commercial and political judgement masquerading as if it is scientific. It is moreover, inherently anti-scientific because it was created primarily to provide an excuse for not requiring biochemical or toxicological tests. It therefore serves to discourage and inhibit informative scientific research” (526). “Substantial equivalence” grants GMOs the benefit of the doubt regarding safety, and thereby leaves unexamined the ramifications for human consumer health, for farm labourer and food-processor health, for the welfare of farm animals fed a diet of GMO grain, and for the well-being of the ecosystem, both in general and in its particularities. “Substantial equivalence” was introduced into the food discourse by an Organisation for Economic Co-operation and Development (OECD) report: “safety evaluation of foods derived by modern biotechnology: concepts and principles”. It is from this document that the ongoing mantra of assumed safety of GMOs derives: “modern biotechnology … does not inherently lead to foods that are less safe … . Therefore evaluation of foods and food components obtained from organisms developed by the application of the newer techniques does not necessitate a fundamental change in established principles, nor does it require a different standard of safety” (OECD, “Safety” 10). This was at the time, and remains, an act of faith, a pro-corporatist and a post-cautionary approach. The OECD motto reveals where their priorities lean: “for a better world economy” (OECD, “Better”). The term “substantial equivalence” was preceded by the 1992 USFDA concept of “substantial similarity” (Levidow, Murphy and Carr) and was adopted from a prior usage by the US Food and Drug Agency (USFDA) where it was used pertaining to medical devices (Miller). Even GMO proponents accept that “Substantial equivalence is not intended to be a scientific formulation; it is a conceptual tool for food producers and government regulators” (Miller 1043). And there’s the rub – there is no scientific definition of “substantial equivalence”, no scientific test of proof of concept, and nor is there likely to be, since this is a ‘spinmeister’ term. And yet this is the cornerstone on which rests the presumption of safety of GMOs. Absence of evidence is taken to be evidence of absence. History suggests that this is a fraught presumption. By way of contrast, the patenting of GMOs depends on the antithesis of assumed ‘sameness’. Patenting rests on proven, scrutinised, challengeable and robust tests of difference and novelty. Lightfoot et al. report that transgenic plants exhibit “unexpected changes [that] challenge the usual assumptions of GMO equivalence and suggest genomic, proteomic and metanomic characterization of transgenics is advisable” (1). GMO Milk and Contested Labelling Pesticide company Monsanto markets the genetically engineered hormone rBST (recombinant Bovine Somatotropin; also known as: rbST; rBGH, recombinant Bovine Growth Hormone; and the brand name Prosilac) to dairy farmers who inject it into their cows to increase milk production. This product is not approved for use in many jurisdictions, including Europe, Australia, New Zealand, Canada and Japan. Even Monsanto accepts that rBST leads to mastitis (inflammation and pus in the udder) and other “cow health problems”, however, it maintains that “these problems did not occur at rates that would prohibit the use of Prosilac” (Monsanto). A European Union study identified an extensive list of health concerns of rBST use (European Commission). The US Dairy Export Council however entertain no doubt. In their background document they ask “is milk from cows treated with rBST safe?” and answer “Absolutely” (USDEC). Meanwhile, Monsanto’s website raises and answers the question: “Is the milk from cows treated with rbST any different from milk from untreated cows? No” (Monsanto). Injecting cows with genetically modified hormones to boost their milk production remains a contested practice, banned in many countries. It is the claimed equivalence that has kept consumers of US dairy products in the dark, shielded rBST dairy farmers from having to declare that their milk production is GMO-enhanced, and has inhibited non-GMO producers from declaring their milk as non-GMO, non rBST, or not hormone enhanced. This is a battle that has simmered, and sometimes raged, for a decade in the US. Finally there is a modest victory for consumers: the Pennsylvania Department of Agriculture (PDA) requires all labels used on milk products to be approved in advance by the department. The standard issued in October 2007 (PDA, “Standards”) signalled to producers that any milk labels claiming rBST-free status would be rejected. This advice was rescinded in January 2008 with new, specific, department-approved textual constructions allowed, and ensuring that any “no rBST” style claim was paired with a PDA-prescribed disclaimer (PDA, “Revised Standards”). However, parsimonious labelling is prohibited: No labeling may contain references such as ‘No Hormones’, ‘Hormone Free’, ‘Free of Hormones’, ‘No BST’, ‘Free of BST’, ‘BST Free’,’No added BST’, or any statement which indicates, implies or could be construed to mean that no natural bovine somatotropin (BST) or synthetic bovine somatotropin (rBST) are contained in or added to the product. (PDA, “Revised Standards” 3) Difference claims are prohibited: In no instance shall any label state or imply that milk from cows not treated with recombinant bovine somatotropin (rBST, rbST, RBST or rbst) differs in composition from milk or products made with milk from treated cows, or that rBST is not contained in or added to the product. If a product is represented as, or intended to be represented to consumers as, containing or produced from milk from cows not treated with rBST any labeling information must convey only a difference in farming practices or dairy herd management methods. (PDA, “Revised Standards” 3) The PDA-approved labelling text for non-GMO dairy farmers is specified as follows: ‘From cows not treated with rBST. No significant difference has been shown between milk derived from rBST-treated and non-rBST-treated cows’ or a substantial equivalent. Hereinafter, the first sentence shall be referred to as the ‘Claim’, and the second sentence shall be referred to as the ‘Disclaimer’. (PDA, “Revised Standards” 4) It is onto the non-GMO dairy farmer alone, that the costs of compliance fall. These costs include label preparation and approval, proving non-usage of GMOs, and of creating and maintaining an audit trail. In nearby Ohio a similar consumer versus corporatist pantomime is playing out. This time with the Ohio Department of Agriculture (ODA) calling the shots, and again serving the GMO industry. The ODA prescribed text allowed to non-GMO dairy farmers is “from cows not supplemented with rbST” and this is to be conjoined with the mandatory disclaimer “no significant difference has been shown between milk derived from rbST-supplemented and non-rbST supplemented cows” (Curet). These are “emergency rules”: they apply for 90 days, and are proposed as permanent. Once again, the onus is on the non-GMO dairy farmers to document and prove their claims. GMO dairy farmers face no such governmental requirements, including no disclosure requirement, and thus an asymmetric regulatory impost is placed on the non-GMO farmer which opens up new opportunities for administrative demands and technocratic harassment. Levidow et al. argue, somewhat Eurocentrically, that from its 1990s adoption “as the basis for a harmonized science-based approach to risk assessment” (26) the concept of “substantial equivalence” has “been recast in at least three ways” (58). It is true that the GMO debate has evolved differently in the US and Europe, and with other jurisdictions usually adopting intermediate positions, yet the concept persists. Levidow et al. nominate their three recastings as: firstly an “implicit redefinition” by the appending of “extra phrases in official documents”; secondly, “it has been reinterpreted, as risk assessment processes have … required more evidence of safety than before, especially in Europe”; and thirdly, “it has been demoted in the European Union regulatory procedures so that it can no longer be used to justify the claim that a risk assessment is unnecessary” (58). Romeis et al. have proposed a decision tree approach to GMO risks based on cascading tiers of risk assessment. However what remains is that the defects of the concept of “substantial equivalence” persist. Schauzu identified that: such decisions are a matter of “opinion”; that there is “no clear definition of the term ‘substantial’”; that because genetic modification “is aimed at introducing new traits into organisms, the result will always be a different combination of genes and proteins”; and that “there is no general checklist that could be followed by those who are responsible for allowing a product to be placed on the market” (2). Benchmark for Further Food Novelties? The discourse, contestation, and debate about “substantial equivalence” have largely focussed on the introduction of GMOs into food production processes. GM can best be regarded as the test case, and proof of concept, for establishing “substantial equivalence” as a benchmark for evaluating new and forthcoming food technologies. This is of concern, because the concept of “substantial equivalence” is scientific hokum, and yet its persistence, even entrenchment, within regulatory agencies may be a harbinger of forthcoming same-but-different debates for nanotechnology and other future bioengineering. The appeal of “substantial equivalence” has been a brake on the creation of GMO-specific regulations and on rigorous GMO testing. The food nanotechnology industry can be expected to look to the precedent of the GMO debate to head off specific nano-regulations and nano-testing. As cloning becomes economically viable, then this may be another wave of food innovation that muddies the regulatory waters with the confused – and ultimately self-contradictory – concept of “substantial equivalence”. Nanotechnology engineers particles in the size range 1 to 100 nanometres – a nanometre is one billionth of a metre. This is interesting for manufacturers because at this size chemicals behave differently, or as the Australian Office of Nanotechnology expresses it, “new functionalities are obtained” (AON). Globally, government expenditure on nanotechnology research reached US$4.6 billion in 2006 (Roco 3.12). While there are now many patents (ETC Group; Roco), regulation specific to nanoparticles is lacking (Bowman and Hodge; Miller and Senjen). The USFDA advises that nano-manufacturers “must show a reasonable assurance of safety … or substantial equivalence” (FDA). A recent inventory of nano-products already on the market identified 580 products. Of these 11.4% were categorised as “Food and Beverage” (WWICS). This is at a time when public confidence in regulatory bodies is declining (HRA). In an Australian consumer survey on nanotechnology, 65% of respondents indicated they were concerned about “unknown and long term side effects”, and 71% agreed that it is important “to know if products are made with nanotechnology” (MARS 22). Cloned animals are currently more expensive to produce than traditional animal progeny. In the course of 678 pages, the USFDA Animal Cloning: A Draft Risk Assessment has not a single mention of “substantial equivalence”. However the Federation of Animal Science Societies (FASS) in its single page “Statement in Support of USFDA’s Risk Assessment Conclusion That Food from Cloned Animals Is Safe for Human Consumption” states that “FASS endorses the use of this comparative evaluation process as the foundation of establishing substantial equivalence of any food being evaluated. It must be emphasized that it is the food product itself that should be the focus of the evaluation rather than the technology used to generate cloned animals” (FASS 1). Contrary to the FASS derogation of the importance of process in food production, for consumers both the process and provenance of production is an important and integral aspect of a food product’s value and identity. Some consumers will legitimately insist that their Kalamata olives are from Greece, or their balsamic vinegar is from Modena. It was the British public’s growing awareness that their sugar was being produced by slave labour that enabled the boycotting of the product, and ultimately the outlawing of slavery (Hochschild). When consumers boycott Nestle, because of past or present marketing practices, or boycott produce of USA because of, for example, US foreign policy or animal welfare concerns, they are distinguishing the food based on the narrative of the food, the production process and/or production context which are a part of the identity of the food. Consumers attribute value to food based on production process and provenance information (Paull). Products produced by slave labour, by child labour, by political prisoners, by means of torture, theft, immoral, unethical or unsustainable practices are different from their alternatives. The process of production is a part of the identity of a product and consumers are increasingly interested in food narrative. It requires vigilance to ensure that these narratives are delivered with the product to the consumer, and are neither lost nor suppressed. Throughout the GM debate, the organic sector has successfully skirted the “substantial equivalence” debate by excluding GMOs from the certified organic food production process. This GMO-exclusion from the organic food stream is the one reprieve available to consumers worldwide who are keen to avoid GMOs in their diet. The organic industry carries the expectation of providing food produced without artificial pesticides and fertilizers, and by extension, without GMOs. Most recently, the Soil Association, the leading organic certifier in the UK, claims to be the first organisation in the world to exclude manufactured nonoparticles from their products (Soil Association). There has been the call that engineered nanoparticles be excluded from organic standards worldwide, given that there is no mandatory safety testing and no compulsory labelling in place (Paull and Lyons). The twisted rhetoric of oxymorons does not make the ideal foundation for policy. Setting food policy on the shifting sands of “substantial equivalence” seems foolhardy when we consider the potentially profound ramifications of globally mass marketing a dysfunctional food. If there is a 2×2 matrix of terms – “substantial equivalence”, substantial difference, insubstantial equivalence, insubstantial difference – while only one corner of this matrix is engaged for food policy, and while the elements remain matters of opinion rather than being testable by science, or by some other regime, then the public is the dupe, and potentially the victim. “Substantial equivalence” has served the GMO corporates well and the public poorly, and this asymmetry is slated to escalate if nano-food and clone-food are also folded into the “substantial equivalence” paradigm. Only in Orwellian Newspeak is war peace, or is same different. It is time to jettison the pseudo-scientific doctrine of “substantial equivalence”, as a convenient oxymoron, and embrace full disclosure of provenance, process and difference, so that consumers are not collateral in a continuing asymmetric knowledge war. References Australian Office of Nanotechnology (AON). Department of Industry, Tourism and Resources (DITR) 6 Aug. 2007. 24 Apr. 2008 < http://www.innovation.gov.au/Section/Innovation/Pages/ AustralianOfficeofNanotechnology.aspx >.Bowman, Diana, and Graeme Hodge. “A Small Matter of Regulation: An International Review of Nanotechnology Regulation.” Columbia Science and Technology Law Review 8 (2007): 1-32.Burger, Warren. “Sidney A. Diamond, Commissioner of Patents and Trademarks v. Ananda M. Chakrabarty, et al.” Supreme Court of the United States, decided 16 June 1980. 24 Apr. 2008 < http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=US&vol=447&invol=303 >.Curet, Monique. “New Rules Allow Dairy-Product Labels to Include Hormone Info.” The Columbus Dispatch 7 Feb. 2008. 24 Apr. 2008 < http://www.dispatch.com/live/content/business/stories/2008/02/07/dairy.html >.Engdahl, F. William. Seeds of Destruction. Montréal: Global Research, 2007.ETC Group. Down on the Farm: The Impact of Nano-Scale Technologies on Food and Agriculture. Ottawa: Action Group on Erosion, Technology and Conservation, November, 2004. European Commission. Report on Public Health Aspects of the Use of Bovine Somatotropin. Brussels: European Commission, 15-16 March 1999.Federation of Animal Science Societies (FASS). Statement in Support of FDA’s Risk Assessment Conclusion That Cloned Animals Are Safe for Human Consumption. 2007. 24 Apr. 2008 < http://www.fass.org/page.asp?pageID=191 >.Grist, Stuart. “True Threats to Reason.” New Scientist 197.2643 (16 Feb. 2008): 22-23.Hochschild, Adam. Bury the Chains: The British Struggle to Abolish Slavery. London: Pan Books, 2006.Horsch, Robert, Robert Fraley, Stephen Rogers, Patricia Sanders, Alan Lloyd, and Nancy Hoffman. “Inheritance of Functional Foreign Genes in Plants.” Science 223 (1984): 496-498.HRA. Awareness of and Attitudes toward Nanotechnology and Federal Regulatory Agencies: A Report of Findings. Washington: Peter D. Hart Research Associates, 25 Sep. 2007.Levidow, Les, Joseph Murphy, and Susan Carr. “Recasting ‘Substantial Equivalence’: Transatlantic Governance of GM Food.” Science, Technology, and Human Values 32.1 (Jan. 2007): 26-64.Lightfoot, David, Rajsree Mungur, Rafiqa Ameziane, Anthony Glass, and Karen Berhard. “Transgenic Manipulation of C and N Metabolism: Stretching the GMO Equivalence.” American Society of Plant Biologists Conference: Plant Biology, 2000.MARS. “Final Report: Australian Community Attitudes Held about Nanotechnology – Trends 2005-2007.” Report prepared for Department of Industry, Tourism and Resources (DITR). Miranda, NSW: Market Attitude Research Services, 12 June 2007.Miller, Georgia, and Rye Senjen. “Out of the Laboratory and on to Our Plates: Nanotechnology in Food and Agriculture.” Friends of the Earth, 2008. 24 Apr. 2008 < http://nano.foe.org.au/node/220 >.Miller, Henry. “Substantial Equivalence: Its Uses and Abuses.” Nature Biotechnology 17 (7 Nov. 1999): 1042-1043.Millstone, Erik, Eric Brunner, and Sue Mayer. “Beyond ‘Substantial Equivalence’.” Nature 401 (7 Oct. 1999): 525-526.Monsanto. “Posilac, Bovine Somatotropin by Monsanto: Questions and Answers about bST from the United States Food and Drug Administration.” 2007. 24 Apr. 2008 < http://www.monsantodairy.com/faqs/fda_safety.html >.Organisation for Economic Co-operation and Development (OECD). “For a Better World Economy.” Paris: OECD, 2008. 24 Apr. 2008 < http://www.oecd.org/ >.———. “Safety Evaluation of Foods Derived by Modern Biotechnology: Concepts and Principles.” Paris: OECD, 1993.Orwell, George. Animal Farm. Adelaide: ebooks@Adelaide, 2004 (1945). 30 Apr. 2008 < http://ebooks.adelaide.edu.au/o/orwell/george >.Paull, John. “Provenance, Purity and Price Premiums: Consumer Valuations of Organic and Place-of-Origin Food Labelling.” Research Masters thesis, University of Tasmania, Hobart, 2006. 24 Apr. 2008 < http://eprints.utas.edu.au/690/ >.Paull, John, and Kristen Lyons. “Nanotechnology: The Next Challenge for Organics.” Journal of Organic Systems (in press).Pennsylvania Department of Agriculture (PDA). “Revised Standards and Procedure for Approval of Proposed Labeling of Fluid Milk.” Milk Labeling Standards (2.0.1.17.08). Bureau of Food Safety and Laboratory Services, Pennsylvania Department of Agriculture, 17 Jan. 2008. ———. “Standards and Procedure for Approval of Proposed Labeling of Fluid Milk, Milk Products and Manufactured Dairy Products.” Milk Labeling Standards (2.0.1.17.08). Bureau of Food Safety and Laboratory Services, Pennsylvania Department of Agriculture, 22 Oct. 2007.Roco, Mihail. “National Nanotechnology Initiative – Past, Present, Future.” In William Goddard, Donald Brenner, Sergy Lyshevski and Gerald Iafrate, eds. Handbook of Nanoscience, Engineering and Technology. 2nd ed. Boca Raton, FL: CRC Press, 2007.Romeis, Jorg, Detlef Bartsch, Franz Bigler, Marco Candolfi, Marco Gielkins, et al. “Assessment of Risk of Insect-Resistant Transgenic Crops to Nontarget Arthropods.” Nature Biotechnology 26.2 (Feb. 2008): 203-208.Schauzu, Marianna. “The Concept of Substantial Equivalence in Safety Assessment of Food Derived from Genetically Modified Organisms.” AgBiotechNet 2 (Apr. 2000): 1-4.Soil Association. “Soil Association First Organisation in the World to Ban Nanoparticles – Potentially Toxic Beauty Products That Get Right under Your Skin.” London: Soil Association, 17 Jan. 2008. 24 Apr. 2008 < http://www.soilassociation.org/web/sa/saweb.nsf/848d689047 cb466780256a6b00298980/42308d944a3088a6802573d100351790!OpenDocument >.Smith, Jeffrey. Genetic Roulette: The Documented Health Risks of Genetically Engineered Foods. Fairfield, Iowa: Yes! Books, 2007.———. Seeds of Deception. Melbourne: Scribe, 2004.U.S. Dairy Export Council (USDEC). Bovine Somatotropin (BST) Backgrounder. Arlington, VA: U.S. Dairy Export Council, 2006.U.S. Food and Drug Administration (USFDA). Animal Cloning: A Draft Risk Assessment. Rockville, MD: Center for Veterinary Medicine, U.S. Food and Drug Administration, 28 Dec. 2006.———. FDA and Nanotechnology Products. U.S. Department of Health and Human Services, U.S. Food and Drug Administration, 2008. 24 Apr. 2008 < http://www.fda.gov/nanotechnology/faqs.html >.Woodrow Wilson International Center for Scholars (WWICS). “A Nanotechnology Consumer Products Inventory.” Data set as at Sep. 2007. Woodrow Wilson International Center for Scholars, Project on Emerging Technologies, Sep. 2007. 24 Apr. 2008 < http://www.nanotechproject.org/inventories/consumer >.
APA, Harvard, Vancouver, ISO, and other styles
24

Lupton, Deborah, and Gareth M. Thomas. "Playing Pregnancy: The Ludification and Gamification of Expectant Motherhood in Smartphone Apps." M/C Journal 18, no. 5 (October 1, 2015). http://dx.doi.org/10.5204/mcj.1012.

Full text
Abstract:
IntroductionLike other forms of embodiment, pregnancy has increasingly become subject to representation and interpretation via digital technologies. Pregnancy and the unborn entity were largely private, and few people beyond the pregnant women herself had access to the foetus growing within her (Duden). Now pregnant and foetal bodies have become open to public portrayal and display (Lupton The Social Worlds of the Unborn). A plethora of online materials – websites depicting the unborn entity from the moment of conception, amateur YouTube videos of births, social media postings of ultrasounds and self-taken photos (‘selfies’) showing changes in pregnant bellies, and so on – now ensure the documentation of pregnant and unborn bodies in extensive detail, rendering them open to other people’s scrutiny. Other recent digital technologies directed at pregnancy include mobile software applications, or ‘apps’. In this article, we draw on our study involving a critical discourse analysis of a corpus of pregnancy-related apps offered in the two major app stores. In so doing, we discuss the ways in which pregnancy-related apps portray pregnant and unborn bodies. We place a particular focus on the ludification and gamification strategies employed to position pregnancy as a playful, creative and fulfilling experience that is frequently focused on consumption. As we will demonstrate, these strategies have wider implications for concepts of pregnant and foetal embodiment and subjectivity.It is important here to make a distinction between ludification and gamification. Ludification is a broader term than gamification. It is used in the academic literature on gaming (sometimes referred to as ‘ludology’) to refer to elements of games reaching into other aspects of life beyond leisure pursuits (Frissen et al. Playful Identities: The Ludification of Digital Media Cultures; Raessens). Frissen et al. (Frissen et al. "Homo Ludens 2.0: Play, Media and Identity") for example, claim that even serious pursuits such as work, politics, education and warfare have been subjected to ludification. They note that digital technologies in general tend to incorporate ludic dimensions. Gamification has been described as ‘the use of game design elements in non-game contexts’ (Deterding et al. 9). The term originated in the digital media industry to describe the incorporation of features into digital technologies that not explicitly designed as games, such as competition, badges, rewards and fun that engaged and motivated users to make them more enjoyable to use. Gamification is now often used in literatures on marketing strategies, persuasive computing or behaviour modification. It is an important element of ‘nudge’, an approach to behaviour change that involves persuasion over coercion (Jones, Pykett and Whitehead). Gamification thus differs from ludification in that the former involves applying ludic principles for reasons other than the pleasures of enjoying the game for their own sake, often to achieve objectives set by actors and agencies other than the gamer. Indeed, this is why gamification software has been described by Bogost (Bogost) as ‘exploitationware’. Analysing Pregnancy AppsMobile apps have become an important medium in contemporary digital technology use. As of May 2015, 1.5 million apps were available to download on Google Play while 1.4 million were available in the Apple App Store (Statista). Apps related to pregnancy are a popular item in app stores, frequently appearing on the Apple App Store’s list of most-downloaded apps. Google Play’s figures show that many apps directed at pregnant women have been downloaded hundreds of thousands, or even millions, of times. For example, ‘Pregnancy +’, ‘I’m Expecting - Pregnancy App’ and ‘What to Expect - Pregnancy Tracker’ have each been downloaded between one and five million times, while ‘My Pregnancy Today’ has received between five and ten million downloads. Pregnancy games for young girls are also popular. Google Play figures show that the ‘Pregnant Emergency Doctor’ game, for example, has received between one and five million downloads. Research has found that pregnant women commonly download pregnancy-related apps and find them useful sources of information and support (Hearn, Miller and Fletcher; Rodger et al.; Kraschnewski et al.; Declercq et al.; Derbyshire and Dancey; O'Higgins et al.). We conducted a comprehensive analysis of all pregnancy-related smartphone apps in the two major app stores, Apple App Store and Google Play, in late June 2015. Android and Apple’s iOS have a combined market share of 91 percent of apps installed on mobile phones (Seneviratne et al.). A search for all pregnancy-related apps offered in these stores used key terms such as pregnancy, childbirth, conception, foetus/fetus and baby. After eliminating apps listed in these searches that were clearly not human pregnancy-related, 665 apps on Google Play and 1,141 on the Apple App Store remained for inclusion in our study. (Many of these apps were shared across the stores.)We carried out a critical discourse analysis of these apps, looking closely at the app descriptions offered in the two stores. We adopted the perspective that sees apps, like any other form of media, as sociocultural artefacts that both draw on and reproduce shared norms, ideals, knowledges and beliefs (Lupton "Quantified Sex: A Critical Analysis of Sexual and Reproductive Self-Tracking Using Apps"; Millington "Smartphone Apps and the Mobile Privatization of Health and Fitness"; Lupton "Apps as Artefacts: Towards a Critical Perspective on Mobile Health and Medical Apps"). In undertaking our analysis of the app descriptions in our corpus, attention was paid to the title of each app, the textual accounts of its content and use and the images that were employed, such as the logo of the app and the screenshots that were used to illustrate its content and style. Our focus in this article is on the apps that we considered as including elements of entertainment. Pregnancy-related game apps were by far the largest category of the apps in our corpus. These included games for young girls and expectant fathers as well as apps for ultrasound manipulation, pregnancy pranks, foetal sex prediction, choosing baby names, and quizzes. Less obviously, many other apps included in our analysis offered some elements of gamification and ludification, and these were considered in our analysis. ‘Pregnant Adventures’: App Games for GirlsOne of the major genres of apps that we identified was games directed at young girls. These apps invited users to shop for clothes, dress up, give a new hair style, ‘make-over’ and otherwise beautify a pregnant woman. These activities were directed at the goal of improving the physical attractiveness and therefore (it was suggested) the confidence of the woman, who was presented as struggling with coming to terms with changes in her body during pregnancy. Other apps for this target group involved the player assuming the role of a doctor in conducting medical treatments for injured pregnant women or assisting the birth of her baby.Many of these games represented the pregnant woman visually as looking like an archetypal Barbie doll, with a wardrobe to match. One app (‘Barbara Pregnancy Shopping’) even uses the name ‘Barbara’ and the screenshots show a woman similar in appearance to the doll. Its description urges players to use the game to ‘cheer up’ an ‘unconfident’ Barbara by taking her on a ‘shopping spree’ for new, glamorous clothes ‘to make Barbara feel beautiful throughout her pregnancy’. Players may find ‘sparkly accessories’ as well for Barbara and help her find a new hairstyle so that she ‘can be her fashionable self again’ and ‘feel prepared to welcome her baby!’. Likewise, the game ‘Pregnant Mommy Makeover Spa’ involves players selecting clothes, applying beauty treatments and makeup and adding accessories to give a makeover to ‘Pregnant Princess’ Leila. The ‘Celebrity Mommy’s Newborn Baby Doctor’ game combines the drawcard of ‘celebrity’ with ‘mommy’. Players are invited to ‘join the celebrities in their pregnancy adventure!’ and ‘take care of Celebrity Mom during her pregnancy!’.An app by the same developer of ‘Barbara Pregnancy Shopping’ also offers ‘Barbara’s Caesarean Birth’. The app description claims that: ‘Of course her poor health doesn’t allow Barbara to give birth to her baby herself.’ It is up to players to ‘make everything perfect’ for Barbara’s caesarean birth. The screenshots show Barbara’s pregnant abdomen being slit open, retracted and a rosy, totally clean infant extracted from the incision, complete with blonde hair. Players then sew up the wound. A final screenshot displays an image of a smiling Barbara standing holding her sleeping, swaddled baby, with the words ‘You win’.Similar games involve princesses, mermaids, fairies and even monster and vampire pregnant women giving birth either vaginally or by caesarean. Despite their preternatural status, the monster and vampire women conform to the same aesthetic as the other pregnant women in these games: usually with long hair and pretty, made-up faces, wearing fashionable clothing even on the operating table. Their newborn infants are similarly uniform in their appearance as they emerge from the uterus. They are white-skinned, clean and cherubic (described in ‘Mommy’s Newborn Baby Princess’ as ‘the cutest baby you probably want’), a far cry from the squalling, squashed-faced infants smeared in birth fluids produced by the real birth process.In these pregnancy games for girls, the pain and intense bodily effort of birthing and the messiness produced by the blood and other body fluids inherent to the process of labour and birth are completely missing. The fact that caesarean birth is a major abdominal surgery requiring weeks of recovery is obviated in these games. Apart from the monsters and vampires, who may have green- or blue-hued skin, nearly all other pregnant women are portrayed as white-skinned, young, wearing makeup and slim, conforming to conventional stereotypical notions of female beauty. In these apps, the labouring women remain glamorous, usually smiling, calm and unsullied by the visceral nature of birth.‘Track Your Pregnancy Day by Day’: Self-Monitoring and Gamified PregnancyElements of gamification were evident in a large number of the apps in our corpus, including many apps that invite pregnant users to engage in self-tracking of their bodies and that of their foetuses. Users are asked to customise the apps to document their changing bodies and track their foetus’ development as part of reproducing the discourse of the miraculous nature of pregnancy and promoting the pleasures of self-tracking and self-transformation from pregnant woman to mother. When using the ‘Pregnancy+’ app, for example, users can choose to construct a ‘Personal Dashboard’ that includes details of their pregnancy. They can input their photograph, first name and their expected date of delivery so that that each daily update begins with ‘Hello [name of user], you are [ ] weeks and [ ] days pregnant’ with the users’ photograph attached to the message. The woman’s weight gain over time and a foetal kick counter are also included in this app. It provides various ways for users to mark the passage of time, observe the ways in which their foetuses change and move week by week and monitor changes in their bodies. According to the app description for ‘My Pregnancy Today’, using such features allows a pregnant woman to: ‘Track your pregnancy day by day.’ Other apps encourage women to track such aspects of physical activity, vitamin and fluid intake, diet, mood and symptoms. The capacity to visually document the pregnant user’s body is also a feature of several apps. The ‘Baby Bump Pregnancy’, ‘WebMD Pregnancy’, ‘I’m Expecting’,’iPregnant’ and ‘My Pregnancy Today’ apps, for example, all offer an album feature for pregnant bump photos taken by the user of herself (described as a ‘bumpie’ in the blurb for ‘My Pregnancy Today’). ‘Baby Buddy’ encourages women to create a pregnant avatar of themselves (looking glamorous, well-dressed and happy). Some apps even advise users on how they should feel. As a screenshot from ‘Pregnancy Tracker Week by Week’ claims: ‘Victoria, your baby is growing in your body. You should be the happiest woman in the world.’Just as pregnancy games for little girls portrayal pregnancy as a commodified and asetheticised experience, the apps directed at pregnant women themselves tend to shy away from discomforting fleshly realities of pregnant and birthing embodiment. Pregnancy is represented as an enjoyable and fashionable state of embodiment: albeit one that requires constant self-surveillance and vigilance.‘Hello Mommy!’: The Personalisation and Aestheticisation of the FoetusA dominant feature of pregnancy-related apps is the representation of the foetus as already a communicative person in its own right. For example, the ‘Pregnancy Tickers – Widget’ app features the image of a foetus (looking far more like an infant, with a full head of wavy hair and open eyes) holding a pencil and marking a tally on the walls of the uterus. The app is designed to provide various icons showing the progress of the user’s pregnancy each day on her mobile device. The ‘Hi Mommy’ app features a cartoon-like pink and cuddly foetus looking very baby-like addressing its mother from the womb, as in the following message that appears on the user’s smartphone: ‘Hi Mommy! When will I see you for the first time?’ Several pregnancy-tracking apps also allow women to input the name that they have chosen for their expected baby, to receive customised notifications of its progress (‘Justin is nine weeks and two days old today’).Many apps also incorporate images of foetuses that represent them as wondrous entities, adopting the visual style of 1960s foetal photography pioneer Lennart Nilsson, or what Stormer (Stormer) has referred to as ‘prenatal sublimity’. The ‘Pregnancy+’ app features such images. Users can choose to view foetal development week-by-week as a colourful computerised animation or 2D and 3D ultrasound scans that have been digitally manipulated to render them aesthetically appealing. These images replicate the softly pink, glowing portrayals of miraculous unborn life typical of Nilsson’s style.Other apps adopt a more contemporary aesthetic and allow parents to store and manipulate images of their foetal ultrasounds and then share them via social media. The ‘Pimp My Ultrasound’ app, for example, invites prospective parents to manipulate images of their foetal ultrasounds by adding in novelty features to the foetal image such as baseball caps, jewellery, credit cards and musical instruments. The ‘Hello Mom’ app creates a ‘fetal album’ of ultrasounds taken of the user’s foetus, while the ‘Ultrasound Viewer’ app lets users manipulate their 3/4 D foetal ultrasound images: ‘Have fun viewing it from every angle, rotating, panning and zooming to see your babies [sic] features and share with your family and friends via Facebook and Twitter! … Once uploaded, you can customise your scan with a background colour and skin colour of your choice’.DiscussionPregnancy, like any other form of embodiment, is performative. Pregnant women are expected to conform to norms and assumptions about their physical appearance and deportment of their bodies that expect them to remain well-groomed, fit and physically attractive without appearing overly sexual (Longhurst "(Ad)Dressing Pregnant Bodies in New Zealand: Clothing, Fashion, Subjectivities and Spatialities"; Longhurst "'Corporeographies’ of Pregnancy: ‘Bikini Babes'"; Nash; Littler). Simultaneously they must negotiate the burden of bodily management in the interests of risk regulation. They are expected to protect their vulnerable unborn from potential dangers by stringently disciplining their bodies and policing to what substances they allow entry (Lupton The Social Worlds of the Unborn; Lupton "'Precious Cargo': Risk and Reproductive Citizenship"). Pregnancy self-tracking apps enact the soft politics of algorithmic authority, encouraging people to conform to expectations of self-responsibility and self-management by devoting attention to monitoring their bodies and acting on the data that they generate (Whitson; Millington "Amusing Ourselves to Life: Fitness Consumerism and the Birth of Bio-Games"; Lupton The Quantified Self: A Sociology of Self-Tracking).Many commentators have remarked on the sexism inherent in digital games (e.g. Dickerman, Christensen and Kerl-McClain; Thornham). Very little research has been conducted specifically on the gendered nature of app games. However our analysis suggests that, at least in relation to the pregnant woman, reductionist heteronormative, cisgendered, patronising and paternalistic stereotypes abound. In the games for girls, pregnant women are ideally young, heterosexual, partnered, attractive, slim and well-groomed, before, during and after birth. In self-tracking apps, pregnant women are portrayed as ideally self-responsible, enthused about their pregnancy and foetus to the point that they are counting the days until the birth and enthusiastic about collecting and sharing details about themselves and their unborn (often via social media).Ambivalence about pregnancy, the foetus or impending motherhood, and lack of interest in monitoring the pregnancy or sharing details of it with others are not accommodated, acknowledged or expected by these apps. Acknowledgement of the possibility of pregnant women who are not overtly positive about their pregnancy or lack interest in it or who identify as transgender or lesbian or who are sole mothers is distinctly absent.Common practices we noted in apps – such as giving foetuses names before birth and representing them as verbally communicating with their mothers from inside the womb – underpin a growing intensification around the notion of the unborn entity as already an infant and social actor in its own right. These practices have significant implications for political agendas around the treatment of pregnant women in terms of their protection or otherwise of their unborn, and for debates about women’s reproductive rights and access to abortion (Lupton The Social Worlds of the Unborn; Taylor The Public Life of the Fetal Sonogram: Technology, Consumption and the Politics of Reproduction). Further, the gamification and ludification of pregnancy serve to further commodify the experience of pregnancy and childbirth, contributing to an already highly commercialised environment in which expectant parents, and particularly mothers, are invited to purchase many goods and services related to pregnancy and early parenthood (Taylor "Of Sonograms and Baby Prams: Prenatal Diagnosis, Pregnancy, and Consumption"; Kroløkke; Thomson et al.; Taylor The Public Life of the Fetal Sonogram: Technology, Consumption and the Politics of Reproduction; Thomas).In the games for girls we examined, the pregnant woman herself was a commodity, a selling point for the app. The foetus was also frequently commodified in its representation as an aestheticised entity and the employment of its image (either as an ultrasound or other visual representations) or identity to market apps such as the girls’ games, apps for manipulating ultrasound images, games for predicting the foetus’ sex and choosing its name, and prank apps using fake ultrasounds purporting to reveal a foetus inside a person’s body. As the pregnant user engages in apps, she becomes a commodity in yet another way: the generator of personal data that are marketable in themselves. In this era of the digital data knowledge economy, the personal information about people gathered from their online interactions and content creation has become highly profitable for third parties (Andrejevic; van Dijck). Given that pregnant women are usually in the market for many new goods and services, their personal data is a key target for data mining companies, who harvest it to sell to advertisers (Marwick).To conclude, our analysis suggests that gamification and ludification strategies directed at pregnancy and childbirth can serve to obfuscate the societal pressures that expect and seek to motivate pregnant women to maintain physical fitness and attractiveness, simultaneously ensuring that they protect their foetuses from all possible risks. In achieving both ends, women are encouraged to engage in intense self-monitoring and regulation of their bodies. These apps also reproduce concepts of the unborn entity as a precious and beautiful already-human. These types of portrayals have important implications for how young girls learn about pregnancy and childbirth, for pregnant women’s experiences and for concepts of foetal personhood that in turn may influence women’s reproductive rights and abortion politics.ReferencesAndrejevic, Mark. Infoglut: How Too Much Information Is Changing the Way We Think and Know. New York: Routledge, 2013. Print.Bogost, Ian. "Why Gamification Is Bullshit." The Gameful World: Approaches, Issues, Applications. Eds. Steffen Walz and Sebastian Deterding. Boston, MA: MIT Press, 2015. 65-80. Print.Declercq, E.R., et al. Listening to Mothers III: Pregnancy and Birth. New York: Childbirth Connection, 2013. Print.Derbyshire, Emma, and Darren Dancey. "Smartphone Medical Applications for Women's Health: What Is the Evidence-Base and Feedback?" International Journal of Telemedicine and Applications (2013).Deterding, Sebastian, et al. "From Game Design Elements to Gamefulness: Defining Gamification." Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments. ACM, 2011. Dickerman, Charles, Jeff Christensen, and Stella Beatríz Kerl-McClain. "Big Breasts and Bad Guys: Depictions of Gender and Race in Video Games." Journal of Creativity in Mental Health 3.1 (2008): 20-29. Duden, Barbara. Disembodying Women: Perspectives on Pregnancy and the Unborn. Trans. Lee Hoinacki. Cambridge, MA: Harvard University Press, 1993. Frissen, Valerie, et al. "Homo Ludens 2.0: Play, Media and Identity." Playful Identities: The Ludification of Digital Media Cultures. Eds. Valerie Frissen et al. Amsterdam: University of Amsterdam Press, 2015. 9-50. ———, eds. Playful Identities: The Ludification of Digital Media Cultures. Amsterdam: Amsterdam University Press, 2015. Hearn, Lydia, Margaret Miller, and Anna Fletcher. "Online Healthy Lifestyle Support in the Perinatal Period: What Do Women Want and Do They Use It?" Australian Journal of Primary Health 19.4 (2013): 313-18. Jones, Rhys, Jessica Pykett, and Mark Whitehead. "Big Society's Little Nudges: The Changing Politics of Health Care in an Age of Austerity." Political Insight 1.3 (2010): 85-87. Kraschnewski, L. Jennifer, et al. "Paging “Dr. Google”: Does Technology Fill the Gap Created by the Prenatal Care Visit Structure? Qualitative Focus Group Study with Pregnant Women." Journal of Medical Internet Research. 16.6 (2014): e147. Kroløkke, Charlotte. "On a Trip to the Womb: Biotourist Metaphors in Fetal Ultrasound Imaging." Women's Studies in Communication 33.2 (2010): 138-53. Littler, Jo. "The Rise of the 'Yummy Mummy': Popular Conservatism and the Neoliberal Maternal in Contemporary British Culture." Communication, Culture & Critique 6.2 (2013): 227-43. Longhurst, Robyn. "(Ad)Dressing Pregnant Bodies in New Zealand: Clothing, Fashion, Subjectivities and Spatialities." Gender, Place & Culture 12.4 (2005): 433-46. ———. "'Corporeographies’ of Pregnancy: ‘Bikini Babes'." Environment and Planning D: Society and Space 18.4 (2000): 453-72. Lupton, Deborah. "Apps as Artefacts: Towards a Critical Perspective on Mobile Health and Medical Apps." Societies 4.4 (2014): 606-22. ———. "'Precious Cargo': Risk and Reproductive Citizenship." Critical Public Health 22.3 (2012): 329-40. ———. The Quantified Self: A Sociology of Self-Tracking. Cambridge: Polity Press, 2016. ———. "Quantified Sex: A Critical Analysis of Sexual and Reproductive Self-Tracking Using Apps." Culture, Health & Sexuality 17.4 (2015): 440-53. ———. The Social Worlds of the Unborn. Houndmills: Palgrave Macmillan, 2013. Marwick, Alice. "How Your Data Are Being Deeply Mined." The New York Review of Books (2014). Millington, Brad. "Amusing Ourselves to Life: Fitness Consumerism and the Birth of Bio-Games." Journal of Sport & Social Issues 38.6 (2014): 491-508. ———. "Smartphone Apps and the Mobile Privatization of Health and Fitness." Critical Studies in Media Communication 31.5 (2014): 479-93. Nash, Meredith. Making 'Postmodern' Mothers: Pregnant Embodiment, Baby Bumps and Body Image. Houndmills: Palgrave Macmillan, 2013. O'Higgins, A., et al. "The Use of Digital Media by Women Using the Maternity Services in a Developed Country." Irish Medical Journal 108.5 (2015). Raessens, Joost. "Playful Identities, or the Ludification of Culture." Games and Culture 1.1 (2006): 52-57. Rodger, D., et al. "Pregnant Women’s Use of Information and Communications Technologies to Access Pregnancy-Related Health Information in South Australia." Australian Journal of Primary Health 19.4 (2013): 308-12. Seneviratne, Suranga, et al. "Your Installed Apps Reveal Your Gender and More!" Mobile Computing and Communications Review 18.3 (2015): 55-61. Statista. "Number of Apps Available in Leading App Stores as of May 2015." 2015. Stormer, Nathan. "Looking in Wonder: Prenatal Sublimity and the Commonplace 'Life'." Signs 33.3 (2008): 647-73. Taylor, Janelle. "Of Sonograms and Baby Prams: Prenatal Diagnosis, Pregnancy, and Consumption." Feminist Studies 26.2 (2000): 391-418. ———. The Public Life of the Fetal Sonogram: Technology, Consumption and the Politics of Reproduction. New Brunswick, NJ: Rutgers University Press, 2008. Thomas, Gareth M. "Picture Perfect: ‘4d’ Ultrasound and the Commoditisation of the Private Prenatal Clinic." Journal of Consumer Culture. Online first, 2015. Thomson, Rachel, et al. Making Modern Mothers. Bristol: Policy Press, 2011. Thornham, Helen. “'It's a Boy Thing'.” Feminist Media Studies 8.2 (2008): 127-42. Van Dijck, José. "Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology." Surveillance & Society 12.2 (2014): 197-208. Whitson, Jennifer. "Gaming the Quantified Self." Surveillance & Society 11.1/2 (2013): 163-76.
APA, Harvard, Vancouver, ISO, and other styles
25

Pedersen, Isabel, and Kristen Aspevig. "Being Jacob: Young Children, Automedial Subjectivity, and Child Social Media Influencers." M/C Journal 21, no. 2 (April 25, 2018). http://dx.doi.org/10.5204/mcj.1352.

Full text
Abstract:
Introduction Children are not only born digital, they are fashioned toward a lifestyle that needs them to be digital all the time (Palfrey and Gasser). They click, tap, save, circulate, download, and upload the texts of their lives, their friends’ lives, and the anonymous lives of the people that surround them. They are socialised as Internet consumers ready to participate in digital services targeted to them as they age such as Snapchat, Instagram, and YouTube. But they are also fashioned as producers, whereby their lives are sold as content on these same markets. As commodities, the minutiae of their lives become the fodder for online circulation. Paradoxically, we also celebrate these digital behaviours as a means to express identity. Personal profile-building for adults is considered agency-building (Beer and Burrows), and as a consequence, we praise children for mimicking these acts of adult lifestyle. This article reflects on the Kids, Creative Storyworlds, and Wearables project, which involved an ethnographic study with five young children (ages 4-7), who were asked to share their autobiographical stories, creative self-narrations, and predictions about their future mediated lives (Atkins et al.). For this case study, we focus on commercialised forms of children’s automedia, and we compare discussions we had with 6-year old Cayden, a child we met in the study who expresses the desire to make himself famous online, with videos of Jacob, a child vlogger on YouTube’s Kinder Playtime, who clearly influences children like Cayden. We argue that child social influencers need consideration both as autobiographical agents and as child subjects requiring a sheltered approach to their online lives.Automedia Automedia is an emergent genre of autobiography (Smith and Watson Reading 190; “Virtually Me” 78). Broadcasting one’s life online takes many forms (Kennedy “Vulnerability”). Ümit Kennedy argues “Vlogging on YouTube is a contemporary form of autobiography in which individuals engage in a process of documenting their life on a daily or weekly basis and, in doing so, construct[ing] their identity online” (“Exploring”). Sidonie Smith and Julia Watson write that “visual and digital modes are projecting and circulating not just new subjects but new notions of subjectivity through the effects of automediality” with the result that “the archive of the self in time, in space and in relation expands and is fundamentally reorganized” (Reading 190). Emma Maguire addresses what online texts “tell us about cultural understandings of selfhood and what it means to communicate ‘real’ life through media” naming one tool, “automedia”. Further, Julie Rak calls on scholars “to rethink ‘life’ and ‘writing’ as automedia” to further “characterize the enactment of a personal life story in a new media environment.” We define automedia as a genre that involves the practices of creating, performing, sharing, circulating, and (at times) preserving one’s digital life narrative meant for multiple publics. Automedia revises identity formation, embodiment, or corporealities in acts of self-creation (Brophy and Hladki 4). Automedia also emphasizes circulation. As shared digital life texts now circulate through the behaviours of other human subjects, and automatically via algorithms in data assemblages, we contend that automediality currently involves a measure of relinquishing control over perpetually evolving mediatised environments. One cannot control how a shared life narrative will meet a public in the future, which is a revised way of thinking about autobiography. For the sake of this paper, we argue that children’s automedia ought to be considered a creative, autobiographical act, in order to afford child authors who create them the consideration they deserve as agents, now and in the future. Automedial practices often begin when children receive access to a device. The need for a distraction activity is often the reason parents hand a young child a smartphone, iPad, or even a wearable camera (Nansen). Mirroring the lives of parents, children aspire to share representations of their own personal lives in pursuit of social capital. They are often encouraged to use technologies and apps as adults do–to track aspects of self, broadcast life stories and eventually “live share” them—effectively creating, performing, sharing, and at times, seeking to preserve a public life narrative. With this practice, society inculcates children into spheres of device ubiquity, “socializing them to a future digital lifestyle that will involve always carrying a computer in some form” (Atkins et al. 49). Consequently, their representations become inculcated in larger media assemblages. Writing about toddlers, Nansen describes how the “archiving, circulation and reception of these images speaks to larger assemblages of media in which software protocols and algorithms are increasingly embedded in and help to configure everyday life (e.g. Chun; Gillespie), including young children’s media lives (Ito)” (Nansen). Children, like adult citizens, are increasingly faced with choices “not structured by their own preferences but by the economic imperatives of the private corporations that have recently come to dominate the internet” (Andrejevic). Recent studies have shown that for children and youth in the digital age, Internet fame, often characterized by brand endorsements, is a major aspiration (Uhls and Greenfield, 2). However, despite the ambition to participate as celebrity digital selves, children are also mired in the calls to shield them from exposure to screens through institutions that label these activities detrimental. In many countries, digital “protections” are outlined by privacy commissioners and federal or provincial/state statutes, (e.g. Office of the Privacy Commissioner of Canada). Consequently, children are often caught in a paradox that defines them either as literate digital agents able to compose or participate with their online selves, or as subjectified wards caught up in commercial practices that exploit their lives for commercial gain.Kids, Creative Storyworlds and Wearables ProjectBoth academic and popular cultural critics continually discuss the future but rarely directly engage the people who will be empowered (or subjugated) by it as young adults in twenty years. To address children’s lack of agency in these discussions, we launched the Kids, Creative Storyworlds and Wearables project to bring children into a dialogue about their own digital futures. Much has been written on childhood agency and participation in culture and mediated culture from the discipline of sociology (James and James; Jenks; Jenkins). In previous work, we addressed the perspective of child autobiographical feature filmmakers to explore issues of creative agency and consent when adult gatekeepers facilitate children in film production (Pedersen and Aspevig “My Eyes”; Pedersen and Aspevig “Swept”). Drawing on that previous work, this project concentrates on children’s automediated lives and the many unique concerns that materialize with digital identity-building. Children are categorised as a vulnerable demographic group necessitating special policy and legislation, but the lives they project as children will eventually become subsumed in their own adult lives, which will almost certainly be treated and mediated in a much different manner in the future. We focused on this landscape, and sought to query the children on their futures, also considering the issues that arise when adult gatekeepers get involved with child social media influencers. In the Storyworlds ethnographic study, children were given a wearable toy, a Vtech smartwatch called Kidizoom, to use over a month’s timeframe to serve as a focal point for ethnographic conversations. The Kidizoom watch enables children to take photos and videos, which are uploaded to a web interface. Before we gave them the tech, we asked them questions about their lives, including What are machines going to be like in the future? Can you imagine yourself wearing a certain kind of computer? Can you tell/draw a story about that? If you could wear a computer that gave you a super power, what would it be? Can you use your imagination to think of a person in a story who would use technology? In answering, many of them drew autobiographical drawings of technical inventions, and cast themselves in the images. We were particularly struck by the comments made by one participant, Cayden (pseudonym), a 6-year-old boy, and the stories he told us about himself and his aspirations. He expressed the desire to host a YouTube channel about his life, his activities, and the wearable technologies his family already owned (e.g. a GroPro camera) and the one we gave him, the Kidizoom smartwatch. He talked about how he would be proud to publically broadcast his own videos on YouTube, and about the role he had been allowed to play in the making of videos about his life (that were not broadcast). To contextualize Cayden’s commentary and his automedial aspirations, we extended our study to explore child social media influencers who broadcast components of their personal lives for the deliberate purpose of popularity and the financial gain of their parents.We selected the videos of Jacob, a child vlogger because we judged them to be representative of the kinds that Cayden watched. Jacob reviews toys through “unboxing videos,” a genre in which a child tells an online audience her or his personal experiences using new toys in regular, short videos on a social media site. Jacob appears on a YouTube channel called Kinder Playtime, which appears to be a parent-run channel that states that, “We enjoy doing these things while playing with our kids: Jacob, Emily, and Chloe” (see Figure 1). In one particular video, Jacob reviews the Kidizoom watch, serving as a child influencer for the product. By understanding Jacob’s performance as agent-driven automedia, as well as being a commercialised, mediatised form of advertising, we get a clearer picture of how the children in the study are coming to terms with their own digital selfhood and the realisation that circulated, life-exposing videos are the expectation in this context.Children are implicated in a range of ways through “family” influencer and toy unboxing videos, which are emergent entertainment industries (Abidin 1; Nansen and Nicoll; Craig and Cunningham 77). In particular, unboxing videos do impact child viewers, especially when children host them. Jackie Marsh emphasizes the digital literacy practices at play here that co-construct viewers as “cyberflâneur[s]” and she states that “this mode of cultural transmission is a growing feature of online practices for this age group” (369). Her stress, however, is on how the child viewer enjoys “the vicarious pleasure he or she may get from viewing the playing of another child with the toy” (376). Marsh writes that her study subject, a child called “Gareth”, “was not interested in being made visible to EvanHD [a child celebrity social media influencer] or other online peers, but was content to consume” the unboxing videos. The concept of the cyberflâneur, then, is fitting as a mediatising co-constituting process of identity-building within discourses of consumerism. However, in our study, the children, and especially Cayden, also expressed the desire to create, host, and circulate their own videos that broadcast their lives, also demonstrating awareness that videos are valorised in their social circles. Child viewers watch famous children perform consumer-identities to create an aura of influence, but viewers simultaneously aspire to become influencers using automedial performances, in essence, becoming products, themselves. Jacob, Automedial Subjects and Social Media InfluencersJacob is a vlogger on YouTube whose videos can garner millions of views, suggesting that he is also an influencer. In one video, he appears to be around the age of six as he proudly sits with folded hands, bright eyes, and a beaming, but partly toothless smile (see Figure 2). He says, “Welcome to Kinder Playtime! Today we have the Kidi Zoom Smartwatch DX. It’s from VTech” (Kinder Playtime). We see the Kidi Zoom unboxed and then depicted in stylized animations amid snippets of Jacob’s smiling face. The voice and hands of a faceless parent guide Jacob as he uses his new wearable toy. We listen to both parent and child describe numerous features for recording and enhancing the wearer’s daily habits (e.g. calculator, calendar, fitness games), and his dad tells him it has a pedometer “which tracks your steps” (Kinder Playtime). But the watch is also used by Jacob to mediate himself and his world. We see that Jacob takes pictures of himself on the tiny watch screen as he acts silly for the camera. He also uses the watch to take personal videos of his mother and sister in his home. The video ends with his father mentioning bedtime, which prompts a “thank you” to VTech for giving him the watch, and a cheerful “Bye!” from Jacob (Kinder Playtime). Figure 1: Screenshot of Kinder Playtime YouTube channel, About page Figure 2: Screenshot of “Jacob,” a child vlogger at Kinder Playtime We chose Jacob for three reasons. First, he is the same age as the children in the Storyworlds study. Second, he reviews the smart watch artifact that we gave to the study children, so there was a common use of automedia technology. Third, Jacob’s parents were involved with his broadcasts, and we wanted to work within the boundaries of parent-sanctioned practices. However, we also felt that his playful approach was a good example of how social media influence overlaps with automediality. Jacob is a labourer trading his public self-representations in exchange for free products and revenue earned through the monetisation of his content on YouTube. It appears that much of what Jacob says is scripted, particularly the promotional statements, like, “Today we have the Kidizoom Smartwatch DX. It’s from VTech. It’s the smartest watch for kids” (Kinder Playtime). Importantly, as an automedial subject Jacob reveals aspects of his self and his identity, in the manner of many child vloggers on public social media sites. His product reviews are contextualised within a commoditised space that provides him a means for the public performance of his self, which, via YouTube, has the potential to reach an enormous audience. YouTube claims to have “over a billion users—almost one-third of all people on the Internet—and every day people watch hundreds of millions of hours on YouTube and generate billions of views” (YouTube). Significantly, he is not only filmed by others, Jacob is also a creative practitioner, as Cayden aspired to become. Jacob uses high-tech toys, in this case, a new wearable technology for self-compositions (the smart watch), to record himself, friends, family or simply the goings-on around him. Strapped to his wrist, the watch toy lets him play at being watched, at being quantified and at recording the life stories of others, or constructing automediated creations for himself, which he may upload to numerous social media sites. This is the start of his online automediated life, which will be increasingly under his ownership as he ages. To greater or lesser degrees, he will later be able to curate, add to, and remediate his body of automedia, including his digital past. Kennedy points out that “people are using YouTube as a transformative tool, and mirror, to document, construct, and present their identity online” (“Exploring”). Her focus is on adult vloggers who consent to their activities. Jacob’s automedia is constructed collaboratively with his parents, and it is unclear how much awareness he has of himself as an automedia creator. However, if we don’t afford Jacob the same consideration as we afford adult autobiographers, that the depiction of his life is his own, we will reduce his identity performance to pure artifice or advertisement. The questions Jacob’s videos raise around agency, consent, and creativity are important here. Sidonie Smith asks “Can there be a free, agentic space; and if so, where in the world can it be found?” (Manifesto 188). How much agency does Jacob have? Is there a liberating aspect in the act of putting personal technology into the hands of a child who can record his life, himself? And finally, how would an adult Jacob feel about his childhood self advertising these products online? Is this really automediality if Jacob does not fully understand what it means to publicly tell a mediated life story?These queries lead to concerns over child social media influence with regard to legal protection, marketing ethics, and user consent. The rise of “fan marketing” presents a nexus of stealth marketing to children by other children. Stealth marketing involves participants, in this case, fans, who do not know they are involved in an advertising scheme. For instance, the popular Minecon Minecraft conference event sessions have pushed their audience to develop the skills to become advocates and advertisers of their products, for example by showing audiences how to build a YouTube channel and sharing tips for growing a community. Targeting children in marketing ploys seems insidious. Marketing analyst Sandy Fleisher describes the value of outsourcing marketing to fan labourers:while Grand Theft Auto spent $120 million on marketing its latest release, Minecraft fans are being taught how to create and market promotional content themselves. One [example] is Minecraft YouTuber, SkydoesMinecraft. His nearly 7 million strong YouTube army, almost as big as Justin Bieber’s, means his daily videos enjoy a lot of views; 1,419,734,267 to be precise. While concerns about meaningful consent that practices like this raise have led some government bodies, and consumer and child protection groups to advocate restrictions for children, other critics have questioned the limits placed on children’s free expression by such restrictions. Tech commentator Larry Magid has written that, “In the interest of protecting children, we sometimes deny them the right to access material and express themselves.” Meghan M. Sweeney notes that “the surge in collaborative web models and the emphasis on interactivity—frequently termed Web 2.0—has meant that children are not merely targets of global media organizations” but have “multiple opportunities to be active, critical, and resistant producers”...and ”may be active agents in the production and dissemination of information” (68). Nevertheless, writes Sweeney, “corporate entities can have restrictive effects on consumers” (68), by for example, limiting imaginative play to the choices offered on a Disney website, or limiting imaginative topics to commercial products (toys, video games etc), as in YouTube review videos. Automedia is an important site from which to consider young children’s online practices in public spheres. Jacob’s performance is indeed meant to influence the choice to buy a toy, but it is also meant to influence others in knowing Jacob as an identity. He means to share and circulate his self. Julie Rak recalls Paul John Eakin’s claims about life-writing that the “process does not even occur at the level of writing, but at the level of living, so that identity formation is the result of narrative-building.” We view Jacob’s performance along these lines. Kinder Playtime offers him a constrained, parent-sanctioned (albeit commercialised) space for role-playing, a practice bound up with identity-formation in the life of most children. To think through the legality of recognising Jacob’s automedial content as his life, Rak is also useful: “In Eakin’s work in particular, we can see evidence of John Locke’s contention that identity is the expression of consciousness which is continuous over time, but that identity is also a product, one’s own property which is a legal entity”. We have argued that children are often caught in the paradox that defines them either as literate digital creators composing and circulating their online selves or as subjectified personas caught up in commercial advertising practices that use their lives for commercial gain. However, through close observation of individual children, one who we met and questioned in our study, Cayden, the other who we met through his mediated, commercialized, and circulated online persona, Jacob, we argue that child social influencers need consideration as autobiographical agents expressing themselves through automediality. As children create, edit, and grow digital traces of their lives and selves, how these texts are framed becomes increasingly important, in part because their future adult selves have such a stake in the matter: they are being formed through automedia. Moreover, these children’s coming of age may bring legal questions about the ownership of their automedial products such as YouTube videos, an enduring legacy they are leaving behind for their adult selves. Crucially, if we reduce identity performances such as unboxing, toy review videos, and other forms of children’s fan marketing to pure advertisement, we cannot afford Jacob and other child influencers the agency that their self representation is legally and artistically their own.ReferencesAbidin, Crystal. “#familygoals: Family Influencers, Calibrated Amateurism, and Justifying Young Digital Labor.” Social Media + Society 3.2 (2017): 1-15.Andrejevic, Mark. “Privacy, Exploitation, and the Digital Enclosure.” Amsterdam Law Forum 1.4 (2009). <http://amsterdamlawforum.org/article/view/94/168>.Atkins, Bridgette, Isabel Pedersen, Shirley Van Nuland, and Samantha Reid. “A Glimpse into the Kids, Creative Storyworlds and Wearables Project: A Work-in-Progress.” ICET 60th World Assembly: Teachers for a Better World: Creating Conditions for Quality Education – Pedagogy, Policy and Professionalism. 2017. 49-60.Beer, David, and Roger Burrows. “Popular Culture, Digital Archives and the New Social Life of Data.” Theory, Culture & Society 30.4 (2013): 47–71.Brophy, Sarah, and Janice Hladki. Introduction. Pedagogy, Image Practices, and Contested Corporealities. Eds. Sarah Brophy and Janice Hladki. New York, NY: Routledge, 2014. 1-6.Craig, David, and Stuart Cunningham. “Toy Unboxing: Living in a(n Unregulated) Material World.” Media International Australia 163.1 (2017): 77-86.Fleischer, Sandy. “Watch Out for That Creeper: What Minecraft Teaches Us about Marketing.” Digital Marketing Magazine. 30 May 2014. <http://digitalmarketingmagazine.co.uk/articles/watch-out-for-that-creeper-what-minecraft-teaches-us-about-marketing>.James, Allison, and Adrian James. Key Concepts in Childhood Studies. London: Sage, 2012.Jenkins, Henry. The Childhood Reader. New York: NYU P, 1998.Jenks, Chris. Childhood. 2nd ed. London: Routledge, 2015.Kennedy, Ümit. "Exploring YouTube as a Transformative Tool in the 'The Power of MAKEUP!' Movement." M/C Journal 19.4 (2016). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1127>.———. “The Vulnerability of Contemporary Digital Autobiography” a/b: Auto/Biography Studies 32.2 (2017): 409-411.Kinder Playtime. “VTech Kidizoom Smart Watch DX Review by Kinder Playtime.” YouTube, 4 Nov. 2015. <https://www.youtube.com/watch?v=JaxCSjwZjcA&t=28s>.Magid, Larry. “Protecting Children Online Needs to Allow for Their Right to Free Speech.” ConnectSafely 29 Aug. 2014. <http://www.connectsafely.org/protecting-children-online-needs-to-allow-for-their-right-to-free-speech/>.Maguire, Emma. “Home, About, Shop, Contact: Constructing an Authorial Persona via the Author Website.” M/C Journal 17.3 (2014). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/821>.Marsh, Jackie. “‘Unboxing’ Videos: Co-construction of the Child as Cyberflâneur.” Discourse: Studies in the Cultural Politics of Education 37.3 (2016): 369-380.Nansen, Bjorn. “Accidental, Assisted, Automated: An Emerging Repertoire of Infant Mobile Media Techniques.” M/C Journal 18.5 (2015). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1026>.———, and Benjamin Nicoll. “Toy Unboxing Videos and the Mimetic Production of Play.” Paper presented at the 18th Annual Conference of Internet Researchers (AoIR), Tartu, Estonia. 2017.Palfrey, John, and Urs Gasser. Born Digital: How Children Grow Up in a Digital Age. New York: Basic Books, 2016.Pedersen, Isabel, and Kristen Aspevig. “‘My Eyes Ended Up at My Fingertips, My Ears, My Nose, My Mouth’: Antoine, Autobiographical Documentary, and the Cinematic Depiction of a Blind Child Subject.” Biography: An Interdisciplinary Quarterly 34.4 (2011).Pedersen, Isabel, and Kristen Aspevig. “‘Swept to the Sidelines and Forgotten’: Cultural Exclusion, Blind Persons’ Participation, and International Film Festivals.” Canadian Journal of Disability Studies 3.3 (2014): 29-52.Rak, Julie. “First Person? Life Writing versus Automedia.” International Association for Biography and Autobiography Europe (IABA Europe). Vienna, Austria. 30 Oct. – 3 Nov. 2013.Smith, Sidonie. “The Autobiographical Manifesto.” Ed. Shirely Neuman. Autobiography and Questions of Gender. London: Frank Cass, 1991.———, and Julia Watson. Reading Autobiography. Minneapolis: U of Minnesota P, 2010.———. “Virtually Me: A Toolbox about Online Self-Presentation.” Identity Technologies: Constructing the Self Online. Eds. Anna Poletti and Julie Rak. Madison: U of Wisconsin P, 2014. 70-95.Sweeney, Meghan. “‘Where Happily Ever After Happens Every Day’: Disney's Official Princess Website and the Commodification of Play.” Jeunesse: Young People, Texts, Cultures 3.2 (2011): 66-87.Uhls, Yalda, and Particia Greenfield. “The Value of Fame: Preadolescent Perceptions of Popular Media and Their Relationship to Future Aspirations.” Developmental Psychology 48.2 (2012): 315-326.YouTube. “YouTube for Press.” 2017. <https://www.youtube.com/yt/about/press/>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography