Journal articles on the topic 'Online social networks – Moral and ethical aspects'

To see the other types of publications on this topic, follow the link: Online social networks – Moral and ethical aspects.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Online social networks – Moral and ethical aspects.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Demina, Irina. "Mediatization of the Economy: Aspects of Optimizing Economic Media Communications in the Digital Environment." Theoretical and Practical Issues of Journalism 10, no. 2 (June 7, 2021): 253–69. http://dx.doi.org/10.17150/2308-6203.2021.10(2).253-269.

Full text
Abstract:
Mediatization is a relatively new approach to understanding the processes that take place in various spheres of human life. In media research, when studying this topic, politics, culture, and social practices are most often examined, but the sphere of economics is only mentioned and has rarely been explored. The purpose of the article is to determine new areas of research in the field of mediatization of the economy. The article examined traditional types of economic mass communication, provided an overview of modern economic communication practices (e-commerce, social networks, co-sharing companies, crowdfunding platforms, mobile applications, block chain and cryptocurrencies) that have arisen as a result of the digitalization of the economy. The author argues that the concept of economic communications in a digital society becomes expansive, and the digital economy can be called an economy via communications. In the digital world, there are economic interactions between the audience members themselves. It is proved that mediatization is not only a process that accompanies the functioning of the economy but the media themselves become a business environment. The mediatization of the economy triggers new and actualizes the existing threats to the livelihood of the audience ("economic power" of monopolies, "social engineering", scams on the Web, deception, etc.). We need a legal mechanism for regulating the digital economy, ethical codes. The intellectual potential of society created online should develop not only in the direction of the accumulation of new economic information and technologies for running online business, but also in the development of moral rules considering axiological and deontological aspects. In the context of mediatization the role of economic journalism is increasing, going beyond the scope of business journalism. The study of economic communications in the digital environment should become one of the current issues of modern journalism theory.
APA, Harvard, Vancouver, ISO, and other styles
2

Martynova, Marina D. "“Digital trust” vs “Distrust” in the Formation of Social Relations and Practices of Glocal Society." Humanitarian: actual problems of the humanities and education 20, no. 4 (December 30, 2020): 445–53. http://dx.doi.org/10.15507/2078-9823.052.020.202004.445-453.

Full text
Abstract:
Introduction. The individual’s application of established social practices in the digital environment faces certain difficulties caused by the wide opportunities for “honest” and “dishonest” behavior on the Internet. The high level of trust in digital technologies and the possibility of manipulating personal data, the desire to rely on “expert opinion” and unreliable information, the social need for communication and the illusion of communication in social networks, as well as other dilemmas of relationships in the digital world and operating with big data create a sense of uncertainty, instability and disunity in the perception of digital reality. The purpose of the article is to identify social and ethical aspects of trust phenomenon as an attitude of consciousness, obstacles to digital trust and identify ways to develop it. Materials and Methods. The interdisciplinary approach based on ethics of information technology, sociology, and communication theory allows us to analyze the formation of new social practices and interpret the development of a person’s value attitude to new realities of life. Research result. The following areas of actualization of the concept of “trust” in the digital world are identified as trust in data and algorithms, trust in “digital subject”, “Internet of trust” as a space of obligations and rules. The formation of the “Internet of trust” is associated with awareness of all social, moral and psychological problems associated with the process of combining online and offline environments in the social practice of an individual, where new forms of applying traditional standards of behavior should be found. Discussion and Conclusion. Postponing the rational risk analysis of digital interaction by an individual “for later” provokes the creation of situations that are critical for the individual’s well-being and security. The costs of digital trust are reduced security and creation of “traps” in public relations and social practices. Digital environment creates a situation of vulnerability of an individual, which encourages him to resort to possible measures of protection. In turn, the “Internet of trust” as a new digital reality is absolutely necessary for the effective functioning and further development of society.
APA, Harvard, Vancouver, ISO, and other styles
3

Brady, William J., Killian McLoughlin, Tuan N. Doan, and Molly J. Crockett. "How social learning amplifies moral outrage expression in online social networks." Science Advances 7, no. 33 (August 2021): eabe5641. http://dx.doi.org/10.1126/sciadv.abe5641.

Full text
Abstract:
Moral outrage shapes fundamental aspects of social life and is now widespread in online social networks. Here, we show how social learning processes amplify online moral outrage expressions over time. In two preregistered observational studies on Twitter (7331 users and 12.7 million total tweets) and two preregistered behavioral experiments (N = 240), we find that positive social feedback for outrage expressions increases the likelihood of future outrage expressions, consistent with principles of reinforcement learning. In addition, users conform their outrage expressions to the expressive norms of their social networks, suggesting norm learning also guides online outrage expressions. Norm learning overshadows reinforcement learning when normative information is readily observable: in ideologically extreme networks, where outrage expression is more common, users are less sensitive to social feedback when deciding whether to express outrage. Our findings highlight how platform design interacts with human learning mechanisms to affect moral discourse in digital public spaces.
APA, Harvard, Vancouver, ISO, and other styles
4

Ohnishi, Kayoko, Teresa E. Stone, Takashi Yoshiike, and Kazuyo Kitaoka. "The role of online ethics consultation on mental health." Nursing Ethics 27, no. 5 (April 23, 2020): 1261–69. http://dx.doi.org/10.1177/0969733020906596.

Full text
Abstract:
Background Nurses experience moral distress when they cannot do what they believe is right or when they must do what they believe is wrong. Given the limited mechanisms for managing ethical issues for nurses in Japan, an Online Ethics Consultation on mental health (OEC) was established open to anyone seeking anonymous consultation on mental health practice. Research objective To report the establishment of the Online Ethics Consultation and describe and evaluate its effectiveness. Ethical considerations The research was conducted in accordance with the Declaration of Helsinki. Research design This evaluation describes the outcomes of 5 years of operation of the Online Ethics Consultation on mental health in Japan Participants The Online Ethics Consultation received 12 emails requesting consultation. Consultees included mental health nurses, psychiatrists, and service users. Findings The most common questions directed to the service were about seclusion and physical restraint. Response time from receipt of email to sending a reply was between 1 and 14 days. Despite the disappointing number of consultations, feedback has been positive. Discussion The Online Ethics Consultation was established to assist morally sensitive nurses in resolving their ethical problems through provision of unbiased and encouraging advice. Mental health care in Japan has been less than ideal: long-term social hospitalization, seclusion, and restraint are common practices that often lead to moral distress in nurses and the questions received reflected this. The head of the Online Ethics Consultation sent a supportive, facilitative response summarizing the opinions of several consultants. Conclusion This study provides key information for the establishment of an online ethics resource the adoption of which has the potential to improve the experience of nurses, allied health and clients of mental health services. This paper has implications for services concerned with improving patient care, managing nurses’ moral distress, building ethics into decision-making.
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Alan D., and O. Felix Offodile. "Ethical and Managerial Aspects of Social Network Advertisement." Journal of Electronic Commerce in Organizations 14, no. 4 (October 2016): 28–51. http://dx.doi.org/10.4018/jeco.2016100103.

Full text
Abstract:
Social networking systems are relatively new to society and clarification on certain aspects of the system can be obtained through further research. There are many positive aspects of social networks, such as Facebook, that organizations could benefit from including stronger customer relationship management (CRM) techniques. On the other hand, questions are raised as to whether or not an organization who advertises on social networking systems experiences an increase in sales as a result. It is unclear whether or not these advertisements actually deter individuals from further using these types of social networking systems. If individuals who spend a large amount of time on social networking sites are deterred from further usage due to these advertisements, are there any benefits to them? Significant amount information can be relayed on Facebook, MySpace and Twitter, but the question remains whether or not organizations are using this to their advantage. The present study used a sample of working professionals that were knowledgeable in the various options of social networking to test these assumptions. The three hypotheses dealt with the interplay of online social networking, advertising effectiveness, gender and age trends, and remaining the interplay with positive comments of the use of the ‘like' function and its impacts on consumer behavior, as derived from the review of relevant operations literature and from applying the basic tenants of Uses and Gratification Theory. All three specific research hypotheses were accepted in the null form.
APA, Harvard, Vancouver, ISO, and other styles
6

Villi, Mikko, and Janne Matikainen. "Participation in Social Media: Studying Explicit and Implicit Forms of Participation in Communicative Social Networks." Media and Communication 4, no. 4 (October 10, 2016): 109–17. http://dx.doi.org/10.17645/mac.v4i4.578.

Full text
Abstract:
The diverse forms of participation in social media raise many methodological and ethical issues that should be acknowledged in research. In this paper, participation in social media is studied by utilising the framework of explicit and implicit participation. The focus is on the communicative and communal aspects of social media. The aim of the paper is to promote the reconsideration of what constitutes participation when online users create connections rather than content. The underlying argument is that research on social media and the development of methods should concentrate more on implicit forms of participation.
APA, Harvard, Vancouver, ISO, and other styles
7

Elovici, Yuval, Michael Fire, Amir Herzberg, and Haya Shulman. "Ethical Considerations when Employing Fake Identities in Online Social Networks for Research." Science and Engineering Ethics 20, no. 4 (November 12, 2013): 1027–43. http://dx.doi.org/10.1007/s11948-013-9473-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Regan, Á., M. Henchion, and B. McIntyre. "Ethical, moral and social dimensions in farm production practices: a segmentation study to assess Irish consumers’ perceptions of meat quality." Irish Journal of Agricultural and Food Research 57, no. 1 (March 9, 2018): 9–14. http://dx.doi.org/10.1515/ijafr-2018-0002.

Full text
Abstract:
AbstractGrowing consumer concerns with modern farming and food production systems indicate a significant market opportunity for meat production practices that consider ethical, moral and social value traits. In the current study, we aimed to identify and characterise distinct segments of Irish consumers based on their perceptions of the quality of meat from different farm-level production practices (organic farming, high animal welfare standards, free range farming, and “natural”, treatment-free feeding regimes). An online survey was carried out with 251 Irish meat consumers. Using cluster analysis, we identified three distinct segments: “Target consumers”, “Purist consumers” and “Disinterested consumers”. Chi-square analyses revealed differences between the segments based on gender, age and meat-purchasing motivations. The results provide insight into the opportunities that exist for exploring new viable market segments as well as for engaging Irish consumers and empowering them with information around the ethical, social and moral aspects of farm-level practices related to meat production.
APA, Harvard, Vancouver, ISO, and other styles
9

El Kheir, Dalia Yahia M., Sara S. Alnufaili, Raghad M. Alsaffar, Majd A. Assad, and Zahra Z. Alkhalifah. "Physicians’ Perspective of Telemedicine Regulating Guidelines and Ethical Aspects: A Saudi Experience." International Journal of Telemedicine and Applications 2022 (October 12, 2022): 1–11. http://dx.doi.org/10.1155/2022/5068998.

Full text
Abstract:
Background and Objective. The rapid emergence and evolution of digital technology have greatly improved the quality and accessibility of healthcare services worldwide. Nonetheless, the literature is scarce regarding the ethical and legal aspects of telemedicine and social media (SM) use in healthcare. Thus, this paper examines physicians’ perceptions about the use of telemedicine in patient care, their awareness of guidelines for health-related use of telemedicine, and their knowledge, attitude, and practice of the ethical and legal regulations governing the use of telemedicine in the healthcare context. Methods. This was an observational cross-sectional study conducted among physicians working at the College of Medicine, Imam Abdulrahman Bin Faisal University (IAU), and its affiliated academic tertiary hospital, King Fahad Hospital of the University (KFHU), Eastern province-KSA. Data were collected between August 2019 and March 2020 via a structured, pretested, self-administered questionnaire distributed to 220 eligible physicians at KFHU. A final sample of 101 physicians completed our survey. Collected data was coded and analysed using SPSS, and the results presented as frequencies, percentages, and summary statistics. Results. Among our respondents, 62 (61.4%) were males, 46 (45.5%) were in the age group of 35 to 44 years, and 62 (61.3%) were Saudi. Two-thirds of physicians (58 (57.4%)) use smart devices in healthcare delivery, and 51 (50.5%) are satisfied with this use. A minority (21 (20.8%)) knew about telemedicine guidelines, 8 (7.9%) had encountered legal issues related to telemedicine use, and 52 (51.5%) were doubtful about patients’ readiness for virtual care. Regarding physicians’ awareness of the ethical aspects regulating the use of social media and medical apps in patient care, only 44 (45.3%) were aware of the proper reporting system if they found accounts sharing unreliable information. Nevertheless, the majority (91 (92.9%)) agreed it is essential for healthcare providers to report such accounts. Concerning physicians’ awareness of the rules and regulations of online self-promotion, the majority of our respondents were unsure or unaware of such regulations (46 (45.6%) and 18 (17.8%)), respectively. Nonetheless, 67 (66.3%) of the physicians would not pay SM influencers to advertise for them. Conclusion. Two-thirds of our physicians use smart devices in healthcare delivery, with 1 in 13 having encountered related legal issues. Nonetheless, only a minority was aware of telemedicine use regulating guidelines, including physicians’ online self-promotion regulations. These results highlight the necessity of targeted physicians’ training on telemedicine use related guidelines, thereby ensuring the safety of both patients and healthcare professionals and the optimum utilization of online health-related interactions.
APA, Harvard, Vancouver, ISO, and other styles
10

Gauthier, Robert P., and James R. Wallace. "The Computational Thematic Analysis Toolkit." Proceedings of the ACM on Human-Computer Interaction 6, GROUP (January 14, 2022): 1–15. http://dx.doi.org/10.1145/3492844.

Full text
Abstract:
As online communities have grown, Computational Social Science has rapidly developed new techniques to study them. However, these techniques require researchers to become experts in a wide variety of tools in addition to qualitative and computational research methods. Studying online communities also requires researchers to constantly navigate highly contextual ethical and transparency considerations when engaging with data, such as respecting their members' privacy when discussing sensitive or stigmatized topics. To overcome these challenges, we developed the Computational Thematic Analysis Toolkit, a modular software package that supports analysis of online communities by combining aspects of reflexive thematic analysis with computational techniques. Our toolkit demonstrates how common analysis tasks like data collection, cleaning and filtering, modelling and sampling, and coding can be implemented within a single visual interface, and how that interface can encourage researchers to manage ethical and transparency considerations throughout their research process.
APA, Harvard, Vancouver, ISO, and other styles
11

Jannah, Raudatul, and H. K. Marjo. "Etika Profesi Konselor dalam Layanan Bimbingan Konseling Virtual." Jurnal Paedagogy 9, no. 1 (January 7, 2022): 55. http://dx.doi.org/10.33394/jp.v9i1.4556.

Full text
Abstract:
The purpose of this study was to describe the professional ethics of counselors in virtual counseling guidance services. The method used in this research is a literature study with a qualitative descriptive approach. The data sources come from document studies in the form of books and previous research from various references. Furthermore, the data analysis technique used is descriptive analysis. The results of this study indicate that online counseling takes the form of virtual counseling technology, namely, websites, telephone or cell phones, email, video conferencing, chat, instant messaging, computers, and other social networks. The ethical aspects that must be obeyed by online counselors are building good relationships on the Internet, confidentiality when conducting consultations, legal aspects of telecommunications via the Internet, and licensing. Therefore, online counselors need to be professional in conducting virtual counseling by considering ethics.
APA, Harvard, Vancouver, ISO, and other styles
12

Shilton, Katie, Donal Heidenblad, Adam Porter, Susan Winter, and Mary Kendig. "Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation." Science and Engineering Ethics 26, no. 6 (July 1, 2020): 2911–26. http://dx.doi.org/10.1007/s11948-020-00250-0.

Full text
Abstract:
AbstractThere is growing consensus that teaching computer ethics is important, but there is little consensus on how to do so. One unmet challenge is increasing the capacity of computing students to make decisions about the ethical challenges embedded in their technical work. This paper reports on the design, testing, and evaluation of an educational simulation to meet this challenge. The privacy by design simulation enables more relevant and effective computer ethics education by letting students experience and make decisions about common ethical challenges encountered in real-world work environments. This paper describes the process of incorporating empirical observations of ethical questions in computing into an online simulation and an in-person board game. We employed the Values at Play framework to transform empirical observations of design into a playable educational experience. First, we conducted qualitative research to discover when and how values levers—practices that encourage values discussions during technology development—occur during the design of new mobile applications. We then translated these findings into gameplay elements, including the goals, roles, and elements of surprise incorporated into a simulation. We ran the online simulation in five undergraduate computer and information science classes. Based on this experience, we created a more accessible board game, which we tested in two undergraduate classes and two professional workshops. We evaluated the effectiveness of both the online simulation and the board game using two methods: a pre/post-test of moral sensitivity based on the Defining Issues Test, and a questionnaire evaluating student experience. We found that converting real-world ethical challenges into a playable simulation increased student’s reported interest in ethical issues in technology, and that students identified the role-playing activity as relevant to their technical coursework. This demonstrates that roleplaying can emphasize ethical decision-making as a relevant component of technical work.
APA, Harvard, Vancouver, ISO, and other styles
13

Jones, Rhys Bevan, Julia Thomas, Jamie Lewis, Simon Read, and Ian Jones. "Translation: From Bench to Brain – Using the visual arts and metaphors to engage and educate." Research for All 1, no. 2 (July 15, 2017): 265–83. http://dx.doi.org/10.18546/rfa.01.2.04.

Full text
Abstract:
This article examines multidisciplinary public engagement projects that bring together developments in psychiatric research and practice with visual art and its use of metaphor. The article focuses on the art exhibition Translation: From Bench to Brain , which was the basis for further collaborations, illustrating how the learning from the original event influenced subsequent projects. Combining art exhibitions with online documentation and resources, the projects explored not only medical and scientific themes, but also the wider social, cultural and ethical ramifications, specifically aspects of identity, risk and stigma. The activities demonstrate the value of a developmental approach to public engagement as a process, whereby projects build on previous activities and evolving multidisciplinary perspectives, networks and expertise.
APA, Harvard, Vancouver, ISO, and other styles
14

Kopczewski, Marian, and Agnieszka Napieralska. "Cyber space – risks to children and young people - research results." Scientific Journal of the Military University of Land Forces 189, no. 4 (October 1, 2018): 46–59. http://dx.doi.org/10.5604/01.3001.0013.0720.

Full text
Abstract:
The 21<sup>st</sup> century is undoubtedly a period of enormous progress in the field of digital technology, a period in which the boundary between the real world and the virtual world becomes less and less visible. The Internet has undeniably become a facilitation of everyday life, since it is a tool of work, communication or a way to spend free time for many users. The virtual world is present in almost all areas of our lives, and people spend more and more time in front of the computer screens, operating websites, e-mails or social networks. Highly developed digital technology is a boon of the 21st century, but despite its numerous advantages, negative aspects are also visible. Virtual knowledge displaces physical interpersonal contacts; physical activity is replaced by spending free time in front of a computer monitor. Various threats (social, psychological, psychological, ethical and moral) resulting from modern digital technologies and the increasing degree of dependence on them are extremely significant. The authors of this article present the results of own research, aiming at making the reader aware that there are both positive and negative aspects of the virtual world.
APA, Harvard, Vancouver, ISO, and other styles
15

Buoncompagni, Giacomo. "Techno-altruism. From cultural conflict to constructive and supportive use of online environments." Geopolitical, Social Security and Freedom Journal 4, no. 2 (December 1, 2021): 16–32. http://dx.doi.org/10.2478/gssfj-2021-0009.

Full text
Abstract:
Abstract Even before the Covid-19 pandemic crisis, the massive use of the digital in everyday life, in the absence of intercultural - media skills, seemed to have fuelled violence, misinformation, ethnocentrisms, prejudices towards the Other (Urry 2000; Appadurai 2005; Couldry 2015; Ziccardi 2016; Europol 2016; SWG 2017, Vox 2018). However, social and digital technology can also be re-thought as a civic and moral space (Silverstone, 2009) able to overcome conflict and polarisation, as a strategic medium to improve social policies and the management of migration flows, actively involving host institutions and communities (Buoncompagni, D’Ambrosi 2020). The panorama of humanitarian aid, in particular, i.e. that typology of interventions aimed at helping populations affected by war events or natural disasters, is completely changing in the way of operating within the world of international migration precisely thanks to the digital infrastructure (IOM 2018). Apps, virtual itinerant maps and self-narratives via social networks, sharing GPS coordinates of the safest routes among migrants, increasing numbers of socially engaged indigenous citizens enrolled in online platforms, are just a few examples of how digital media are acquiring a fundamental role within the migration network in hospitality and aid actions (Brunwasser 2015; Buoncompagni 2021. Only by developing the art of solidarity and the ability to communicate and cooperate globally, opening up to the Other, can the “different” relate effectively and productively in digital society (Chen 2005; Bennet 2015). Pitirim A. Sorokin himself, a still prominent figure of 20th century sociology, stated that historical and techno-cultural changes have not always produced positive results within societies, but at times also negative (or more precisely ‘destructive’) ones: individualism, antagonism, excess of technology and rationality, and in particular the fall of the bonds of solidarity towards the different and the loss of the feeling of belonging (Cimagalli 2010; Marletti 2018; Perrotta 2016). But the sociologist also stressed how altruism could be one of the indispensable ingredients of social life. No society can exist without an “altruistic and creative love” that has as its aim the “altruisation” of individuals and social institutions: a complex process/project capable of encompassing the emotional, supra-rational and spiritual aspects of human relationships (including online), starting from the idea that all men can recognise themselves in certain moral principles, eternal and universal (Mangone, 2020). And such a condition could be re-created/supported also through digital tools and exist in online environments, thus trying to extend, on a theoretical level, Sorokin’s attempt to make sociology (also digital, in this case) a “science of altruism” in the post-pandemic era of global interconnectedness.
APA, Harvard, Vancouver, ISO, and other styles
16

Schultze, Ulrike, and Richard O. Mason. "Studying Cyborgs: Re-Examining Internet Studies as Human Subjects Research." Journal of Information Technology 27, no. 4 (December 2012): 301–12. http://dx.doi.org/10.1057/jit.2012.30.

Full text
Abstract:
Virtual communities and social networks assume and consume more aspects of people's lives. In these evolving social spaces, the boundaries between actual and virtual reality, between living individuals and their virtual bodies, and between private and public domains are becoming ever more blurred. As a result, users and their presentations of self, as expressed through virtual bodies, are increasingly entangled. Consequently, more and more Internet users are cyborgs. For this reason, the ethical guidelines necessary for Internet research need to be revisited. We contend that the IS community has paid insufficient attention to the ethics of Internet research. To this end, we develop an understanding of issues related to online human subjects research by distinguishing between a disembodied and an entangled view of the Internet. We outline a framework to guide investigators and research ethics committees in answering a key question in the age of cyborgism: When does a proposed Internet study deal with human subjects as opposed to digital material?
APA, Harvard, Vancouver, ISO, and other styles
17

Minyar-Beloroucheva, Alla P., Polina I. Sergienko, Olga D. Vishnyakova, Elizaveta A. Vishnyakova, and Oksana G. Anossova. "Axiological approach to developing spirituality and morality in the process of L2 PR education." SHS Web of Conferences 103 (2021): 01024. http://dx.doi.org/10.1051/shsconf/202110301024.

Full text
Abstract:
The article is devoted to the analysis of fundamental aspects of spiritual and ethical education as well as to the development of cultural and moral values, pertaining to global citizens and proponents of sustainable development in the system of undergraduate PR education. The authors view the issues dealing with fostering the feelings of duty, breeding responsibility before other people and the environment, respect for human rights and freedoms as well love and deference for one’s family, the country and the whole world in the process of L2 PR studies. An individual trajectory chosen for L2 PR undergraduates’ needs and capabilities focuses on their intellectual as well as cultural development, thereby serving the purpose of enhancing their individual qualities. The spiritual image and values of L2 PR undergraduates are influenced by all the global problems of our time, including understanding life as the greatest value, preserving the world, the environment, and the entire cultural heritage. Spirituality implies a certain state of human self-awareness to make the one find new expressions in thoughts, in language and actions. This is the foundation for building a healthy and strong society and nations. Online extracurricular activities allow the educators to form not only the basic social, moral and cultural values that guide society, but also contribute to the personal growth of young people, their formation as individuals, the realization of all their potentials and abilities.
APA, Harvard, Vancouver, ISO, and other styles
18

García, Sandra Fernández, and Francisco Sánchez Valle. "‘Informal Infrastructure’ of Prototyping: Practicing Organisation by Performing Materiality." Somatechnics 12, no. 3 (December 2022): 162–84. http://dx.doi.org/10.3366/soma.2022.0386.

Full text
Abstract:
In recent years, sheltered by the so-called ‘ontological turn’ in the social sciences, organisational analysis has paid special attention to artefacts. Nevertheless, there is still a dominant account grounded in a dichotomist view of the subject-object relationship either in teleological (mind-body) or in hylomorfic (form-matter) terms when analysing organising practices. On the contrary, our argument is based on non-dualistic approaches in an attempt to foreground relational aspects of practices. From a practice-based approach, the article addresses the role of three ‘prototypes’ aimed at the management of the ‘air’ by citizenship, in the re-configuration of bodies, technics and ethical-political engagement. Specifically, it focuses on the normative dimensions of organising by which knowledges, materials and values converge in the open-ended process of prototyping. The argument is deployed by relying on qualitative research based on multi-sited ethnographic fieldwork, developed both at different workshops and by online ethnography. The main aim of the article is to show how bodies and artefacts are mutually in/trans/formed when negotiating the social implications for the ontological category of ‘air’. In doing so, the concept of ‘informal infrastructure’ is proposed to account for those practices (which appear somewhat contingent, mundane or, at best, taken for granted) by which agents do not only commit to a particular ethical implication embedded in the category of ‘air’, as a symbolic result, but also to distinctive ways of practicing organisation as a political process of performing materiality. To this end, adopting the analytical concept of ‘informal infrastructure’ allows to simultaneously consider both the formal and informal aspects that emerge in these collaboration-driven practices, as well as to address their effects on the maintenance within and expansion into other networks.
APA, Harvard, Vancouver, ISO, and other styles
19

Chekletsov, V. V. "Dialogs of a hybrid world." Philosophical Problems of Information Technologies and Cyberspace, no. 1 (July 14, 2021): 99–116. http://dx.doi.org/10.17726/philit.2021.1.6.

Full text
Abstract:
The article is based on reports and discussions held during three online events organized by the Russian Research Center for the Internet of Things together with the Department of Philosophy and Sociology of South-West State University during 2021: an open discussion with the famous transhumanist philosopher David Pearce dedicated to the birthday of Jeremiah Bentham on February 15, a round table dedicated to the World Internet of Things Day on April 9, and a session within the first IoT Hot Spots conference on June 16.The main topics for discussion this year were the consideration of the following philosophical and socio-cultural problems and concepts in the light of the development of cyberphysical systems: anthropological differences between the «posthuman» and «metahuman» projects, epistemological aspects of bio- and cybersemiotics in modern hybrid techno-social networks, the cultural dimension of remote proximity in the digital age, the ontology of the quantum complexity of the digital multiverse, the ethical dimensions of the digital economy in the post-covid period, the aesthetics of metamodernism in the smart city, the anthropocene effects of silicon addiction and the race of computing, socio-philosophical problems of management in situations of high uncertainty, political strategies for sustainable development.
APA, Harvard, Vancouver, ISO, and other styles
20

Åhs, Fredrik, Peter Mozelius, and Majen Espvall. "Preparing Psychologists and Social Workers for the Daily Use of AI." European Conference on the Impact of Artificial Intelligence and Robotics 4, no. 1 (November 17, 2022): 1–5. http://dx.doi.org/10.34190/eciair.4.1.771.

Full text
Abstract:
A daily use of Artificial Intelligence (AI) is becoming a fact in many fields today, and two of them are psychology and social work. At the same time as AI systems are used for predicting psychological treatments and for decisions in social welfare, higher education has few AI courses for these professions. Moreover, there are several examples in these fields where AI can make unethical decisions that need to be corrected by humans. To better understand the possibilities and challenges of AI in psychology and social work, professional users of AI services need a tailored education on how the underlying technology works. The aim of this paper is to present a project concept for the design and evaluation of a novel course in AI for professional development in psychology and social work. For the design and development of the course the guiding research question should be: What are the strengths and challenges with contemporary AI techniques regarding prediction, adaptivity and decision systems? The suggested AI course should be given as a technology enhanced online training to enable the idea of anytime and anywhere for full-time working participants. Course content and activities are divided into the four separate sections of: 1) The history of AI structured around the 'Three waves of AI', with o focus on the current third wave. 2) A section with a focus on AI techniques for prediction and adaptivity. Underlying techniques such as machine learning, neural networks, and deep learning will be conceptually described and discussed, but not on a detailed level. 3) An elaborated discussion on the relevance, usefulness and trust, and the at the difference between AI-based decision systems and AI-based decision support systems. 4) Finally, the fourth section should comprise the ethical aspects of AI, and discuss transparency and Explainable AI. An innovative approach of the project is to use a neuroscientific assessment of the education to understand how the education changes brain function relevant to evaluate AI based decision. This should be complemented with a qualitative evaluation based on semi-structured interviews.
APA, Harvard, Vancouver, ISO, and other styles
21

Черкашин, Александр Константинович. "MATHEMATICAL EXPLANATION OF SUSTAINABLE POLITICAL DEVELOPMENT OF THE SOCIETY." Информационные и математические технологии в науке и управлении, no. 2(22) (June 25, 2021): 5–20. http://dx.doi.org/10.38028/esi.2021.22.2.001.

Full text
Abstract:
Обсуждается возможность математического объяснения современных социально-политических событий в Российской Федерации и за рубежом, что проявляют скрытые закономерности расслоения и изоляции общества на всех уровнях его организации. Формируются новые модели дистанционного взаимодействия - коммуникации разных социальных слоев, объединение их в комплексы сетей информационно-функциональных связей. Эти закономерности сквозным образом в разных масштабах описываются метатеоретическими моделями и методами расслоения с использованием универсальных математических уравнений, аксиоматической теории деятельности и устойчивого развития, раскрывающими этические, правовые и политические аспекты сосуществования. Содержательная интерпретация формального подхода основывается на идеях трансцендентальной аргументации И.Канта - автора морально-нравственного категорического императива, концепции правового государства и политической философии. Формулируется безусловная идея устойчивого мироустройства, которая берется за основу всякого общественного закона как выражения идеала, прообраза будущего, что становится основанием для предсказания прогрессивных форм политической деятельности. The opportunity of a mathematical explanation of modern socio-political events in the Russian Federation and abroad is discussed. It reveals hidden patterns of stratification and isolation of society at all levels of its organization. New models of remote interaction are being formed: communication of different social strata, combining them into complexes of networks of information and functional connections. These laws are described in a through manner at different scales by meta-theoretical models and bundle methods using universal mathematical equations, axiomatic theory of activity and sustainable development, which combines the ethical, legal and political aspects of coexistence. The content interpretation of the formal approach is based on the ideas of the transcendental argumentation of I. Kant as the author of moral categorical imperative and the concept of the rule of law and political philosophy. An unconditional idea of a stable world order is formed, which is taken as social law expressing an ideal prototype of the future and the basis for predicting progressive forms of political activity.
APA, Harvard, Vancouver, ISO, and other styles
22

Rasheed, Rukhsana, Mazhar Nadeem Ishaq, and Hafeez ur Rehman. "Artificial Intelligence in Corporate Business and Financial Management: A Performance Analysis from Pakistan." Review of Applied Management and Social Sciences 4, no. 4 (December 31, 2021): 933–46. http://dx.doi.org/10.47067/ramss.v4i4.200.

Full text
Abstract:
This paper attempts to explore many signs of progress enabled by Artificial Intelligence (AI) in financial and corporate business management. It also amid to identify the benefits and cons of AI applications in social life. A systematic content analysis approach has been used to demonstrate the developmental phases of AI. Four distinct organizational maturity clusters i.e. Pioneers, Investigators, Experimenters, and Passives have been developed on basis of dataset. Data collections was carried through emails, customizable chatbots, live chat softwares and automated helpers of top ten online companies and various banking and financial institutions located in Lahore and Karachi cities for making behavioral analysis. The data results revealed that all aspects of financial managements and corporate business activities have been highly influenced by the application of AI. The study demonstrated that 80% senior business executives were of view that AI boost productivity and creates new business avenues. The results also demonstrated that 88% Pioneer organizations have understand and adopted AI techniques according to organization requirements, 82% Investigator organizations are not using it beyond the pilot stage whereas 24% Experimental organizations were adopting AI without understanding it. These results seem to reflect that AI has profound effects on financial industry to streamline its credit decisions from quantitative trading to financial risk management and fraud detection. This study also discovered that the widespread use of AI have raised a number of ethical, moral and legal challenges that are yet to be addressed. Although AI is gaining popularity day by day and it is believed that AI will improve work performance beyond human standards but it could not replace human resources fully.
APA, Harvard, Vancouver, ISO, and other styles
23

Rasheed, Rukhsana, Mazhar Nadeem Ishaq, and Hafeez ur Rehman. "Artificial Intelligence in Corporate Business and Financial Management: A Performance Analysis from Pakistan." Review of Education, Administration & LAW 4, no. 4 (December 31, 2021): 847–60. http://dx.doi.org/10.47067/real.v4i4.205.

Full text
Abstract:
This paper attempts to explore many signs of progress enabled by Artificial Intelligence (AI) in financial and corporate business management. It also amid to identify the benefits and cons of AI applications in social life. A systematic content analysis approach has been used to demonstrate the developmental phases of AI. Four distinct organizational maturity clusters i.e. Pioneers, Investigators, Experimenters, and Passives have been developed on basis of dataset. Data collections was carried through emails, customizable chatbots, live chat softwares and automated helpers of top ten online companies and various banking and financial institutions located in Lahore and Karachi cities for making behavioral analysis. The data results revealed that all aspects of financial managements and corporate business activities have been highly influenced by the application of AI. The study demonstrated that 80% senior business executives were of view that AI boost productivity and creates new business avenues. The results also demonstrated that 88% Pioneer organizations have understand and adopted AI techniques according to organization requirements, 82% Investigator organizations are not using it beyond the pilot stage whereas 24% Experimental organizations were adopting AI without understanding it. These results seem to reflect that AI has profound effects on financial industry to streamline its credit decisions from quantitative trading to financial risk management and fraud detection. This study also discovered that the widespread use of AI have raised a number of ethical, moral and legal challenges that are yet to be addressed. Although AI is gaining popularity day by day and it is believed that AI will improve work performance beyond human standards but it could not replace human resources fully.
APA, Harvard, Vancouver, ISO, and other styles
24

SHARKOV, FELIX, ELENA NAZAROVA, and ARTYOM ZHUKOV. "DIGITAL LITERACY AND NETWORK COMMUNICATIONS: A SOCIOLOGICAL DIMENSION." Communicology 8, no. 3 (September 2020): 52–62. http://dx.doi.org/10.21453/2311-3065-2020-8-3-52-62.

Full text
Abstract:
Based on the concept of digital turn in sociology proposed by Professor S.Kravchenko, the authors use the example of specific sociological studies of Russian research centers to conduct a correlation analysis between the digital literacy of the population and its activity in social network communications. Network communications of the population in digital format displace analog formats and contribute to active digital transformations in society as a whole. Digital literacy is considered as an integral indicator that includes information, technical, communication and innovation components. In addition to age and gender differentiation, the level of digital literacy is also influenced by settlement and territorial factors, confirming the existence of an urgent problem of digital inequality. The situation with the ethical side of information literacy is also not clear. This indicator shows how deeply a person reflects on the information found and used. The mass transition to digital technologies observed and actively implemented in the last few years, including their application in network communications, increases not only the innovative, spatial and technological, but also the cognitive distance between generations, not only within the framework of family and interpersonal communications, but also on the scale of industrial, industry and institutional interactions. In today’s digital world, the structural elements of social networks include platforms, online services, or websites designed to build, reflect, and organize people’s social connections. It is the presence of an almost limitless number of information exchanges in social networks that forms a certain system of cybernetic power (cyber power). Cyber power is a complex system of resources structured around the production, exchange, and control of digital information. The cyber power is gradually transformed into a powerful hegemony, i.e., the power of the Internet. a superpower that is not limited to controlling purely cybernetic resources that include structural levels of cyberspace. Not only the communication system is changing, but also the way of thinking, which is becoming an actual subject of research not only for sociologists and psychologists, but also for representatives of many related scientific fields. The concept of a digital turn in sociology, which assumes a humanistic basis for the ongoing transformations, could become a methodological basis for a comprehensive study of the social aspects and consequences of digitalization of modern society.
APA, Harvard, Vancouver, ISO, and other styles
25

Mendoza Navarrete, Martha Lorena, Yenny Alexandra Zambrano Villegas, Lilia del Rocio Bermudez Cevallos, and Yanina Alexandra Viteri Alcivar. "New technologies and new paradigms: the new technological societies approach." Universidad Ciencia y Tecnología 25, no. 110 (August 26, 2021): 155–63. http://dx.doi.org/10.47460/uct.v25i110.487.

Full text
Abstract:
New technologies represent novelty depending on the era in which they are viewed, but in all cases they represent social evolution in some way. At present, new technologies are associated with the use of computer tools that strengthen processes, mechanisms, and undoubtedly, social communication. This paper evaluates new technologies focused on social transformations, their impact on human behavior and the social repercussions they may bring with their prevalence over time. Several academic documents of a scientific and technical nature are evaluated, with a view to defining the paradigms of technologies in their evolutionary process through societies. The most outstanding results show that the modern world is subject to a significant impact of information technology, that it encompasses not only educational aspects but also family, personal and economic aspects, and that the implications of traditional substitution by technology may be detrimental to mankind. Keywords: Technological implications, new societies, technological impact. References [1]C. Renfrew y P. Bahn, Arqueología: Teoría, métodos y práctica., Madrid: Akal, 1993. [2]Y. Laniuk, «Freedom in the Society of Control: Ethical challenges,» Ethics and Bioethics, vol. 10, nº 34, pp. 203-220, 2021. [3]J. Chaves, «Desarrollo tecnológico en la Primera Revolución Industrial,» Universidad de Extremadura, Servicio de Publicaciones, Extremadura, 2004. [4]A. Bessarab, O. Mitchuk, A. Baranetska, N. Kodatska, O. Kvasnytsia y G. Mykytiv, «Social networks as a phenomenon of the information society,» Journal of Optimization in Industrial Engineering, vol. 14, nº 1, pp. 35-42, 2021. [5]E. Popkova, A. Bogoviz y B. Sergi, «Towards digital society management and ‘capitalism 4.0’ in contemporary Russia,» Humanities and Social Sciences Communications, vol. 8, nº 1, p. 77, 2021. [6]A. Núñez, «Riesgo e Incertidumbre en las Sociedades Tecnológicas complejas.,» Cuaderno del ateneo, pp. 44-57, 2007. [7]wikipedia, «Accidente del transbordador espacial Challenger,» 1989. [Online]. Available: https://es.wikipedia.org/wiki/Accidente_del_transbordador_espacial_Challenger. [Last access: 2021]. [8]J. Martínez, «La innovación tecnológica en las sociedades cooperativas y otras organizaciones de participación,» Rev.Est. Coop., vol. 48, 2001. [9]J. Echeverría, «Ética y sociedades tecnológicas,» Isegoría, vol. 41, pp. 217-229, 2009. [10]R. Pardo, «La cultura científico-tecnológica de las sociedades de la modernidad tardía,» Comunicar ciencia, vol. 51, pp. 35-86, 2001. [11]A. Zatls, «Metales, ambiente y las sociedades tecnológicas: ¿hacia dónde nos dirigimos?,» Química viva, vol. 10, nº 2, pp. 1-20, 2011.
APA, Harvard, Vancouver, ISO, and other styles
26

Gramatiuk, Svetlana Mykolaivna, Irina Yuriivna Bagmut, Michael Ivanivich Sheremet, Karine Sargsyan, Alla Mironovna Yushko, Serhii Mykolaevich Filipchenko, Vitaliy Vasilyevich Maksymyuk, Volodimir Volodimirovich Tarabanchuk, Petro Vasilyevich Moroz, and Andriy Ivanovich Popovich. "Pediatric biobanks and parents of disabled children associations opinions on establishing children repositories in developing countries." Journal of Medicine and Life 14, no. 1 (January 2021): 50–55. http://dx.doi.org/10.25122/jml-2020-0106.

Full text
Abstract:
Pediatric biobanks are an indispensable resource for the research needed to bring advances in personalized medicine into pediatric medical care. It is unclear how or when these advances in medical care may reach children, but it is unlikely that research in adults will be adequate. We conducted the screening for a hypothetic problem in various European and American pediatric biobanks based on online surveys through e-mail distribution based on the Biobank Economic Modeling Tool (BEMT) questionnaire model. Participants in the survey had work experience in biobanking for at least 3 years or more. Contact information about the survey participants was confirmed on the social networks profiles (LinkedIn), as well as on generally available websites. First, we tried creating a model which can show the pediatric preclinical and basic clinical phase relationship and demonstrate how pediatric biobanking is linked to this process. Furthermore, we tried to look for new trends, and the final goal is to put the acquired knowledge into practice, so medical experts and patients could gain usable benefit from it. We concluded that leading positions must take into account ethical and legal aspects when considering the decision to include children in the biobank collection. However, communication with parents and children is essential. The biobank characteristics influence the biobank's motives to include children in the consent procedure. Moreover, the motives to include children influence how the children are involved in the consent procedure and the extent to which children are able to make voluntary decisions as part of the consent procedure.
APA, Harvard, Vancouver, ISO, and other styles
27

Farzin, Milad, and Majid Fattahi. "eWOM through social networking sites and impact on purchase intention and brand image in Iran." Journal of Advances in Management Research 15, no. 2 (May 14, 2018): 161–83. http://dx.doi.org/10.1108/jamr-05-2017-0062.

Full text
Abstract:
PurposeThe purpose of this paper is to build a conceptual framework which provides both practical and theoretical insights into drivers of consumer use of social network sites (SNSs) as an electronic word-of-mouth (eWOM) tool and its impact on brand image (BI) and purchase intention (PI).Design/methodology/approachFor assessment of the research constructs, the measures proposed in the social psychology and marketing literature were adapted. These scales were examined for the face validity by the authors’ academic colleagues. Using the survey data collected from the students of the Islamic Azad University, these scales were further examined in terms of convergent and discriminant validity as well as reliability. Structural equation modelling technique was used to test the effect of eWOM antecedents on consumer eWOM intention and the eWOM impact on BI and consumer PI.FindingsThe results confirmed significance of the constructs consumer trust, informational influence, sense of belonging, altruism, moral obligation, and knowledge self-efficacy for consumer engagement in eWOM. The results further indicated that eWOM, in turn, played a significant role in shaping BI in the mind of consumers and their PI.Research limitations/implicationsObviously, university students do not exactly represent the whole population of SNSs members. The eWOM intention can be investigated across generations in terms of intergenerational differences. The authors admit that in addition to the constructs used in this study there are other equally important constructs that can be adapted from relevant fields (e.g. psychology) as the eWOM antecedents. As for eWOM consequences, different aspects of brand equity could be additionally explored and investigated.Practical implicationsThe results of this study would help marketing department of companies and advertising agencies make advertisements in accordance with consumer characteristics. The results would also benefit providers of online platforms by giving them insight into behaviour of their members. Finally, the finding that eWOM intention is likely to create PI among consumers is of particular interest to producers of goods.Originality/valueGiven its bidimensional perspective to eWOM behaviour (i.e. considering both antecedents and consequences of eWOM), this study provides valuable insights into the phenomenon eWOM in the context of social networks as well as a basis for further research in this field.
APA, Harvard, Vancouver, ISO, and other styles
28

Konyaeva, Yulia M., Natalia A. Prokofeva, and Ekaterina A. Shcheglova. "Speech Etiquette in Network Communication: Semantics and Pragmatics of Users’ Nominations." Vestnik Tomskogo gosudarstvennogo universiteta, no. 458 (2020): 32–40. http://dx.doi.org/10.17223/15617793/458/4.

Full text
Abstract:
The article is devoted to the research of one of the most relevant aspects of etiquette in network communication–nominations participants of communication use to refer to each other. Based on a broad understanding of speech etiquette in social networks–as a means of harmonization of speech activity in various communication situations, the authors consider users’ nominations in social networks as markers of constructive or destructive verbal behavior in online communities. The research is based on linguistic and stylistic analysis, which allows: (1) describing the linguistic characteristics of nominations as lexical units in terms of word formation, grammar, and semantics; (2) revealing the peculiarities of the pragmatics of using the nominations in network communication taking into account the linguistic parameters of these nominations; (3) characterizing their stylistic properties that correlate with the goals of communication (common interests, problem solving, tips, causticity) and the selected manner of verbal behavior (solidarity, outrageous behavior, verbal aggression). To guarantee representativeness, the authors took the material for the research from resources created for groups with different principles of formation: gender (“Strana mam”), age (“4chan”) and territorial ones (“Yubileyniy Kvartal i Shuvalovsky”). The analysis shows that the users’ nominations in online communities demonstrate the participants’ solidarity within the relatively closed we-communities as the dominant setting of communication. Within each community, there is a focus on live communication, which activates the use of the phatic speech genres of everyday communication: appeal (generalized or personal), request, advice, comment, call, offer, insult, and so on. The variety of nominations from the point of view of the addressee (generalizing and personal), as well as in terms of communicative orientation (contactestablishing and contact-destroying), is determined by the set of situations of communication, frequent in different communities, and by communicants’ value orientations. In “Strana mam”, a women’s forum focused on the preservation of family values, solidarity is manifested in the desire for a more intimate communication; this activates the use of diminutives, language play, and vocabulary with a positive connotation. In the territorial “Yubileyniy Kvartal i Shuvalovsky” group, the value of community is cultivated, and solidarity is manifested in the imitation of respectful, often close to business, communication, which entails frequent generalizing nominations with a positive attributive component and the use of interlocutors’ full names as personal nominations. In the teenage “4chan” community, solidarity is manifested in the intentional outrageous communication (by using nominations with obscene words), which demonstrates an open violation of family, moral, spiritual, and other values.
APA, Harvard, Vancouver, ISO, and other styles
29

Tekelioglu, Ahmet Selim. "The Practice of Islam in America: An Introduction." American Journal of Islamic Social Sciences 35, no. 3 (July 1, 2018): 108–11. http://dx.doi.org/10.35632/ajiss.v35i3.491.

Full text
Abstract:
Since September 11, American Muslim identities, political views, sensi- bilities, and even private lives have been studied by academics, pollsters, government agencies, and think tank researchers. This renewed interest on the nexus of religious and national identity has produced a vast volume of publications, cross-cutting each social science discipline and thematic re- search area. Some are even available online, such as #islamophobiaisracism syllabus, #BlackIslamSyllabus and ISPU’s Muslim American Experience Bibliography page. What is often lost in this conversation, however, are the nuances that influence everyday lives of American Muslims and their practice of Islam. Situated within religious studies and Islamic studies scholarship and speak- ing to a broad disciplinary array, the edited volume The Practice of Islam in America: An Introduction is a much-needed contribution to the scholarship on Islam and American Muslims. The book’s editor, prolific and prominent scholar and historian of Is- lam in America, Edward Curtis IV, explains the goals of the book in this sentence: “This book is driven by the desire to provide clear answers to es- sential, and basic, questions about how observant Muslim Americans prac- tice Islam…” (2). Importantly, the book delivers on its promise to provide a lived religion perspective (3). While the twelve chapters in The Practice of Islam in America examine distinct practices and themes, the chapters synergize in giving voice to a lived religion perspective on American Muslims’ practices. This approach helps the reader to achieve a healthy distance from the significant but often overly dominant political context that influences discourse on American Muslim life. The book opens with an introductory chapter by Curtis, explaining the rationale and background to the project. The chapter is a good prelude to this rich volume, reflecting Curtis’ years of experience working on Muslim American history and experience. For the non-specialist audience, the in- troductory chapter also provides a broad historical overview of American Muslim history, starting from the slave trade and stretching into contem- porary Islamophobia while covering debates within the diverse American Muslim community. The volume is organized across four thematic parts. Each part includes three chapters, producing a rich, twelve-chapter account. Part I examines prayer and pilgrimage and includes chapters on ṣalāt, dhikr, and ḥajj. Part II explores holidays; individual chapters cover Ramadan and Eid celebra- tions, Ashura, and Milad/Mawlid celebrations. Part III takes the reader into the realm of life cycle rituals with chapters on birth, wedding, and funeral/ death rituals. The concluding Part IV touches on Islamic ethics and reli- gious culture. It examines philanthropy, food practices and engagements with the Qur’an with reference to everyday practices of American Muslims. Curtis explains in his introduction that the volume is intentional in de- veloping a lived religion focus. Moreover, almost all authors give examples for how these practices vary in different branches of Islam (Sunni, Twelver and Isma‘ili/Bohra Shi‘i communities) as well as for multiple ethno-racial demographic groups that make up the deeply pluralistic Muslim American fabric. Contributors should be applauded for producing chapters that are ethnographically rich, thematically diverse, and attentive to multiple sites and dynamics. Chapter 1 moves through multiple vignettes that involve ṣalāt, the Muslim ritual prayer. Rose Aslan’s vivid descriptions of the lives of Ameri- can Muslims and her ability to walk the reader along not only the basics of the prayer but also the nuances among individuals with diverse ethno-racial and socioeconomic backgrounds and the post-September 11 securitization of ṣalāt is refreshing. Rosemary R. Corbett’s chapter on dhikr—“medita- tive and sometimes joyous religious litanies,” to use the definition offered by Curtis in the introductory chapter (6)—is a comparative study of three related groups, each springing from the Turkish Halveti Cerrahi order. The historical account around the creation of these groups is helpful especially because one of these figures, Tosun Bayrak of the Spring Valley Halveti Cerrahi order, recently passed away. In the next chapter, Hussein Rashid skillfully walks the reader through the meaning, rites, and politico-eco- nomic realities surrounding ḥajj, the pilgrimage to Mecca in Saudia Arabia. His chapter helps to familiarize the readers with complexities of ḥajj. Part II of the book begins with Jackleen Salem’s nuanced and vivid account of Ramadan, Eid al-Fitr, and Eid al-Adha. In testament to the volume’s attention to inclusivity, Michael Muhammad Knight’s chapter on Ashura is a vivid and informative account of this most popular Shi‘i commemoration. This chapter is less ethnographically driven than other chapters preceding it, perhaps to the advantage of the common reader who learns a great deal about early Muslim history and the background to the Sunni-Shi‘i split. The same is true also for Marcia Hermansen’s chapter on Milad/Mawlid celebrations recognizing Prophet Muhammad’s birth. The chapter strikes a balance between academic information on the subject and a thick description of these ceremonies. She provides a superb account of major debates and disagreements within the Muslim community sur- rounding these celebrations for the benefit of the uninitiated reader. In the first chapter of Part III, Maria Curtis explores birth rituals ranging from baby-showers to naming a child to postpartum complexities faced by moms within the American Muslim community. Her chapter is noteworthy in producing a much-needed addition to these underexplored topics. Juliane Hammer’s chapter on weddings is an exploration of not only ceremonial aspects of marriage but also legal approaches to marriage in America through a rich ethnographic account of three distinct weddings. She gives due attention to textual and Qur’anic interpretations on love and mercy by American Muslims. Her chapter is among those that provide the common reader with a nuanced view of the scholarship on the theme that is under exploration. The same is true for Amir Hussain’s chapter on Muslim funerals. Speaking from within a few funeral processions in southern Cali- fornia, as well as a brief description of the funeral ceremony of Muhammad Ali, Hussain explores the rites of death and burial in the American Muslim landscape.The first chapter of Part IV, by Danielle Witman Abraham, examines philanthropy and social giving in the American Muslim community. The chapter explains the norms in Sunii and Shi‘i communities, including concerns about domestic vs. international giving. Chapter 11, by Magfirat Dahlan, delves into American Muslims’ food consumption choices. She explores the fluid categories of permissible and impermissible food as well as ethical vs. non-ethical food as perceived by her respondents. The final chapter of the book is by Mona Ali and focuses on the Qur’an and how American Muslims engage with Islam’s holy book. Her approach provides a concise and effective summary of the Qur’an’s role in life cycles, identity formation and internal conversations among American Muslims. While the individual chapters’ focus on specific contexts and ethno- graphic accounts is very helpful, some chapters leave the reader with a sense of incompleteness due to the brief attempt to cram information on the broader context in the last two pages of each chapter. For example, in Chapter 1, Rose Aslan invokes the American Muslim debate around cre- ating gender equity in mosques and the third space wave but cannot do justice to the multifaceted conversations and developments around this issue. Chapter 4 by Jackleen Salem also suffers from trying to deliver too much. Salem’s concluding section, “Eid as an American Holiday,” fails to mention the heated debates that defined the “White House Iftar” dinners during President Obama’s presidency. These kinds of omissions create a kind of wedge between the complexities that arise in the everyday practice of Islam and the volume’s broader reflections. Chapter 9, by Amir Hussain, details Muhammad Ali’s funeral but does not fully engage with the debates and choices that marked the funeral. One wonders too if inclusion of other dhikr practices adapted by American Muslim followers of the Tijaniyya or the Ba‘Alawi sufi networks could have been helpful to give voice to dhikr practice in Chapter 2, out- side the Halveti Jerrahi context. Another theme that is neglected lies in the chapter on philanthropy, which does not mention what are often heated debates within American Muslim communities on the jurisprudence (fiqh) of giving to non-Muslims as well as whether certain service organizations (such as those serving students or social justice needs) are zakāt-eligible.There are practices that are left out as well. Du‘a Kumayl, practiced by Shi‘i Muslims on Thursday evenings similar to mawlid ceremonies, is not mentioned in the text. It would have been enriching to include this practice of reading a prayer that is traced to Prophet Muhammad’s cousin and one of the four great caliphs, Imam Ali. Finally, the choice to not cite online resources with their full web ad- dresses seems like an odd choice for a volume this rich in content. The lack of a full pathway in many instances makes it difficult for researchers to access information. These slight omissions notwithstanding, The Practice of Islam in Amer- ica: An Introduction is a great resource for instructors to use in introducto- ry courses in religious studies and American Muslim studies programs, as well as a good supplementary text for anyone teaching Islam in interfaith contexts. It delivers on its promise to provide rich narratives on what Is- lam looks like as a lived religion in America. It is highly relevant for those teaching not only on Islam but also on religion generally. The editor as well as the authors deserve recognition for producing a nuanced and insightful volume. Ahmet Selim TekeliogluAli Vural Ak Center for Global Islamic StudiesGeorge Mason University
APA, Harvard, Vancouver, ISO, and other styles
30

Tekelioglu, Ahmet Selim. "The Practice of Islam in America: An Introduction." American Journal of Islam and Society 35, no. 3 (July 1, 2018): 108–11. http://dx.doi.org/10.35632/ajis.v35i3.491.

Full text
Abstract:
Since September 11, American Muslim identities, political views, sensi- bilities, and even private lives have been studied by academics, pollsters, government agencies, and think tank researchers. This renewed interest on the nexus of religious and national identity has produced a vast volume of publications, cross-cutting each social science discipline and thematic re- search area. Some are even available online, such as #islamophobiaisracism syllabus, #BlackIslamSyllabus and ISPU’s Muslim American Experience Bibliography page. What is often lost in this conversation, however, are the nuances that influence everyday lives of American Muslims and their practice of Islam. Situated within religious studies and Islamic studies scholarship and speak- ing to a broad disciplinary array, the edited volume The Practice of Islam in America: An Introduction is a much-needed contribution to the scholarship on Islam and American Muslims. The book’s editor, prolific and prominent scholar and historian of Is- lam in America, Edward Curtis IV, explains the goals of the book in this sentence: “This book is driven by the desire to provide clear answers to es- sential, and basic, questions about how observant Muslim Americans prac- tice Islam…” (2). Importantly, the book delivers on its promise to provide a lived religion perspective (3). While the twelve chapters in The Practice of Islam in America examine distinct practices and themes, the chapters synergize in giving voice to a lived religion perspective on American Muslims’ practices. This approach helps the reader to achieve a healthy distance from the significant but often overly dominant political context that influences discourse on American Muslim life. The book opens with an introductory chapter by Curtis, explaining the rationale and background to the project. The chapter is a good prelude to this rich volume, reflecting Curtis’ years of experience working on Muslim American history and experience. For the non-specialist audience, the in- troductory chapter also provides a broad historical overview of American Muslim history, starting from the slave trade and stretching into contem- porary Islamophobia while covering debates within the diverse American Muslim community. The volume is organized across four thematic parts. Each part includes three chapters, producing a rich, twelve-chapter account. Part I examines prayer and pilgrimage and includes chapters on ṣalāt, dhikr, and ḥajj. Part II explores holidays; individual chapters cover Ramadan and Eid celebra- tions, Ashura, and Milad/Mawlid celebrations. Part III takes the reader into the realm of life cycle rituals with chapters on birth, wedding, and funeral/ death rituals. The concluding Part IV touches on Islamic ethics and reli- gious culture. It examines philanthropy, food practices and engagements with the Qur’an with reference to everyday practices of American Muslims. Curtis explains in his introduction that the volume is intentional in de- veloping a lived religion focus. Moreover, almost all authors give examples for how these practices vary in different branches of Islam (Sunni, Twelver and Isma‘ili/Bohra Shi‘i communities) as well as for multiple ethno-racial demographic groups that make up the deeply pluralistic Muslim American fabric. Contributors should be applauded for producing chapters that are ethnographically rich, thematically diverse, and attentive to multiple sites and dynamics. Chapter 1 moves through multiple vignettes that involve ṣalāt, the Muslim ritual prayer. Rose Aslan’s vivid descriptions of the lives of Ameri- can Muslims and her ability to walk the reader along not only the basics of the prayer but also the nuances among individuals with diverse ethno-racial and socioeconomic backgrounds and the post-September 11 securitization of ṣalāt is refreshing. Rosemary R. Corbett’s chapter on dhikr—“medita- tive and sometimes joyous religious litanies,” to use the definition offered by Curtis in the introductory chapter (6)—is a comparative study of three related groups, each springing from the Turkish Halveti Cerrahi order. The historical account around the creation of these groups is helpful especially because one of these figures, Tosun Bayrak of the Spring Valley Halveti Cerrahi order, recently passed away. In the next chapter, Hussein Rashid skillfully walks the reader through the meaning, rites, and politico-eco- nomic realities surrounding ḥajj, the pilgrimage to Mecca in Saudia Arabia. His chapter helps to familiarize the readers with complexities of ḥajj. Part II of the book begins with Jackleen Salem’s nuanced and vivid account of Ramadan, Eid al-Fitr, and Eid al-Adha. In testament to the volume’s attention to inclusivity, Michael Muhammad Knight’s chapter on Ashura is a vivid and informative account of this most popular Shi‘i commemoration. This chapter is less ethnographically driven than other chapters preceding it, perhaps to the advantage of the common reader who learns a great deal about early Muslim history and the background to the Sunni-Shi‘i split. The same is true also for Marcia Hermansen’s chapter on Milad/Mawlid celebrations recognizing Prophet Muhammad’s birth. The chapter strikes a balance between academic information on the subject and a thick description of these ceremonies. She provides a superb account of major debates and disagreements within the Muslim community sur- rounding these celebrations for the benefit of the uninitiated reader. In the first chapter of Part III, Maria Curtis explores birth rituals ranging from baby-showers to naming a child to postpartum complexities faced by moms within the American Muslim community. Her chapter is noteworthy in producing a much-needed addition to these underexplored topics. Juliane Hammer’s chapter on weddings is an exploration of not only ceremonial aspects of marriage but also legal approaches to marriage in America through a rich ethnographic account of three distinct weddings. She gives due attention to textual and Qur’anic interpretations on love and mercy by American Muslims. Her chapter is among those that provide the common reader with a nuanced view of the scholarship on the theme that is under exploration. The same is true for Amir Hussain’s chapter on Muslim funerals. Speaking from within a few funeral processions in southern Cali- fornia, as well as a brief description of the funeral ceremony of Muhammad Ali, Hussain explores the rites of death and burial in the American Muslim landscape.The first chapter of Part IV, by Danielle Witman Abraham, examines philanthropy and social giving in the American Muslim community. The chapter explains the norms in Sunii and Shi‘i communities, including concerns about domestic vs. international giving. Chapter 11, by Magfirat Dahlan, delves into American Muslims’ food consumption choices. She explores the fluid categories of permissible and impermissible food as well as ethical vs. non-ethical food as perceived by her respondents. The final chapter of the book is by Mona Ali and focuses on the Qur’an and how American Muslims engage with Islam’s holy book. Her approach provides a concise and effective summary of the Qur’an’s role in life cycles, identity formation and internal conversations among American Muslims. While the individual chapters’ focus on specific contexts and ethno- graphic accounts is very helpful, some chapters leave the reader with a sense of incompleteness due to the brief attempt to cram information on the broader context in the last two pages of each chapter. For example, in Chapter 1, Rose Aslan invokes the American Muslim debate around cre- ating gender equity in mosques and the third space wave but cannot do justice to the multifaceted conversations and developments around this issue. Chapter 4 by Jackleen Salem also suffers from trying to deliver too much. Salem’s concluding section, “Eid as an American Holiday,” fails to mention the heated debates that defined the “White House Iftar” dinners during President Obama’s presidency. These kinds of omissions create a kind of wedge between the complexities that arise in the everyday practice of Islam and the volume’s broader reflections. Chapter 9, by Amir Hussain, details Muhammad Ali’s funeral but does not fully engage with the debates and choices that marked the funeral. One wonders too if inclusion of other dhikr practices adapted by American Muslim followers of the Tijaniyya or the Ba‘Alawi sufi networks could have been helpful to give voice to dhikr practice in Chapter 2, out- side the Halveti Jerrahi context. Another theme that is neglected lies in the chapter on philanthropy, which does not mention what are often heated debates within American Muslim communities on the jurisprudence (fiqh) of giving to non-Muslims as well as whether certain service organizations (such as those serving students or social justice needs) are zakāt-eligible.There are practices that are left out as well. Du‘a Kumayl, practiced by Shi‘i Muslims on Thursday evenings similar to mawlid ceremonies, is not mentioned in the text. It would have been enriching to include this practice of reading a prayer that is traced to Prophet Muhammad’s cousin and one of the four great caliphs, Imam Ali. Finally, the choice to not cite online resources with their full web ad- dresses seems like an odd choice for a volume this rich in content. The lack of a full pathway in many instances makes it difficult for researchers to access information. These slight omissions notwithstanding, The Practice of Islam in Amer- ica: An Introduction is a great resource for instructors to use in introducto- ry courses in religious studies and American Muslim studies programs, as well as a good supplementary text for anyone teaching Islam in interfaith contexts. It delivers on its promise to provide rich narratives on what Is- lam looks like as a lived religion in America. It is highly relevant for those teaching not only on Islam but also on religion generally. The editor as well as the authors deserve recognition for producing a nuanced and insightful volume. Ahmet Selim TekeliogluAli Vural Ak Center for Global Islamic StudiesGeorge Mason University
APA, Harvard, Vancouver, ISO, and other styles
31

Temmingh, H., D. J. Stein, F. M. Howells, U. A. Botha, L. Koen, M. Mazinu, E. Jordaan, et al. "Biological Psychiatry Congress 2015." South African Journal of Psychiatry 21, no. 3 (August 1, 2015): 24. http://dx.doi.org/10.4102/sajpsychiatry.v21i3.893.

Full text
Abstract:
<p><strong>List of Abstract Titles and authors:<br /></strong></p><p><strong>1. Psychosis: A matter of mental effort?</strong></p><p>M Borg, Y Y van der Zee, J H Hsieh, H Temmingh, D J Stein, F M Howells</p><p><strong>2.In search of an affordable, effective post-discharge intervention: A randomised control trial assessing the influence of a telephone-based intervention on readmissions for patients with severe mental illness in a developing country</strong></p><p><strong></strong>U A Botha, L Koen, M Mazinu, E Jordaan, D J H Niehaus</p><p><strong>3. The effect of early abstinence from long-term methamphetamine use on brain metabolism using 1H-magnetic resonance spectro-scopy (1H-MRS)</strong></p><p>A Burger, S Brooks, D J Stein, F M Howells</p><p><strong>4. The effect of <em>in utero exposure </em>to methamphetamine on brain metabolism in childhood using 1H-magnetic resonance spectroscopy (1H-MRS)</strong></p><p>A Burger, A Roos, M Kwiatkowski, D J Stein, K A Donald, F M Howells</p><p><strong>5. A prospective study of clinical, biological and functional aspects of outcome in first-episode psychosis: The EONKCS Study</strong></p><p><strong></strong>B Chiliza, L Asmal, R Emsley</p><p><strong>6. Stimulants as cognitive enhancers - perceptions v. evidence in a very real world</strong></p><p><strong></strong>H M Clark</p><p><strong>7. Pharmacogenomics in antipsychotic drugs</strong></p><p><strong></strong>Ilse du Plessis</p><p><strong>8. Serotonin in anxiety disorders and beyond</strong></p><p><strong></strong>Ilse du Plessis</p><p><strong>9. HIV infection results in ventral-striatal reward system hypo-activation during cue processing</strong></p><p><strong></strong>S du Plessis, M Vink, J A Joska, E Koutsilieri, A Bagadia, D J Stein, R Emsley</p><p><strong>10. Disease progression in schizophrenia: Is the illness or the treatment to blame?</strong></p><p>R Emsley, M J Sian</p><p><strong>11. Serotonin transporter variants play a role in anxiety sensitivity in South African adolescents</strong></p><p> S M J Hemmings, L I Martin, L van der Merwe, R Benecke, K Domschke, S Seedat</p><p><strong>12. Iron deficiency in two children diagnosed with multiple sclerosis: Report on whole exom sequencing</strong></p><p><strong></strong>S Janse van Rensburg, R van Toorn, J F Schoeman, A Peeters, L R Fisher, K Moremi, M J Kotze</p><p><strong>13. Benzodiazepines: Practical pharmacokinetics</strong></p><p><strong></strong>P Joubert</p><p><strong>14. What to consider when prescribing psychotropic medications</strong></p><p><strong></strong>G Lippi</p><p><strong>15. Current prescribing practices for obsessive-compulsive disorder in South Africa: Controversies and consensus</strong></p><p><strong></strong>C Lochner, L Taljaard, D J Stein</p><p><strong>16. Correlates of emotional and behavioural problems in children with preinatally acquired HIV in Cape Town, South Africa</strong></p><p><strong></strong>K-A Louw, N Phillips, JIpser, J Hoare</p><p><strong>17. The role of non-coding RNAs in fear extinction</strong></p><p><strong></strong>S Malan-Muller, L Fairbairn, W M U Daniels, M J S Dashti, E J Oakleley, M Altorfer, J Harvey, S Seedat, J Gamieldien, S M J Hemmings</p><p><strong>18. An analysis of the management og HIV-mental illness comorbidity at the psychiatric unit of the Dr George Mukhari Academic Hospital</strong></p><p><strong></strong>M L Maodi, S T Rataemane, T Kyaw</p><p><strong>19. The identification of novel genes in anxiety disorders: A gene X environment correlation and interaction study</strong></p><p><strong></strong>N W McGregor, J Dimatelis, S M J Hemmings, C J Kinnear, D J Stein, V Russel, C Lochner</p><p><strong>20. Collaborations between conventional medicine and traditional healers: Obstacles and possibilities</strong></p><p><strong></strong>G Nortje, S Seedat, O Gureje</p><p><strong>21. Thought disorder and form perception: Relationships with symptoms and cognitive function in first-episode schizophrenia</strong></p><p>M R Olivier, R Emsley</p><p><strong>22. Investigating the functional significance of genome-wide variants associated with antipsychotic treatment response</strong></p><p><strong></strong>E Ovenden, B Drogemoller, L van der Merwe, R Emsley, L Warnich</p><p><strong>23. The moral and bioethical determinants of "futility" in psychiatry</strong></p><p><strong></strong>W P Pienaar</p><p><strong>24. Single voxel proton magnetic resonance spectroscopy (1H-MRS) and volumetry of the amylgdala in social anxiety disorder in the context of early developmental trauma</strong></p><p>D Rosenstein, A T Hess, J Zwart, F Ahmed-Leitao, E Meintjies, S Seedat</p><p><strong>25. Schizoaffective disorder in an acute psychiatric unit: Profile of users and agreement with Operational Criteria (OPCRIT)</strong></p><p><strong></strong>R R Singh, U Subramaney</p><p><strong>26. The right to privacy and confidentiality: The ethics of expert diagnosis in the public media and the Oscar Pistorius trial</strong></p><p><strong></strong>C Smith</p><p><strong>27. A birth cohort study in South Africa: A psychiatric perspective</strong></p><p>D J Stein</p><p><strong>28. 'Womb Raiders': Women referred for observation in terms of the Criminal Procedures Act (CPA) charged with fetal abduction and murder</strong></p><p><strong></strong>U Subramaney</p><p><strong>29. Psycho-pharmacology of sleep wake disorders: An update</strong></p><p>R Sykes</p><p><strong>30. Refugee post-settlement in South Africa: Role of adjustment challenges and family in mental health outcomes</strong></p><p><strong></strong>L Thela, A Tomita, V Maharaj, M Mhlongo, K Jonathan</p><p><strong>31. Dstinguishing ADHD symptoms in psychotic disorders: A new insight in the adult ADHD questionnaire</strong></p><p>Y van der Zee, M Borg, J H Hsieh, H Temmingh, D J Stein, F M Howells</p><p><strong>32. Oscar Pistorius ethical dilemmas in a trial by media: Does this include psychiatric evaluation by media?</strong></p><p>M Vorster</p><p><strong>33. Genetic investigation of apetite aggression in South African former young offenders: The involvement of serotonin transporter gene</strong></p><p>K Xulu, J Somer, M Hinsberger, R Weierstall, T Elbert, S Seedat, S Hemmings</p><p><strong>34. Effects of HIV and childhood trauma on brain morphemtry and neurocognitive function</strong></p><p>G Spies, F Ahmed-Leitao, C Fennema-Notestine, M Cherner, S Seedat</p><p><strong>35. Measuring intentional behaviour normative data of a newly developed motor task battery</strong></p><p><strong></strong>S Bakelaar, J Blampain, S Seedat, J van Hoof, Y Delevoye-Turrel</p><p><strong>36. Resilience in social anxiety disorder and post-traumatic stress disorder in the context of childhood trauma</strong></p><p>M Bship, S Bakelaar, D Rosenstein, S Seedat</p><p><strong>37. The ethical dilemma of seclusion practices in psychiatry</strong></p><p>G Chiba, U Subramaney</p><p><strong>38. Physical activity and neurological soft signs in patients with schizophrenia</strong></p><p>O Esan, C Osunbote, I Oladele, S Fakunle, C Ehindero</p><p><strong>39. A retrospective study of completed suicides in the Nelson Mandela Bay Metropolitan Area from 2008 to 2013 - preliminary results</strong></p><p><strong></strong>C Grobler, J Strumpher, R Jacobs</p><p><strong>40. Serotonin transporter variants play a role in anxiety sensitivity in South African adolescents</strong></p><p><strong></strong>S M J Hemmings, L I Martin, L van der Merwe, R Benecke, K Domschke, S Seedat</p><p><strong>41. Investigation of variants within antipsychotic candidate pharmacogenes associated with treatment outcome</strong></p><p>F Higgins, B Drogmoller, G Wright, L van der Merwe, N McGregor, B Chiliza, L Asmal, L Koen, D Niehaus, R Emsley, L Warnich</p><p><strong>42. Effects of diet, smoking and alcohol consumption on disability (EDSS) in people diagnosed with multiple sclerosis</strong></p><p>S Janse van Rensburg, W Davis, D Geiger, F J Cronje, L Whati, M Kidd, M J Kotze</p><p><strong>43. The clinical utility of neuroimaging in an acute adolescnet psychiatric inpatient population</strong></p><p><strong></strong>Z Khan, A Lachman, J Harvey</p><p><strong>44. Relationships between childhood trauma (CT) and premorbid adjustment (PA) in a highly traumatised sample of patients with first-episode schizophrenia (FES</strong>)</p><p>S Kilian, J Burns, S Seedat, L Asmal, B Chiliza, S du Plessis, R Olivier, R Emsley</p><p><strong>45. Functional and cognitive outcomes using an mTOR inhibitor in an adolescent with TSC</strong></p><p>A Lachman, C van der Merwe, P Boyes, P de Vries</p><p><strong>46. Perceptions about adolescent body image and eating behaviour</strong></p><p><strong></strong>K Laxton, A B R Janse van Rensburg</p><p><strong>47. Clinical relevance of FTO rs9939609 as a determinant of cardio-metabolic risk in South African patients with major depressive disorder</strong></p><p>H K Luckhoff, M J Kotze</p><p><strong>48. Childhood abuse and neglect as predictors of deficits in verbal auditory memory in non-clinical adolescents with low anxiety proneness</strong></p><p>L Martin, K Martin, S Seedat</p><p><strong>49. The changes of pro-inflammatory cytokines in a prenatally stressed febrile seizure animal model and whether <em>Rhus chirindensis</em> may attenuate these changes</strong></p><p><strong></strong>A Mohamed, M V Mabandla, L Qulu</p><p><strong>50. Influence of TMPRSS6 A736v and HFE C282y on serum iron parameters and age of onset in patients with multiple sclerosis</strong></p><p><strong></strong>K E Moremi, M J Kotze, H K Luckhoff, L R Fisher, M Kidd, R van Toorn, S Janse van Rensburg</p><p><strong>51. Polypharmacy in pregnant women with serious mental illness</strong></p><p>E Thomas, E du Toit, L Koen, D Niehaus</p><p><strong>52. Infant attachment and maternal depression as predictors of neurodevelopmental and behavioural outcomes at follow-up</strong></p><p>J Nothling, B Laughton, S Seedat</p><p><strong>53. Differences in abuse, neglect and exposure to community violence in adolescents with and without PTSD</strong></p><p><strong></strong>J Nothling, S Suliman, L Martin, C Simmons, S Seedat</p><p><strong>54. Assessment of oxidative stress markers in children with autistic spectrum disorders in Lagos, Nigeria</strong></p><p><strong></strong>Y Oshodi, O Ojewunmi, T A Oshodi, T Ijarogbe, O F Aina, J Okpuzor, O C F E A Lesi</p><p><strong>55. Change in diagnosis and management of 'gender identity disorder' in pre-adolescent children</strong></p><p>S Pickstone-Taylor</p><p><strong>56. Brain network connectivity in women exposed to intimate partner violence</strong></p><p>A Roos, J-P Fouche, B Vythilingum, D J Stein</p><p><strong>57. Prolonged exposure treatment for PTSD in a Third-World, task-shifting, community-based environment</strong></p><p>J Rossouw, E Yadin, I Mbanga, T Jacobs, W Rossouw, D Alexander, S Seedat</p><p><strong>58. Contrasting effects of early0life stress on mitochondrial energy-related proteins in striatum and hippocampus of a rat model of attention-deficit/ hyperactivity disorder</strong></p><p><strong></strong>V Russell, J Dimatelis, J Womersley, T-L Sterley</p><p><strong>59. Attention-deficit hyperactivity disorder in adults: A South African perspective</strong></p><p>R Schoeman, M de Klerk, M Kidd</p><p><strong>60. Cognitive function in women with HIV infection and early-life stress</strong></p><p>G Spies, C Fennema-Notestine, M Cherner, S Seedat</p><p><strong>61. Changes in functional connectivity networks in bipolar disorder patients after mindfulness-based cognitic therapy</strong></p><p>J A Starke, C F Beckmann, N Horn</p><p><strong>62. Post-traumatic stress disorder, overweight and obesity: A systematic review and meta-analysis</strong></p><p><strong></strong>S Suliman, L Anthonissen, J Carr, S du Plessis, R Emsley, S M J Hemmings, C Lochner, N McGregor L van den Heuvel, S Seedat</p><p><strong>63. The brain and behaviour in a third-trimester equivalent animal model of fetal alcohol spectrum disorders</strong></p><p>P C Swart, C B Currin, J J Dimatelis, V A Russell</p><p><strong>64. Irritability Assessment Model (IAM) to monitor irritability in child and adolescent psychiatric disorders.</strong></p><p>D van der Westhuizen</p><p><strong>65. Outcome of parent-adolescent training in chilhood victimisation: Adaptive functioning, psychosocial and physiological variables</strong></p><p>D van der Westhuizen</p><p><strong>66. The effect of ketamine in the Wistar-Kyoto and Sprague Dawley rat models of depression</strong></p><p>P J van Zyl, J J Dimatelis, V A Russell</p><p><strong>67. Investigating COMT variants in anxiety sensitivity in South African adolescents</strong></p><p>L J Zass, L Martin, S Seedat, S M J Hemmings</p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p><strong><br /></strong></p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
32

Faraco, Michel Maximiano, Francine Lima Gelbcke, Laura Cavalcanti de Farias Brehmer, Flávia Regina Souza Ramos, Dulcinéia Ghizoni Schneider, and Luciana Ramos Silveira. "Moral distress and moral resilience of nurse managers." Nursing Ethics, May 13, 2022, 096973302210857. http://dx.doi.org/10.1177/09697330221085770.

Full text
Abstract:
Background Moral distress is a phenomenon that can lead to an imbalance of the mind and body. There are many coping strategies to overcome the obstacles that lead the subject to this condition. Some coping strategies are capable of being achieved through the cultivation of moral resilience. Aim The aim is to identify the strategies of moral resilience in the nursing management of University Hospitals in Brazil. Research design The research design is the qualitative study with discursive textual analysis. Participants and research context : 44 nurse managers and nurses in leadership positions participated in a total of 30 University Hospitals in Brazil. Data were collected online, using a questionnaire with open questions. Ethical considerations The Ethics Committee approved the study. Participants received information about the research, agreed to respond to the questionnaire, and were guaranteed anonymity. Findings Personal adaptive strategies (intrapersonal and interpersonal) and organizational collaborative strategies (intrinsic and transformational management) emerged from this process. The intrapersonal strategies involved elements of rationality, flexibility, rebalancing practices, moral courage, and detachment. The interpersonal strategies addressed support networks, team involvement, and dialog. Organizational strategies dealt with actions which reorient ethical infrastructure, ethical education, and psychological protection, as well as fostering dialogical relationships, empowerment, and cooperation. Conclusion From the perspective of social historical construction, it is understood that developing personal and organizational strategies is essential to cultivating moral resilience.
APA, Harvard, Vancouver, ISO, and other styles
33

Kubheka, Brenda Zanele. "Bioethics and the use of social media for medical crowdfunding." BMC Medical Ethics 21, no. 1 (October 6, 2020). http://dx.doi.org/10.1186/s12910-020-00521-2.

Full text
Abstract:
Abstract Background Social media has globalised compassion enabling requests for donations to spread beyond geographical boundaries. The use of social media for medical crowdfunding links people with unmet healthcare needs to charitable donors. There is no doubt that fundraising campaigns using such platforms facilitates access to financial resources to the benefit of patients and their caregivers. Main text This paper reports on a critical review of the published literature and information from other online resources discussing medical crowdfunding and the related ethical questions. The review highlighted the benefits of crowdfunding as well as the under-exploration of the risk of having patients’ desires and human rights undermined during online fundraising campaigns. Majority of these campaigns get initiated on behalf of the patients, especially the very sick and dependant. The ethical questions raised relate to the voluntariness of informed consent and the possibility of patients being used as a means to an end. Vulnerability of patients may expose them to coercion, undue influence, manipulation, and violation of their human rights. The success of these campaigns is influenced by the digital skills, pre-existing social networks and, the emotional potency. Healthcare is a public good, and online market forces should not determine access to essential health services. The benefits of crowdfunding cannot be subverted, but it can perpetuate unintended injustices, especially those arising from socio-economic factors. Conclusions Policymakers ought to monitor the utilisation of crowdfunding sites to identify policy failures and unmet essential health care needs responsible for driving individuals to use these platforms. The upholding of human rights and the fundamental respect of the individual’s wishes is a moral imperative. The need for an ethics framework to guide different stakeholders during medical crowdfunding needs further examination.
APA, Harvard, Vancouver, ISO, and other styles
34

Hookway, Nicholas, and Tim Graham. "‘22 Push-Ups for a Cause’: Depicting the Moral Self via Social Media Campaign #Mission22." M/C Journal 20, no. 4 (August 16, 2017). http://dx.doi.org/10.5204/mcj.1270.

Full text
Abstract:
IntroductionIn 2016, the online cause #Mission22 went viral on social media. Established to raise awareness about high suicide rates among US military veterans, the campaign involves users posting a video of themselves doing 22 push-ups for 22 days, and on some platforms, to donate and recruit others to do the same. Based on a ‘big data’ analysis of Twitter data (over 225,883 unique tweets) during the height of the campaign, this article uses #Mission22 as a site in which to analyse how people depict, self-represent and self-tell as moral subjects using social media campaigns. In addition to spotlighting how such movements are mobilised to portray moral selves in particular ways, the analysis focuses on how a specific online cause like #Mission22 becomes popularly supported from a plethora of possible causes and how this selection and support is shaped by online networks. We speculate that part of the reason why Mission22 went ‘viral’ in the highly competitive attention economies of social media environments was related to visual depictions of affective bodily, fitness and moral practices.Web 2.0 Culture: Self and Mass DepictionWeb 2.0 culture such as social networking sites (eg., Facebook; Instagram), the advent of video sharing technologies (eg., YouTube) and more recently, micro-blogging services like Twitter have created new and transformative spaces to create, depict and display identity. Web 2.0 is primarily defined by user-generated content and interaction, whereby users are positioned as both consumer and producers, or ‘produsers’ of Web content (Bruns and Schmidt). Challenging traditional “broadcast” media models, Web 2.0 gives users a platform to produce their own content and for “the many” to communicate “with the many” (Castells). The growth of mass self communication, supported by broadband and wireless technologies, gives unprecedented power to individuals and groups to depict and represent their identities and relationships to a potential global audience.The rise of user-generated communication technologies dovetails with broader analyses of the changing contours of self and identity in late-modern times. Individuals in the early decades of the 21st century must take charge for how they depict, portray and self-tell as distinctive, unique and individual subjects (Beck and Beck-Gernsheim; Giddens; Bauman). As contemporary lives become less bound to the strictures of tradition, community and religion, the self becomes a project to be worked out and developed. These theorists suggest that via processes of individualisation, detraditionalisation and globalisation, contemporary subjects have become disconnected from the traditional coordinates of community and are thus faced with the imperative of self-construction and reinvention (Elliott and Lemert).More recently, theoretical and empirical work has attempted to interpret and evaluate how networks of mass self-depiction powered by new digital and wireless technologies are reshaping identity practices. For some theorists, like Bauman (Consuming 2) and Turkle, Web 2.0 is a worrying trend. Bauman suggests in the “confessional society” – think reality TV, talk shows, social media – people are compelled to curate and reflect upon their lives in the public realm. These public acts of self-depiction are part of a move to treating the self as a brand to be consumed, “as products capable of drawing attention, and attracting demands and customers” (Bauman and Lyon 33). The consumer quality of new communications sees connections replace relationships as social bonds become short-term and brittle. Turkle makes a similar argument, suggesting that our preoccupation with online curation centres on controlling our identities and depicting “perfect” versions of ourselves. The result is diminished forms of intimacy and connection; we preach authenticity and realness but practice self-curation and self-stylisation.A more positive body of literature has examined how Web technologies work as tools for the formation of self. This literature is based on more close-up and detailed readings of particular platforms and practices rather than relying on sweeping claims about technology and social change. Following Foucault, Bakardjieva & Gaden argue that personal blogs and social networking site (SNS) profiles constitute a contemporary technology of the self, whereby users employ Web 2.0 technologies in everyday life as practices of self care and self-formation. In a similar way, Sauter argues that SNSs, and in particular Facebook, are tools for self-formation through the way in which status updates provide a contemporary form of self-writing. Eschewing the notion of social media activity as narcissistic or self-obsessive, Sauter argues that SNSs are a techno-social practice of self-writing that facilitate individuals to “form relations to self and others by exposing themselves to others and obtaining their feedback” (Sauter 836). Other research has explored young people’s sustained use of social media, particularly Facebook, and how these sites are used to tell and archive “growing up” narratives and key rites of passage (Robards and Lincoln).One area of research that has been overlooked is how people use social media to construct and depict moral identity. Following Sauter’s arguments about the self work that occurs through networked self-writing, we can extend this to include the ethical self work performed and produced through online depictions. One exception is work by Hookway which analyses how people use blogs – an earlier Web 2.0 form – to write and self-examine their moral experiences. This research shows how bloggers use blogging as a form of online self-writing to construct a do-it-yourself form of morality that emphasises the self, emotions, body and ideals of authenticity. Hookway highlights the idea that morality is less about obedience to a code of rules or following external laws to becoming a particular moral person through a set of self-practices. Paralleling broader shifts in identity construction, people are no longer bound to the inherited guidelines of the past, morality becomes a project to be worked out, designed and depicted in relation to Others (Hookway).In Foucault’s terms, morality involves a process of ethical self-stylisation – an “aesthetics of existence” – based on “the ethical work of the self on the self” (Foucault 91). “Care of the self” involves a “set of occupations” or “labours” that connect and link the self to the Other through guidance, counselling and communication (Foucault 50). For Foucault, self-creation and self-care imply “care for others” as individuals perform a mutual concern with achieving an “art of existence”. This is a reciprocated ethics that obligates the individual to care for others in order to help them care for themselves.This stylisation of the ethical self has been drastically reshaped by the new opportunities for self-expression, belonging and communication offered in our digitally networked society. Digital worlds and spaces create new multi-media modes for individuals and groups to depict, perform and communicate particular moral identities and positions. Web 2.0 technologies are seeing the boundaries between the private and public sphere collapse as more people are willing to share the most intimate part of their moral lives with a diverse mix of strangers, friends, family and associates.The confessional quality of online spaces provide a unique opportunity to analyse “lay morality” or everyday moral understandings, constructions and depictions and how this is co-produced in relation to new technological affordances. Following Sayer (951), morality is defined as “how people should treat others and be treated by them, which of course is crucial for their subjective and objective well-being”. Morality is understood as a relational and evaluative practice that involves being responsive to how people are faring and whether they are suffering or flourishing.In this article, we use the #Mission22 campaign – a campaign that went “viral” across multiple social media platforms – as a unique site to analyse and visualise lay moral depictions and constructions. Specifically, we analyse the #Mission22 campaign on Twitter using a big data analysis. Much of the empirical work on online self construction and depiction is either purely theoretical in the vein of Bauman, Turkle and Sauter or based on small qualitative samples such as the work by Lincoln and Robards and Author A. This article is unique not only in investigating the crafting of moral depictions in Web 2.0 forums but also in the scale of the textual and visual representation of mass moral self-depictions it captures and analyses. Big Data Analysis of #Mission22 on TwitterIn order to empirically examine the #Mission22 campaign on Twitter, we used the Twitter API to collect over three months of tweets that contained the campaign hashtag (from 20 Aug. 2016 to 1 Dec. 2016). This resulted in a dataset of 2,908,559 tweets, of which 225,883 were non-duplicated (i.e., some tweets were collected multiple times by the crawler).There were 3,230 user accounts participating during this period, with each user tweeting 70 times on average. As Figure 1 shows, a sizeable percentage of users were quite active at the height of the campaign, although there is clearly a number of users who only tweeted once or twice. More specifically, there were 1,232 users (or 38%) who tweeted at least 100 times, and on the other hand 1080 users (or 33%) who only tweeted two times or less. In addition, a tiny number of ‘power users’ (18 or 0.006%) tweeted more than 400 times during this period. Figure 1: Frequency distribution of #Mission22 tweets for each user in the datasetTo get a sense of what users were talking about during the campaign, we constructed a wordcloud out of the text data extracted from the tweets (see Figure 2). To provide more information and context, usernames (preceded with @) and hashtags (preceded with #) were included along with the words, providing a set of terms. As a result, the wordcloud also shows the user accounts and hashtags that were mentioned most often (note that #Mission22 was excluded from the data as it, by definition of the data collection process, has to occur in every tweet). In order to remove meaningless terms from the dataset we applied several text processing steps. First, all terms were converted to lowercase, such that “Veteran” and “veteran” are treated as the same term. Next, we applied a technique known as term frequency-inverse document frequency (tf-idf) to the tweet text data. Tf-idf effectively removes terms that occur so frequently that they provide no interesting information (e.g., the term “mission22”), and also terms that occur extremely infrequently. Finally, we removed English “stop words” from the text data, thereby eliminating common words such as “the” and “and”. Figure 2: Wordcloud of the #Mission22 tweet contentAs Figure 2 shows, the most frequent terms revolve around the campaign message and call-to-action for suicide awareness, including, for example, “day”, “veteran”, “support”, “push-ups”, “band”, “challenge”, “suicide”, “fight”, and “alone”. A number of user accounts are also frequently mentioned, which largely relate to the heavily retweeted users (discussed further below). Furthermore, alongside the central #mission22 hashtag, a number of other popular hashtags were in circulation during the campaign, including “#veteran”, “#americasmission”, “#22kill”, and “#22adayis22toomany”. Table 1 provides the top 50 most frequently occurring terms in decreasing order.Table 1: Top 50 words in the #Mission22 tweet content (decreasing order)1-1011-2021-3031-4041-50day@mrbernardedlong@uc_vetsnothingveteran#veteranbetter@kappasigmauceverysupporteverydaybelieve@ucthetachimissionpush-upschallengetodaytakehelp@sandratxassuicidehaulone#22kill@defensebaronveteransawarenessjustsay@the_usofightaccepted@piedmontlax#veterans@nbcnewsaloneptsdgoodweaknessbandvets22kwrong#nevertrumpcimmunity [sic]#americasmissionshoutoutgodwillA surprising finding of our study is that the vast majority of tweets are simply just retweets of other users. The number of retweets was 223,666, which accounts for about 99% of all tweets in the dataset. Even more surprising was that the vast majority of these retweets are from a single tweet. Indeed, 221,088 (or 98%) of all tweets in the dataset were retweets of the following tweet that was authored on 2 March 2015 by @SandraTXAS (see Figure 3). Clearly we can say that this tweet went ‘viral’ (Jenders et al) in the sense that it became frequently retweeted and gained an increasing amount of attention due to its cumulative popularity and visibility over time. Figure 3: #1 most retweeted #Mission22 tweet – @SandraTXAS (https://twitter.com/SandraTXAS)This highly retweeted or viral #Mission22 tweet provides a point of departure to examine what aspects of the tweet content influence the virality or popularity of #Mission22 tweets during the height of the campaign. To do this, we extracted the next nine most retweeted tweets from our dataset, providing an analysis of the “top 10” retweets (including the @SandraTXAS tweet above). Figure 4: #2 most retweeted - @mrbernarded (https://twitter.com/mrbernarded/status/776221040582295553)This tweet was retweeted 715 times in our dataset. Figure 5: #4 most retweeted - @Mission22 (https://twitter.com/Mission22/status/799872548863414272)This was retweeted 317 times in our dataset. Figure 6: #4 most retweeted - @UCThetaChi (https://twitter.com/UCThetaChi/status/784775641430384640)This was retweeted 180 times in our dataset. Figure 7: #5 most retweeted - @PamKeith2016 (https://twitter.com/PamKeith2016/status/782975576550305792)This was retweeted 121 times in our dataset. Figure 8: #6 most retweeted - @PiedmontLax (https://twitter.com/PiedmontLax/status/770749891698122752)This was retweeted 105 times in our dataset. Figure 9: #7 most retweeted - @PiedmontLax (https://twitter.com/PiedmontLax/status/771181070066692098) This was retweeted 78 times in our dataset. Figure 10: #8 most retweeted - @PatriotBrother (https://twitter.com/PatriotBrother/status/804387050728394752) This was retweeted 59 times in our dataset. Figure 11: #9 most retweeted - @alexgotayjr (https://twitter.com/alexgotayjr/status/787112936644849664) This was retweeted 49 times in our dataset. Figure 12: #10 most retweeted - @csjacobson89 (https://twitter.com/csjacobson89/status/772921614044233729) This was retweeted 45 times in our dataset.DiscussionThis article has provided the first “big data” analysis of the #Mission22 movement that went viral across multiple social media platforms in 2016. We began by arguing that Web 2.0 has ushered in profound changes to how people depict and construct identities that articulate with wider transformations in self and identity in conditions of late-modernity. The “confessional” quality of Web 2.0 means individuals and groups are presented with unprecedented opportunities to “mass self-depict” through new communication and Internet technologies. We suggest that the focus on how Web technologies are implicated in the formation of moral subjectivities is something that has been overlooked in the extant research on identity and Web 2.0 technologies.Filling this gap, we used the #Mission22 movement on Twitter as an empirical site to analyse how contemporary subjects construct and visually depict moral identities in online contexts. A central finding of our analysis of 225883 Twitter posts is that most engagement with #Mission22 was through retweeting. Our data show that retweets were by far the most popular way to interact and engage with the movement. In other words, most people were not producing original or new content in how they participated in the movement but were re-sharing – re-depicting – what others had shared. This finding highlights the importance of paying attention to the architectural affordances of social media platforms, in this case, the affordances of the ‘retweet’ button, and how they shape online identity practices and moral expression. We use moral expression here as a broad term to capture the different ways individuals and groups make moral evaluations based on a responsiveness to how people are faring and whether they are suffering or flourishing (Sayer). This approach provides an emic account of everyday morality and precludes, for example, wider philosophical debates about whether patriotism or nationalistic solidarity can be understood as moral values.The prominence of the retweet in driving the shape and nature of #Mission22 raises questions about the depth of moral engagement being communicated. Is the dominance of the retweet suggestive of a type of “moral slacktivism”? Like its online political equivalent, does the retweet highlight a shallow and cursory involvement with a cause or movement? Did online engagement translate to concrete moral actions such as making a donation to the cause or engaging in some other form of civic activity to draw attention to the movement? These questions are beyond the scope of this article but it is interesting to consider the link between the affordances of the platform, capacity for moral expression and how this translates to face-to-face moral action. Putting aside questions of depth, people are compelled not to ignore these posts, they move from “seeing” to “posting”, to taking action within the affordances of the architectural platform.What then is moving Twitter users to morally engage with this content? How did this movement go viral? What helped bust this movement out of the “long tail distribution” which characterises most movements – that is, few movements “take-off” and become durable within the congested attention economies of social media environments. The Top 10 most retweeted tweets provide powerful answers here. All of them feature highly emotive and affective visual depictions, either high impact photos and statements, or videos of people/groups doing pushups in solidarity together. The images and videos align affective, bodily and fitness practices with nationalistic and patriotic themes to produce a powerful and moving moral cocktail. The Top 50 words also capture the emotionally evocative use of moral language: words like: alone, fight, challenge, better, believe, good, wrong, god, help, mission, weakness and will.The emotional and embodied visual depictions that characterise the the Top 10 retweets and Top 50 words highlight how moral identity is not just a cerebral practice, but one that is fundamentally emotional and bodily. We do morality not just with our minds and heads but also with our bodies and our hearts. Part of the power of this movement, then, is the way it mobilises interest and involvement with the movement through a physical and embodied practice – doing push-ups. Visually depicting oneself doing push-ups online is a powerful display of morality identity. The “lay morality” being communicated is that not only are you somebody who cares about the flourishing and suffering of Others, you are also a fit, active and engaged citizen. And of course, the subject who actively takes responsibility for their health and well-being is highly valued in neoliberal risk contexts (Lupton).There is also a strong gendered dimensions to the visual depictions used in #Mission22. All of the Top 10 retweets feature images of men, mostly doing push-ups in groups. In the case of the second most popular retweet, it is two men in suits doing push-ups while three sexualised female singers “look-on” admiringly. Further analysis needs to be done to detail the gendered composition of movement participation, but it is interesting to speculate whether men were more likely to participate. The combination of demonstrating care for Other via a strong assertion of physical strength makes this a potentially more masculinised form of moral self-expression.Overall, Mission22 highlights how online self-work and cultivation can have a strong moral dimension. In Foucault’s language, the self-work involved in posting a video or image of yourself doing push-ups can be read as “an intensification of social relations”. It involves an ethics that is about self-creation through visual and textual depictions. Following the more pessimistic line of Bauman or Turkle, posting images of oneself doing push-ups might be seen as evidence of narcissism or a consumerist self-absorption. Rather than narcissism, we want to suggest that Mission22 highlights how a self-based moral practice – based on bodily, emotional and visual depictions – can extend to Others in an act of mutual care and exchange. Again Foucault helps clarify our argument: “the intensification of the concern for the self goes hand in hand with a valorisation of the Other”. What our work does, is show how this operates empirically on a large-scale in the new confessional contexts of Web 2.0 and its cultures of mass self-depiction. ReferencesBakardjieva, Maria, and Georgia Gaden. “Web 2.0 Technologies of the Self.” Philosophy & Technology 25.3 (2012): 399–413.Bauman, Zygmunt. Liquid Modernity. Cambridge: Polity, 2000.———. Consuming Life. Cambridge: Polity, 2007.———, and David Lyon. Liquid Surveillance. Cambridge: Polity, 2013.Beck, Ulrich, and Elizabeth Beck-Gernsheim. Individualisation. London: Sage, 2001.Bruns, Axel, and Jan-Hinrik Schmidt. “Produsage: A Closer Look at Continuing Developments.” New Review of Hypermedia and Multimedia 17.1 (2011): 3–7.Dutta-Bergman, Mohan J. “Primary Sources of Health Information: Comparisons in the Domain of Health Attitudes, Health Cognitions, and Health Behaviors.” Health Communication 16.3 (2004): 273–288.Elliott, Anthony, and Charles Lemert. The New Individualism: The Emotional Costs of Globalization. New York: Routledge, 2006.Foucault, Michel. The Care of the Self: The History of Sexuality. Vol. 3. New York: Random House, 1986.Giddens, Anthony. Modernity and Self-Identity: Self and Society in the Late Modern Age. Cambridge: Polity, 1991.Hookway, Nicholas. “The Moral Self: Class, Narcissism and the Problem of Do-It-Yourself Moralities.” The Sociological Review, 15 Mar. 2017. <http://journals.sagepub.com/doi/abs/10.1177/0038026117699540?journalCode=sora>.Jenders, Maximilian, et al. “Analyzing and Predicting Viral Tweets.” Proceedings of the 22nd International Conference on World Wide Web (WWW). Rio de Janeiro, 13-17 May 2013.Kata, Anna. “Anti-Vaccine Activists, Web 2.0, and the Postmodern Paradigm: An Overview of Tactics and Tropes Used Online by the Anti-Vaccination Movement.” Vaccine 30.25 (2012): 3778–89.Lincoln, Sian, and Brady Robards. “Editing the Project of the Self: Sustained Facebook Use and Growing Up Online.” Journal of Youth Studies 20.4 (2017): 518–531.Lupton, Deborah. The Imperative of Health: Public Health and the Regulated Body. London: Sage, 1995.Sauter, Theresa. ‘“What's on Your Mind?’ Writing on Facebook as a Tool for Self-Formation.” New Media & Society 16.5 (2014): 823–839.Sayer, Andrew. Why Things Matter to People: Social Science, Values and Ethical Life. Cambridge: Cambridge University Press, 2011.Smith, Gavin J.D., and Pat O’Malley. “Driving Politics: Data-Driven Governance and Resistance.” The British Journal of Criminology 56.1 (2016): 1–24.Turkle, Sherry. Reclaiming Conversation: The Power of Talk in a Digital Age. Penguin: New York, 2015.
APA, Harvard, Vancouver, ISO, and other styles
35

Donkers, Moniek A., Vincent J. H. S. Gilissen, Math J. J. M. Candel, Nathalie M. van Dijk, Hans Kling, Ruth Heijnen-Panis, Elien Pragt, Iwan van der Horst, Sebastiaan A. Pronk, and Walther N. K. A. van Mook. "Moral distress and ethical climate in intensive care medicine during COVID-19: a nationwide study." BMC Medical Ethics 22, no. 1 (June 17, 2021). http://dx.doi.org/10.1186/s12910-021-00641-3.

Full text
Abstract:
Abstract Background The COVID-19 pandemic has created ethical challenges for intensive care unit (ICU) professionals, potentially causing moral distress. This study explored the levels and causes of moral distress and the ethical climate in Dutch ICUs during COVID-19. Methods An extended version of the Measurement of Moral Distress for Healthcare Professionals (MMD-HP) and Ethical Decision Making Climate Questionnaire (EDMCQ) were online distributed among all 84 ICUs. Moral distress scores in nurses and intensivists were compared with the historical control group one year before COVID-19. Results Three hundred forty-five nurses (70.7%), 40 intensivists (8.2%), and 103 supporting staff (21.1%) completed the survey. Moral distress levels were higher for nurses than supporting staff. Moral distress levels in intensivists did not differ significantly from those of nurses and supporting staff. “Inadequate emotional support for patients and their families” was the highest-ranked cause of moral distress for all groups of professionals. Of all factors, all professions rated the ethical climate most positively regarding the culture of mutual respect, ethical awareness and support. “Culture of not avoiding end-of-life-decisions” and “Self-reflective and empowering leadership” received the lowest mean scores. Moral distress scores during COVID-19 were significantly lower for ICU nurses (p < 0.001) and intensivists (p < 0.05) compared to one year prior. Conclusion Levels and causes of moral distress vary between ICU professionals and differ from the historical control group. Targeted interventions that address moral distress during a crisis are desirable to improve the mental health and retention of ICU professionals and the quality of patient care.
APA, Harvard, Vancouver, ISO, and other styles
36

Heemsbergen, Luke J., Alexia Maddox, Toija Cinque, Amelia Johns, and Robert Gehl. "Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2791.

Full text
Abstract:
This issue of M/C Journal rejects the association of darkness with immorality. In digital communication, the possibilities of darkness are greater than simple fears of what is hidden in online networks. Instead, new work in an emerging field of “dark social” studies’ consider “dark” as holding the potential for autonomy away from the digital visibilities that pervade economic, political, and surveillance logics of the present age. We shall not be afraid of the dark. We start from a technical rather than moral definition of darkness (Gehl), a definition that conceives of dark spaces as having legitimacies and anonymities against structural surveillance. At the same time, breaking away from techno-centric critiques of the dark allows a humanisation of how dark is embodied and performed at individual and structural levels. Other readings of digitally mediated dark (Fisher and Bolter) suggest tensions between exploitative potentials and deep societal reflection, and the ability for a new dark age (Bridle) to allow us to explore unknown potentials. Together these perspectives allow our authors a way to use dark to question and upend the unresting pressure and acceptance of—and hierarchy given to—the light in aesthetics of power and social transformation. While we reject, however, the reduction of “dark” to “immoral” as we are not blind to “bad actors” lurking in hidden spaces (see Potter, forthcoming). Dark algorithms and their encoded biases shape our online lives. Not everyone has the ability to go off grid or create their own dark networks. Colonial settlerism often hides its brutal logics behind discourses of welfare. And some of us are forced to go dark against our will, as in the case of economies or nations being shut out of communication networks. But above all, the tensions produced in darkness, going dark, and acting dark show the normative powers beyond only focusing on the light. Taken as a whole, the articles in this issue explore the tensions between dark and connected, opting in and opting out, and exposure and retreat. They challenge binaries that reduce our vision to the monochromaticism of dark and light. They explain how the concept of “dark” expands opportunities for existence and persistence beyond datafication. They point to moral, ethical, and pragmatic responses of selves and communities seeking to be/belong in/of the dark. The issue starts with a high-stakes contest: what happens when an entire country is forced to go dark? While the articles in this issue were in review, Australian Facebook users were abruptly introduced to a unique form of darkness when, overnight, all news posts were removed from Facebook. Leaver’s feature article responds to tell the story of how Facebook and Google fought the Australian media law, and nobody won. Simply put, the platforms-cum-infrastructures did not want the government to mandate terms of their payments and business to traditional news organisations, so pulled the plug on Australia. As Leaver points out, Facebook’s cull not only made news media go dark, but in the midst of a pandemic and ongoing bushfires, prevented government agencies from posting and sharing government public health information, weather and wind patterns, and some State Emergency Services information. His article positions darkness on the spectrum from visibility to invisibility and focuses on the complex interplays of who is in control of, or has the power over, visibility. Facebook’s power to darken vital voices in society was unprecedented in Australia, a form of “de-platforming at scale” (Crawford). It seemed that Facebook (and as Leaver explains, Google, to a lesser extent) were using Australia to test platform power and legislative response. The results of this experiment, Leaver argues, was not a dawn of a new dark age—without the misinforming-glare of Facebook (see Cinque in this issue)—but confirmatory evidence of the political economy of national media: News Corp and other large traditional media companies received millions from Facebook and Google in exchange for the latter being exempt from the very law in question. Everyone won, except the Australians looking to experiment and explore alternatives in a new darkness. Scared of the dark, politicians accepted a mutually agreed transfer of ad-revenue from Google and Facebook to large and incumbent media organisations; and with that, hope of exploring a world mediated without the glare of digital incumbents was snuffed out. These agreements, of course, found user privacy, algorithmic biases, and other concerns of computational light out of scope. Playing off the themes of status quo of institutionalised social media companies, Cinque examines how social online spaces (SOS) which are governed by logics of surveillance and datafication embodied in the concept of the “gazing elite” (data aggregators including social media), can prompt anxieties for users regarding data privacy. Her work in the issue particularly observes that anxiety for many users is shaped by this manifestation of the “dark” as it relates to the hidden processes of data capture and processing by the mainstream platforms, surveillant digital objects that are incorporated into the Internet of Things, and “dark” or black boxed automated decisions which censor expression and self-representation. Against this way of conceptualising digital darkness, Cinque argues that dark SOS which use VPNs or the Tor browser to evade monitoring are valuable to users precisely because of their ability to evade the politics of visibility and resist the power of the gazing elite. Continuing away from the ubiquitous and all consuming blue glow of Facebook to more esoteric online communities, Maddox and Heemsbergen use their article to expand a critique on the normative computational logics which define the current information age (based on datafication, tracking, prediction, and surveillance of human socialities). They consider how “digging in the shadows” and “tinkering” with cryptocurrencies in the “dark” is shaping alternative futures based on social, equitable, and reciprocal relations. Their work traces cryptocurrencies—a “community generated technology” made by makers, miners and traders on darknets—from its emergence during a time of global economic upheaval, uncertainty and mistrust in centralised financial systems, through to new generations of cryptocurrencies like Dogecoin that, based on lessons from early cryptocurrencies, are mutating and becoming absorbed into larger economic structures. These themes are explored using an innovative analytical framework considering the “construction, disruption, contention, redirection, and finally absorption of emerging techno-potentials into larger structures”. The authors conclude by arguing that experiments in the dark don’t stay in the dark, but are radical potentials that impact and shape larger social forms. Bradfield and Fredericks take a step back from a focus on potentially arcane online cultures to position dark in an explicit provocation to settler politics’ fears and anxieties. They show how being dark in Australia is embodied and everyday. In doing so, they draw back the veil on the uncontested normality of fear of the dark-as-object. Their article’s examples offer a stark demonstration of how for Indigenous peoples, associations of “dark” fear and danger are built into the structural mechanisms that shape and maintain colonial understandings of Indigenous peoples and their bodies as part of larger power structures. They note activist practices that provoke settlers to confront individuals, communities, and politics that proclaim “I’m not afraid of the Dark” (see Cotes in Bradfield and Fredericks). Drawing on a related embodied refusal of poorly situated connotations of the dark, Hardley considers the embodied ways mobile media have been deployed in the urban night and observes that in darkness, and the night, while vision is obscured and other senses are heightened we also encounter enmeshed cultural relationships of darkness and danger. Drawing on the postphenomenological concept of multistability, Hardley frames engagement with mobile media as a particular kind of body-technology relation in which the same technology can be used by different people in multiple ways, as people assign different meanings to the technology. Presenting empirical research on participants’ night-time mobile media practices, Hardley analyses how users co-opt mobile media functionalities to manage their embodied experiences of the dark. The article highlights how mobile media practices of privacy and isolation in urban spaces can be impacted by geographical location and urban darkness, and are also distinctly gendered. Smith explores how conversations flow across social media platforms and messaging technologies and in and out of sight across the public domain. Darkness is the backstage where backchannel conversations take place outside of public view, in private and parochial spaces, and in the shadow spaces where communication crosses between platforms. This narrative threading view of conversation, which Smith frames as a multiplatform accomplishment, responds to the question held by so many researchers and people trying to interpret what people say in public on social media. Is what we see the tip of an iceberg or just a small blip in the ocean? From Smith’s work we can see that so much happens in the dark, beyond the gaze of the onlooker, where conversational practices move by their own logic. Smith argues that drawing on pre-digital conversational analysis techniques associated with ethnomethodology will illuminate the social logics that structure online interaction and increase our understanding of online sociality forces. Set in the context of merging platforms and the “rise of data”, Lee presents issues that undergird contemporary, globally connected media systems. In translating descriptions of complex systems, the article critically discusses the changing relational quality of “the shadow of hierarchy” and “Platform Power”. The governmental use of private platforms, and the influence it has on power and opportunity for government and civil society is prefigured. The “dark” in this work is lucidly presented as a relationality; an expression of differing values, logics, and (techno)socialities. The author finds and highlights the line between traditional notions of "infrastructure" and the workings of contemporary digital platforms which is becoming increasingly indistinct. Lee concludes by showing how the intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains where there are, as always, those that will have the advantage—and those that do not. Finally, Jethani and Fordyce present an understanding of “data provenance” as a metaphor and method both for analysing data as a social and political artefact. The authors point to the term via an inter-disciplinary history as a way to explain a custodial history of objects. They adroitly argue that in our contemporary communication environment that data is more than just a transact-able commodity. Data is vital—being acquired, shared, interpreted and re-used with significant influence and socio-technical affects. As we see in this article, the key methods that rely on the materiality and subjectivity of data extraction and interpretation are not to be ignored. Not least because they come with ethical challenges as the authors make clear. As an illuminating methodology, “data provenance” offers a narrative for data assets themselves (asking what, when, who, how, and why). In the process, the kinds of valences unearthed as being private, secret, or exclusive reveal aspects of the ‘dark’ (and ‘light’) that is the focus of this issue. References Bridle, James. New Dark Age: Technology and the End of the Future. London, UK: Verso Books, 2018. Crawford, Kate (katecrawford). “It happened: Facebook just went off the deep end in Australia. They are blocking *all* news content to Australians, and *no* Australian media can post news. This is what showdowns between states and platforms look like. It's deplatforming at scale.” 18 Feb. 2021. 22 Apr. 2021 <https://twitter.com/katecrawford/status/1362149306170368004>. Fisher, Joshua A., and Jay David Bolter. "Ethical Considerations for AR Experiences at Dark Tourism Sites." 2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct) (2018): 365-69. Gehl, Robert. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2p. The Information Society Series. Cambridge, MA: MIT Press, 2018. Potter, Martin. “Bad Actors Never Sleep: Content Manipulation on Reddit.” Eds. Toija Cinque, Robert W. Gehl, Luke Heemsbergen, and Alexia Maddox. Continuum Dark Social Special Issue (forthcoming).
APA, Harvard, Vancouver, ISO, and other styles
37

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text
Abstract:
Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisements which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.
APA, Harvard, Vancouver, ISO, and other styles
38

Alkhuzaee, Fahad Saleh, Majid Ali, Khang Wen Goh, Yaser Mohammed Al-Worafi, and Long Chiau Ming. "Situational judgment using ethical reasoning in Saudi undergraduate pharmacy students." BMC Medical Ethics 23, no. 1 (April 12, 2022). http://dx.doi.org/10.1186/s12910-022-00768-x.

Full text
Abstract:
Abstract Introduction There is a paramount need for moral development for pharmacists and pharmacy students to practice the patient-centered profession. We aimed to explore the current situational judgment utilizing ethical reasoning among undergraduate pharmacy students. Methods A set of ten ethical dilemmas, representing potential real-life situations that the students come across in the university and may face in the future as a pharmacist were developed by a team of students, academic staff, and stakeholders. These ethical dilemmas were validated, checked for accuracy, and piloted. An online questionnaire was created consisting of these ten scenarios as open-ended questions and administered to fourth year and fifth year PharmD students in a public university located at the city of Mecca, Saudi Arabia, asking them how they would react in that situation. Responses of the participants were analyzed using thematic analysis independently by four researchers and inter-rater agreement were achieved through consensus. Results Out of 205, 186 students completed the questionnaire with a response rate of 90.7%. Analysis and resulted in the generation of 32 codes, which were then categorized into seven overarching themes: student engagement, social and professional responsibility, academic integrity, legal obligation, moral obligation, signposting, and moral engagement and patient safety. Conclusions Undergraduate pharmacy students experience complex state of mind in connection with ethical reasoning. The participants’ situational judgment were driven by cultural norm, authority, and responsibility. Student engagement is also affected by the state of mind and feelings of mutual trust, perceived cultural influence and peer pressure. The students were prone to seek help from university administrators or teachers when faced with situations in which they were helpless.
APA, Harvard, Vancouver, ISO, and other styles
39

Fryer, Caroline, Andrea Sturm, Roswith Roth, and Ian Edwards. "Scarcity of resources and inequity in access are frequently reported ethical issues for physiotherapists internationally: an observational study." BMC Medical Ethics 22, no. 1 (July 20, 2021). http://dx.doi.org/10.1186/s12910-021-00663-x.

Full text
Abstract:
Abstract Background Little is known about the ethical situations which physiotherapists encounter internationally. This lack of knowledge impedes the ability of the profession to prepare and support physiotherapists in all world regions in their ethical practice. The purpose of the study was to answer the following research questions: What types of ethical issues are experienced by physiotherapists internationally? How frequently are ethical issues experienced by physiotherapists internationally? Can the frequency and type of ethical issue experienced by physiotherapists be predicted by sociodemographic, educational or vocational variables? Methods An observational study was conducted in English using an online survey from October 2018 to May 2019. Participants were 1212 physiotherapists and physiotherapy students located internationally which represented less than 1% of estimated number of physiotherapists worldwide at that time. The survey questionnaire contained 13 items requesting demographic detail and knowledge of ethical codes and decision-making, and 46 items asking what frequency participants experienced specific ethical issues in four categories: (A) Physiotherapist and patient interaction (19 items), (B) Physiotherapist and other health professionals including other physiotherapists (10 items), (C) Physiotherapists and the system (5 items) and (D) Professional and economic ethical situations (12 items). Results The two most frequently experienced ethical issues were ‘Scarce resources and time affecting quality of physiotherapy treatment’ and ‘Physiotherapy not accessible to all people in society who need it’. These items were experienced, on average, more often than monthly. Interprofessional practice also presented frequent ethical issues for participants. Ethical issues related to the context of ‘Physiotherapists and the system’ were most frequently experienced for all world regions. Working longer years in physiotherapy and learning about ethics in basic physiotherapy education was associated with participants reporting lower frequencies of ethical issues across all contexts. Conclusion This study provides the first global profile of ethical issues experienced by physiotherapists. Societal and cultural systems are key influences on physiotherapists’ ethical practice. Physiotherapists globally need support from their work organisations, academic institutions and professional associations, and robust ethical training, to assist them to be active moral agents in their practice.
APA, Harvard, Vancouver, ISO, and other styles
40

Wilson, Michael, Marie Wilson, Suzanne Edwards, Lynette Cusack, and Richard Wiechula. "Role of attitude in nurses’ responses to requests for assisted dying." Nursing Ethics, December 3, 2020, 096973302096677. http://dx.doi.org/10.1177/0969733020966777.

Full text
Abstract:
Background: Legal assisted dying is a rare event, but as legalisation expands, requests for it will likely increase, and the nurse most often receives the informal, initial request. Objectives: To assess the effects of attitude in interaction with normative and control beliefs on an intention to respond to a request for legal assisted dying. Ethical considerations: The study had the lead author’s institutional ethics approval, and participants were informed that participation was both anonymous and voluntary. Methodology: This was a cross-sectional correlational study of 377 Australian registered nurses who completed an online survey. Generalised linear modelling assessed the effects of independent variables against intended responses to requests for legal assisted dying. Results: Compared to nurses who did not support legal assisted dying, nurses who did had stronger beliefs in patient rights, perceived social expectations to refer the request and stronger control in that intention. Nurses who did not support legal assisted dying had stronger beliefs in ethics of duty to the patient and often held dual intentions to discuss the request with the patient but also held an intention to deflect the request to consideration of alternatives. Discussion: This study advances the international literature by developing quantified models explaining the complexity of nurses’ experiences with requests for an assisted death. Attitude was operationalised in interaction with other beliefs and was identified as the strongest influence on intentions, but significantly moderated by ethical norms. Conclusion: The complex of determinants of those intentions to respond to requests for an assisted death suggests they are not isolated from each other. Nurses might have distinct intentions, but they can also hold multiple intentions even when they prioritise one. These findings present opportunities to prepare nurses in a way that enhances moral resilience in the face of complex moral encounters.
APA, Harvard, Vancouver, ISO, and other styles
41

Kopczewski, Marian, and Agnieszka Napieralska. "Cyber space – risks to children and young people - research results." Scientific Journal of the Military University of Land Forces 188, no. 2 (December 31, 2018). http://dx.doi.org/10.5604/01.3001.0012.6252.

Full text
Abstract:
The 21st century is undoubtedly a period of enormous progress in the field of digital technology, a period in which the boundary between the real world and the virtual world becomes less and less visible. The Internet has undeniably become a facilitation of everyday life, since it is a tool of work, communication or a way to spend free time for many users. The virtual world is present in almost all areas of our lives, and people spend more and more time in front of the computer screens, operating websites, e-mails or social networks. Highly developed digital technology is a boon of the 21st century, but despite its numerous advantages, negative aspects are also visible. Virtual knowledge displaces physical interpersonal contacts; physical activity is replaced by spending free time in front of a computer monitor. Various threats (social, psychological, psychological, ethical and moral) resulting from modern digital technologies and the increasing degree of dependence on them are extremely significant. The authors of this article present the results of own research, aiming at making the reader aware that there are both positive and negative aspects of the virtual world.
APA, Harvard, Vancouver, ISO, and other styles
42

Mor, Yifat, and Ifat Maoz. "‘The new Middle East’: Jewish-Israeli exclusion of Palestinians in Facebook advertising." First Monday, August 31, 2019. http://dx.doi.org/10.5210/fm.v24i9.9734.

Full text
Abstract:
Previous studies have pointed to practices of disconnectivity and disengagement on Facebook, both generally (Stroud, 2010; Sunstein, 2009) and in the specific context of the Israeli society as a divided society in conflict (John and Dvir-Gvirsman, 2015; John and Gal, 2017; Gal, 2019). Our study aims to expand on these previous findings by examining practices of disconnectivity and disengagement in a different setting: among a professional group of Jewish Israeli advertisers who discuss their attempts to exclude Arab-named profiles from responding to their Facebook campaigns. The analysis focuses on a major Facebook group of social media marketing experts in Israel. This group is an open group consisting of 15,789 members, most of them Jewish-Israelis. We examined posts that were published in this group between 2013–2017 and dealt with Israeli-Arab audiences. Our findings emphasize the moral and ethical aspects of practices of disengagement and disconnectivity that — in the case studied here — help normalize and justify exclusion.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Peter. "Community without Flesh." M/C Journal 2, no. 3 (May 1, 1999). http://dx.doi.org/10.5204/mcj.1750.

Full text
Abstract:
On Wednesday 21 April the Minister for Communications, Information Technology and the Arts introduced a piece of legislation into the Australian Senate to regulate the way Australians use the Internet. This legislation is presented within Australia's existing system of content regulation, a scheme that the Minister describes is not censorship, but merely regulation (Alston 55). Underlying Senator Alston's rhetoric about the protection of children from snuff film makers, paedophiles, drug pushers and other criminals, this long anticipated bill is aimed at reducing the amount of pornographic materials available via computer networks, a censorship regime in an age when regulation and classification are the words we prefer to use when society draws the line under material we want to see, but dare not allow ourselves access to. Regardless of any noble aspirations expressed by free-speech organisations such as Electronic Frontiers Australia relating to the defence of personal liberty and freedom of expression, this legislation is about porn. Under the Bill, Australia would proscribe our citizens from accessing: explicit depictions of sexual acts between consenting adults; mild non-violent fetishes; depictions of sexual violence, coercion or non-consent of any kind; depictions of child sexual abuse, bestiality, sexual acts accompanied by offensive fetishes, or exploitative incest fantasies; unduly detailed and/or relished acts of extreme violence or cruelty; explicit or unjustifiable depictions of sexual violence against non-consenting persons; and detailed instruction or encouragement in matters of crime or violence or the abuse of proscribed drugs. (OFLC) The Australian public, as a whole, favour the availability of sexually explicit materials in some form, with OFLC data indicating a relatively high degree of public support for X rated videos, the "high end" of the porn market (Paterson et al.). In Australia strict regulation of X rated materials in conventional media has resulted in a larger illegal market for these materials than the legalised sex industries of the ACT and Northern Territory (while 1.2 million X rated videos are legally sold out of the territories, 2 million are sold illegally in other jurisdictions, according to Patten). In Australia, censorship of media content has traditionally been based on the principles of the protection of society from moral harm and individual degradation, with specific emphasis on the protection of innocents from material they are not old enough for, or mentally capable of dealing with (Joint Select Committee on Video Material). Even when governments distanced themselves from direct personal censorship (such as Don Chipp's approach to the censorship of films and books in the late 1960s and early 1970s) and shifted the rationale behind censorship from prohibition to classification, the publicly stated aims of these decisions have been the support of existing community standards, rather than the imposition of strict legalistic moral values upon an unwilling society. In the debates surrounding censorship, and especially the level of censorship applied (rather than censorship as a whole), the question "what is the community we are talking about here?" has been a recurring theme. The standards that are applied to the regulation of media content, both online and off, are often the focus of community debate (a pluralistic community that obviously lacks "standards" by definition of the word). In essence the problem of maintaining a single set of moral and ethical values for the treatment of media content is a true political dilemma: a problem that lacks any form of solution acceptable to all participants. Since the introduction of the Internet as a "mass" medium (or more appropriately, a "popular" one), government indecision about how best to treat this new technology has precluded any form or content regulation other than the ad hoc use of existing non-technologically specific law to deal with areas of criminal or legally sanctionable intent (such as the use of copyright law, or the powers under the Crimes Act relating to the improper use of telecommunications services). However, indecision in political life is often associated with political weakness, and in the face of pressure to act decisively (motivated again by "community concern"), the Federal government has decided to extend the role of the Australian Broadcasting Authority to regulate and impose a censorship regime on Australian access of morally harmful materials. It is important to note the government's intention to censor access, rather than content of the Internet. While material hosted in Australia (ignoring, of course, the "cyberspace" definitions of non-territorial existence of information stored in networks) will be censored (removed from Australia computers), the government, lacking extraterritorial powers to compel the owners of machines located offshore, intends to introduce of some form of refused access list to materials located in other nations. What is interesting to consider in this context is the way that slight shifts of definitional paradigm alter the way this legislation can be considered. If information flows (upon which late capitalism is becoming more dependent) were to be located within the context of international law governing the flow of waterways, does the decision to prevent travel of morally dubious material through Australia's informational waterways impinge upon the riparian rights of other nations (the doctrine of fair usage without impeding flow; Godana 50)? Similarly, if we take Smith's extended definition of community within electronic transactional spaces (the maintenance of members' commitment to the group, monitoring and sanctioning behaviour and the production and distribution of resources), then the current Bill proposes the regulation of the activities of one community by another (granted, a larger community that incorporates the former). Seen in this context, this legislation is the direct intervention in an established social order by a larger and less homogeneous group. It may be trite to quote the Prime Minister's view of community in this context, where he states ...It is free individuals, strong communities and the rule of law which are the best defence against the intrusive power of the state and against those who think they know what is best for everyone else. (Howard 21) possibly because the paradigm in which this new legislation is situated does not classify those Australians online (who number up to 3 million) as a community in their own right. In a way the Internet users of Australia have never identified themselves as a community, nor been asked to act in a communitarian manner. While discussions about the value of community models when applied to the Internet are still divided, there are those who argue that their use of networked services can be seen in this light (Worthington). What this new legislation does, however, is preclude the establishment of public communities in order to meet the desires of government for some limits to be placed on Internet content. The Bill does allow for the development of "restricted access systems" that would allow pluralistic communities to develop and engage in a limited amount of self-regulation. These systems include privately accessible Intranets, or sites that restrict access through passwords or some other form of age verification technique. Thus, ignoring the minimum standards that will be required for these communities to qualify for some measure of self-regulatory freedom, what is unspoken here is that specific subsections of the Internet population may exist, provided they keep well away from the public gaze. A ghetto without physical walls. Under the Bill, a co-regulatory approach is endorsed by the government, favouring the establishment of industry codes of practice by ISPs and (or) the establishment of a single code of practice by the content hosting industry (content developers are relegated to yet undetermined complementary state legislation). However, this section of the Bill, in mandating a range of minimum requirements for these codes of practice, and denying plurality to the content providers, places an administrative imperative above any communitarian spirit. That is, that the Internet should have no more than one community, it should be an entity bound by a single guiding set of principles and be therefore easier to administer by Australian censors. This administrative imperative re-encapsulates the dilemma faced by governments dealing with the Internet: that at heart, the broadcast and print press paradigms of existing censorship regimes face massive administrative problems when presented with a communications technology that allows for wholesale publication of materials by individuals. Whereas the limited numbers of broadcasters and publishers have allowed the development of Australia's system of classification of materials (on a sliding scale from G to RC classifications or the equivalent print press version), the new legislation introduced into the Senate uses the classification scheme simply as a censorship mechanism: Internet content is either "ok" or "not ok". From a public administration perspective, this allows government to drastically reduce the amount of work required by regulators and eases the burden of compliance costs by ISPs, by directing clear and unambiguous statements about the acceptability of existing materials placed online. However, as we have seen in other areas of social policy (such as the rationalisation of Social Security services or Health), administrative expedience is often antipathetic to small communities that have special needs, or cultural sensitivities outside of mainstream society. While it is not appropriate to argue that public administration creates negative social impacts through expedience, what can be presented is that, where expedience is a core aim of legislation, poor administration may result. For many Australian purveyors of pornography, my comments will be entirely unhelpful as they endeavour to find effective ways to spoof offshore hosts or bone up (no pun intended) on tunnelling techniques. Given the easy way in which material can be reconstituted and relocated on the Internet, it seems likely that some form of regulatory avoidance will occur by users determined not to have their content removed or blocked. For those regulators given the unenviable task of censoring Internet access it may be worthwhile quoting from Sexing the Cherry, in which Jeanette Winterson describes the town: whose inhabitants are so cunning that to escape the insistence of creditors they knock down their houses in a single night and rebuild them elsewhere. So the number of buildings in the city is always constant but they are never in the same place from one day to the next. (43) Thus, while Winterson saw this game as a "most fulfilling pastime", it is likely to present real administrative headaches to ABA regulators when attempting to enforce the Bill's anti-avoidance clauses. The Australian government, in adapting existing regulatory paradigms to the Internet, has overlooked the informal communities who live, work and play within the virtual world of cyberspace. In attempting to meet a perceived social need for regulation with political and administrative expedience, it has ignored the potentially cohesive role of government in developing self-regulating communities who need little government intervention to produce socially beneficial outcomes. In proscribing activity externally to the realm in which these communities reside, what we may see is a new type of community, one whose desire for a feast of flesh leads them to evade the activities of regulators who operate in the "meat" world. What this may show us is that in a virtual environment, the regulators' net is no match for a world wide web. References Alston, Richard. "Regulation is Not Censorship." The Australian 13 April 1999: 55. Paterson, K., et. al. Classification Issues: Film, Video and Television. Sydney: The Office of Film and Literature Classification, 1993. Patten, F. Personal interview. 9 Feb. 1999. Godana, B.A. Africa's Shared Water Resources: Legal and Institutional Aspects of the Nile, Niger and Senegal River Systems. London: Frances Pinter, 1985. Howard, John. The Australia I Believe In: The Values, Directions and Policy Priorities of a Coalition Government Outlined in 1995. Canberra: Liberal Party, 1995. Joint Select Committee On Video Material. Report of the Joint Select Committee On Video Material. Canberra: APGS, 1988. Office of Film and Literature Classification. Cinema & Video Ratings Guide. 1999. 1 May 1999 <http://www.oflc.gov.au/classinfo.php>. Smith, Marc A. "Voices from the WELL: The Logic of the Virtual Commons." 1998. 2 Mar. 1999 <http://www.sscnet.ucla.edu/soc/csoc/papers/voices/Voices.htm>. Winterson, Jeanette. Sexing the Cherry. New York: Vintage Books. 1991. Worthington, T. Testimony before the Senate Select Committee on Information Technologies. Unpublished, 1999. Citation reference for this article MLA style: Peter Chen. "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/bill.php>. Chicago style: Peter Chen, "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]). APA style: Author. (1999) Community without flesh: first thoughts on the new broadcasting services amendment (online services) bill 1999. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
44

Kuylen, Margot N. I., Scott Y. Kim, Alexander Ruck Keene, and Gareth S. Owen. "Should age matter in COVID-19 triage? A deliberative study." Journal of Medical Ethics, March 9, 2021, medethics—2020–107071. http://dx.doi.org/10.1136/medethics-2020-107071.

Full text
Abstract:
The COVID-19 pandemic put a large burden on many healthcare systems, causing fears about resource scarcity and triage. Several COVID-19 guidelines included age as an explicit factor and practices of both triage and ‘anticipatory triage’ likely limited access to hospital care for elderly patients, especially those in care homes. To ensure the legitimacy of triage guidelines, which affect the public, it is important to engage the public’s moral intuitions. Our study aimed to explore general public views in the UK on the role of age, and related factors like frailty and quality of life, in triage during the COVID-19 pandemic. We held online deliberative workshops with members of the general public (n=22). Participants were guided through a deliberative process to maximise eliciting informed and considered preferences. Participants generally accepted the need for triage but strongly rejected ‘fair innings’ and ‘life projects’ principles as justifications for age-based allocation. They were also wary of the ‘maximise life-years’ principle, preferring to maximise the number of lives rather than life years saved. Although they did not arrive at a unified recommendation of one principle, a concern for three core principles and values eventually emerged: equality, efficiency and vulnerability. While these remain difficult to fully respect at once, they captured a considered, multifaceted consensus: utilitarian considerations of efficiency should be tempered with a concern for equality and vulnerability. This ‘triad’ of ethical principles may be a useful structure to guide ethical deliberation as societies negotiate the conflicting ethical demands of triage.
APA, Harvard, Vancouver, ISO, and other styles
45

Popattia, Amber Salman, Laetitia Hattingh, and Adam La Caze. "Improving pharmacy practice in relation to complementary medicines: a qualitative study evaluating the acceptability and feasibility of a new ethical framework in Australia." BMC Medical Ethics 22, no. 1 (January 6, 2021). http://dx.doi.org/10.1186/s12910-020-00570-7.

Full text
Abstract:
Abstract Background There is a need for clearer guidance for pharmacists regarding their responsibilities when selling complementary medicines. A recently published ethical framework provides guidance regarding the specific responsibilities that pharmacists need to meet in order to fulfil their professional obligations and make a positive contribution to health outcomes when selling complementary medicines. Objective Evaluate the acceptability and feasibility of a new ethical framework for the sale of complementary medicines in community pharmacy. Methods Australian community pharmacists were invited to participate in online focus groups and interviews. Participants were recruited via multiple methods, including social media and the professional networks of pharmacy groups. Participants were provided the ethical framework prior to the discussion. Discussions were transcribed verbatim and analysed using thematic analysis. Results Seventeen community pharmacists participated in the study (11 in 4 focus groups and 6 in individual interviews). There was good representation among participants in terms of gender, years of practice, pharmacy location and script volume. Participants differed in how proactive they were in relation to selling and providing advice on complementary medicines, how they interpreted evidence in relation to complementary medicines, and how they navigated their practice within the retail environment of community pharmacy. The majority of participants found the framework was acceptable for practice and was feasible for implementation with targeted support. Participants identified two important areas for targeted support in implementing the framework: improved access to evidence-based information resources on complementary medicines and independent evidence-based education and training on complementary medicine for pharmacists and pharmacy support staff. Conclusion The ethical framework addresses an important gap in providing specific professional guidance to pharmacists when selling complementary medicines. The results of the study suggest that the framework may be acceptable to community pharmacists and be feasible to implement with targeted support.
APA, Harvard, Vancouver, ISO, and other styles
46

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles
47

Busse, Kristina, and Shannon Farley. "Remixing the Remix: Fannish Appropriation and the Limits of Unauthorised Use." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.659.

Full text
Abstract:
In August 2006 the LiveJournal (hereafter LJ) community sga_flashfic posted its bimonthly challenge: a “Mission Report” challenge. Challenge communities are fandom-specific sites where moderators pick a theme or prompt to which writers respond and then post their specific fan works. The terms of this challenge were to encourage participants to invent a new mission and create a piece of fan fiction in the form of a mission report from the point of view of the Stargate Atlantis team of explorers. As an alternative possibility, and this is where the trouble started, the challenge also allowed to “take another author’s story and write a report” of its mission. Moderator Cesperanza then explained, “if you choose to write a mission report of somebody else’s story, we’ll ask you to credit them, but we won’t require you to ask their permission” (sga_flashfic LJ, 21 Aug. 2006, emphasis added). Whereas most announcement posts would only gather a few comments, this reached more than a hundred responses within hours, mostly complaints. Even though the community administrators quickly backtracked and posted a revision of the challenge not 12 hours later, the fannish LiveJournal sphere debated the challenge for days, reaching far beyond the specific fandom of Stargate Atlantis to discuss the ethical questions surrounding fannish appropriation and remix. At the center of the debate were the last eight words: “we won’t require you to ask their permission.” By encouraging fans to effectively write fan fiction of fan fiction and by not requiring permission, the moderators had violated an unwritten norm within this fannish community. Like all fan communities, western media fans have developed internal rules covering everything from what to include in a story header to how long to include a spoiler warning following aired episodes (for a definition and overview of western media fandom, see Coppa). In this example, the mods violated the fannish prohibition against the borrowing of original characters, settings, plot points, or narrative structures from other fan writers without permission—even though as fan fiction, the source of the inspiration engages in such borrowing itself. These kinds of normative rules can be altered, of course, but any change requires long and involved discussions. In this essay, we look at various debates that showcase how this fan community—media fandom on LiveJournal—creates and enforces but also discusses and changes its normative behavior. Fan fiction authors’ desire to prevent their work from being remixed may seem hypocritical, but we argue that underlying these conversations are complex negotiations of online privacy and control, affective aesthetics, and the value of fan labor. This is not to say that all fan communities address issues of remixing in the same way media fandom at this point in time did nor to suggest that they should; rather, we want to highlight a specific community’s internal ethics, the fervor with which members defend their rules, and the complex arguments that evolve from all sides when rules are questioned. Moreover, we suggest that these conversations offer insight into the specific relation many fan writers have to their stories and how it may differ from a more universal authorial affect. In order to fully understand the underlying motivations and the community ethos that spawned the sga_flashfic debates, we first want to differentiate between forms of unauthorised (re)uses and the legal, moral, and artistic concerns they create. Only with a clear definition of copyright infringement and plagiarism, as well as a clear understanding of who is affected (and in what ways) in any of these cases, can we fully understand the social and moral intersection of fan remixing of fan fiction. Only when sidestepping the legal and economic concerns surrounding remix can we focus on the ethical intricacies between copyright holders and fan writers and, more importantly, within fan communities. Fan communities differ greatly over time, between fandoms, and even depending on their central social interfaces (such as con-based zines, email-based listservs, journal-based online communities, etc.), and as a result they also develop a diverse range of internal community rules (Busse and Hellekson, “Works”; Busker). Much strife is caused when different traditions and their associated mores intersect. We’d argue, however, that the issues in the case of the Stargate Atlantis Remix Challenge were less the confrontation of different communities and more the slowly changing attitudes within one. In fact, looking at media fandom today, we may already be seeing changed attitudes—even as the debates continue over remix permission and unauthorised use. Why Remixes Are Not Copyright Infringement In discussing the limits of unauthorised use, it is important to distinguish plagiarism and copyright violation from forms of remix. While we are more concerned with the ethical issues surrounding plagiarism, we want to briefly address copyright infringement, simply because it often gets mixed into the ethics of remixes. Copyright is strictly defined as a matter of law; in many of the online debates in media fandom, it is often further restricted to U.S. Law, because a large number of the source texts are owned by U.S. companies. According to the U.S. Constitution (Article I, Section 8), Congress has the power to secure an “exclusive Right” “for limited Times.” Given that intellectual property rights have to be granted and are limited, legal scholars read this statute as a delicate balance between offering authors exclusive rights and allowing the public to flourish by building on these works. Over the years, however, intellectual property rights have been expanded and increased at the expense of the public commons (Lessig, Boyle). The main exception to this exclusive right is the concept of “fair use,” defined as use “for purposes such as criticism, comment, news reporting, teaching..., scholarship, or research” (§107). Case law circumscribes the limits of fair use, distinguishing works that are merely “derivative” from those that are “transformative” and thus add value (Chander and Sunder, Fiesler, Katyal, McCardle, Tushnet). The legal status of fan fiction remains undefined without a specific case that would test the fair use doctrine in regards to fan fiction, yet fair use and fan fiction advocates argue that fan fiction should be understood as eminently transformative and thus protected under fair use. The nonprofit fan advocacy group, the Organization for Transformative Works, in fact makes clear its position by including the legal term in their name, reflecting a changing understanding of both fans and scholars. Why Remixes Are Not Plagiarism Whereas copyright infringement is a legal concept that punishes violations between fan writers and commercial copyright holders, plagiarism instead is defined by the norms of the audience for which a piece is written: definitions of plagiarism thus differ from academic to journalist to literary contexts. Within fandom one of the most blatant (and most easily detectable) forms of plagiarism is when a fan copies another work wholesale and publishes it under their own name, either within the same fandom or by simply searching and replacing names to make it fit another fandom. Other times, fan writers may take selections of published pro or fan fiction and insert them into their works. Within fandom accusations of plagiarism are taken seriously, and fandom as a whole polices itself with regards to plagiarism: the LiveJournal community stop_plagiarism, for example, was created in 2005 specifically to report and pursue accusations of plagiarism within fandom. The community keeps a list of known plagiarisers that include the names of over 100 fan writers. Fan fiction plagiarism can only be determined on a case-by-case basis—and fans remain hypervigilant simply because they are all too often falsely accused as merely plagiarising when instead they are interpreting, translating, and transforming. There is another form of fannish offense that does not actually constitute plagiarism but is closely connected to it, namely the wholesale reposting of stories with attributions intact. This practice is frowned upon for two main reasons. Writers like to maintain at least some control over their works, often deriving from anxieties over being able to delete one’s digital footprint if desired or necessary. Archiving stories without authorial permission strips authors of this ability. More importantly, media fandom is a gift economy, in which labor is not reimbursed economically but rather rewarded with feedback (such as comments and kudos) and the growth of a writer’s reputation (Hellekson, Scott). Hosting a story in a place where readers cannot easily give thanks and feedback to the author, the rewards for the writer’s fan labor are effectively taken from her. Reposting thus removes the story from the fannish gift exchange—or, worse, inserts the archivist in lieu of the author as the recipient of thanks and comments. Unauthorised reposting is not plagiarism, as the author’s name remains attached, but it tends to go against fannish mores nonetheless as it deprives the writer of her “payment” of feedback and recognition. When Copyright Holders Object to Fan Fiction A small group of professional authors vocally proclaim fan fiction as unethical, illegal, or both. In her “Fan Fiction Rant” Robin Hobbs declares that “Fan fiction is to writing what a cake mix is to gourmet cooking” and then calls it outright theft: “Fan fiction is like any other form of identity theft. It injures the name of the party whose identity is stolen.” Anne Rice shares her feelings about fan fiction on her web site with a permanent message: “I do not allow fan fiction. The characters are copyrighted. It upsets me terribly to even think about fan fiction with my characters. I advise my readers to write your own original stories with your own characters. It is absolutely essential that you respect my wishes.” Diana Gabaldon calls fan fiction immoral and describes, “it makes me want to barf whenever I’ve inadvertently encountered some of it involving my characters.” Moreover, in a move shared by other anti-fan fiction writers, she compares her characters to family members: “I wouldn’t like people writing sex fantasies for public consumption about me or members of my family—why would I be all right with them doing it to the intimate creations of my imagination and personality?” George R.R. Martin similarly evokes familial intimacy when he writes, “My characters are my children, I have been heard to say. I don’t want people making off with them.” What is interesting in these—and other authors’—articulations of why they disapprove of fan fiction of their works is that their strongest and ultimate argument is neither legal nor economic reasoning but an emotional plea: being a good fan means coloring within the lines laid out by the initial creator, putting one’s toys back exactly as one found them, and never ever getting creative or transformative with them. Many fan fiction writers respect these wishes and do not write in book fandoms where the authors have expressed their desires clearly. Sometimes entire archives respect an author’s desires: fanfiction.net, the largest repository of fic online, removed all stories based on Rice’s work and does not allow any new ones to be posted. However, fandom is a heterogeneous culture with no centralised authority, and it is not difficult to find fic based on Rice’s characters and settings if one knows where to look. Most of these debates are restricted to book fandoms, likely for two reasons: (1) film and TV fan fiction alters the medium, so that there is no possibility that the two works might be mistaken for one another; and (2) film and TV authorship tends to be collaborative and thus lowers the individual sense of ownership (Mann, Sellors). How Fannish Remixes Are like Fan Fiction Most fan fiction writers strongly dismiss accusations of plagiarism and theft, two accusations that all too easily are raised against fan fiction and yet, as we have shown, such accusations actually misdefine terms. Fans extensively debate the artistic values of fan fiction, often drawing from classical literary discussions and examples. Clearly echoing Wilde’s creed that “there is no such thing as a moral or immoral book,” Kalichan, for example, argues in one LJ conversation that “whenever I hear about writers asserting that other writing is immoral, I become violently ill. Aside from this, morality & legality are far from necessarily connected. Lots of things are immoral and legal, illegal and moral and so on, in every permutation imaginable, so let’s just not confuse the two, shall we” (Kalichan LJ, 3 May 2010). Aja Romano concludes an epic list of remixed works ranging from the Aeneid to The Wind Done Gone, from All’s Well That Ends Well to Wicked with a passionate appeal to authors objecting to fan fiction: the story is not defined by the barriers you place around it. The moment you gave it to us, those walls broke. You may hate the fact people are imagining more to your story than what you put there. But if I were you, I’d be grateful that I got the chance to create a story that has a culture around it, a story that people want to keep talking about, reworking, remixing, living in, fantasizing about, thinking about, writing about. (Bookshop LJ, 3 May 2010)Many fan writers view their own remixes as part of a larger cultural movement that appropriates found objects and culturally relevant materials to create new things, much like larger twentieth century movements that include Dada and Pop Art, as well as feminist and postcolonial challenges to the literary canon. Finally, fan fiction partakes in 21st century ideas of social anarchy to create a cultural creative commons of openly shared ideas. Fan Cupidsbow describes strong parallels and cross-connection between all sorts of different movements, from Warhol to opensource, DeviantArt to AMV, fanfiction to mashups, sampling to critique and review. All these things are about how people are interacting with technology every day, and not just digital technology, but pens and paper and clothes and food fusions and everything else. (Cupidsbow LJ, 20 May 2009) Legally, of course, these reuses of collectively shared materials are often treated quite differently, which is why fan fiction advocates often maintain that all remixes be treated equally—regardless of whether their source text is film, TV, literature, or fan fiction. The Archive of Our Own, a project of the Organization for Transformative Works, for example, does not distinguish in its Content and Abuse Policy section between commercial and fan works in regard to plagiarism and copyright. Returning to the initial case of the Stargate Atlantis Mission Report Challenge, we can thus see how the moderator clearly positions herself within a framework that considers all remixes equally remixable. Even after changing the guidelines to require permission for the remixing of existing fan stories, moderator Cesperanza notes that she “remain[s] philosophically committed to the idea that people have the right to make art based on other art provided that due credit is given the original artist” (sga_flashfic LJ, 21 Aug. 2006). Indeed, other fans agree with her position in the ensuing discussions, drawing attention to the hypocrisy of demanding different rules for what appears to be the exact same actions: “So explain to me how you can defend fanfiction as legitimate derivative work if it’s based on one type of source material (professional writing or TV shows), yet decry it as ‘stealing’ and plagiarism if it’s based on another type of source material (fanfiction)” (Marythefan LJ, 21 Aug. 2006). Many fans assert that all remixes should be tolerated by the creators of their respective source texts—be they pro or fan. Fans expect Rowling to be accepting of Harry Potter’s underage romance with a nice and insecure Severus Snape, and they expect Matthew Weiner to be accepting of stories that kill off Don Draper and have his (ex)wives join a commune together. So fans should equally accept fan fiction that presents the grand love of Rodney McKay and John Sheppard, the most popular non-canonical fan fiction pairing on Stargate Atlantis, to be transformed into an abusive and manipulative relationship or rewritten with one of them dying tragically. Lydiabell, for example, argues that “there’s [no]thing wrong with creating a piece of art that uses elements of another work to create something new, always assuming that proper credit is given to the original... even if your interpretation is at odds with everything the original artist wanted to convey” (Lydiabell LJ, 22 Aug. 2006). Transforming works can often move them into territory that is critical of the source text, mocks the source text, rearranges relationships, and alters characterisations. It is here that we reach the central issue of this article: many fans indeed do view intrafandom interactions as fundamentally different to their interactions with professional authors or commercial entertainment companies. While everyone agrees that there are no legal, economic, or even ultimately moral arguments to be made against remixing fan fiction (because any such argument would nullify the fan’s right to create their fan fiction in the first place), the discourses against open remixing tend to revolve around community norms, politeness, and respect. How Fannish Remixes Are Not like Fan Fiction At the heart of the debate lie issues of community norms: taking another fan’s stories as the basis for one’s own fiction is regarded as a violation of manners, at least the way certain sections of the community define them. This, in fact, is not unlike the way many fan academics engage with fandom research. While it may be perfectly legal to directly cite fans’ blog posts, and while it may even be in compliance with institutional ethical research requirements (such as Internal Review Boards at U.S. universities), the academic fan writing about her own community may indeed choose to take extra precautions to protect herself and that community. As Kristina Busse and Karen Hellekson have argued, fan studies often exists at the intersection of language and social studies, and thus written text may simultaneously be treated as artistic works and as utterances by human subjects (“Identity”). In this essay (and elsewhere), we thus limit direct linking into fannish spaces, instead giving site, date, and author, and we have consent from all fans we cite in this essay. The community of fans who write fic in a particular fandom is relatively small, and most of them are familiar with each other, or can trace a connection via one or two degrees of separation only. While writing fan fiction about Harry Potter may influence the way you and your particular circle of friends interpret the novels, it is unlikely to affect the overall reception of the work. During the remix debate, fan no_pseud articulates the differing power dynamic: When someone bases fanfic on another piece of fanfic, the balance of power in the relationship between the two things is completely different to the relationship between a piece of fanfic and the canon source. The two stories have exactly equal authority, exactly equal validity, exactly equal ‘reality’ in fandom. (nopseud LJ, 21 Aug. 2006) Within fandom, there are few stories that have the kind of reach that professional fiction does, and it is just as likely that a fan will come across an unauthorised remix of a piece of fan fiction as the original piece itself. In that way, the reception of fan fiction is more fragile, and fans are justifiably anxious about it. In a recent conversation about proper etiquette within Glee fandom, fan writer flaming_muse articulates her reasons for expecting different behavior from fandom writers who borrow ideas from each other: But there’s a huge difference between fanfic of media and fanfic of other fanfic authors. Part of it is a question of the relationship of the author to the source material … but part of it is just about not hurting or diminishing the other creative people around you. We aren’t hurting Glee by writing fic in their ‘verse; we are hurting other people if we write fanfic of fanfic. We’re taking away what’s special about their particular stories and all of the work they put into them. (Stoney321 LJ, 12 Feb. 2012)Flaming_muse brings together several concepts but underlying all is a sense of community. Thus she equates remixing within the community without permission as a violation of fannish etiquette. The sense of community also plays a role in another reason given by fans who prefer permission, which is the actual ease of getting it. Many fandoms are fairly small communities, which makes it more possible to ask for permission before doing a translation, adaptation, or other kind of rewrite of another person’s fic. Often a fan may have already given feedback to the story or shared some form of conversation with the writer, so that requesting permission seems fairly innocuous. Moreover, fandom is a community based on the economy of gifting and sharing (Hellekson), so that etiquette becomes that much more important. Unlike pro authors who are financially reimbursed for their works, feedback is effectively a fan writer’s only payment. Getting comments, kudos, or recommendations for their stories are ways in which readers reward and thank the writers for their work. Many fans feel that a gift economy functions only through the goodwill of all its participants, which remixing without permission violates. How Fan Writing May Differ From Pro Writing Fans have a different emotional investment in their creations, only partially connected to writing solely for love (as opposed to professional writers who may write for love but also write for their livelihood in the best-case scenarios). One fan, who writes both pro and fan fiction, describes her more distanced emotional involvement with her professional writing as follows, When I’m writing for money, I limit my emotional investment in the material I produce. Ultimately what I am producing does not belong to me. Someone else is buying it and I am serving their needs, not my own. (St_Crispins LJ, 27 Aug. 2006)The sense of writing for oneself as part of a community also comes through in a comment by pro and fan writer Matociquala, who describes the specificity and often quite limited audience of fan fiction as follows: Fanfiction is written in the expectation of being enjoyed in an open membership but tight-knit community, and the writer has an expectation of being included in the enjoyment and discussion. It is the difference, in other words, between throwing a fair on the high road, and a party in a back yard. Sure, you might be able to see what’s going on from the street, but you’re expected not to stare. (Matociquala LJ, 18 May 2006)What we find important here is the way both writers seem to suggest that fan fiction allows for a greater intimacy and immediacy on the whole. So while not all writers write to fulfill (their own or other’s) emotional and narrative desires, this seems to be more acceptable in fan fiction. Intimacy, i.e., the emotional and, often sexual, openness and vulnerability readers and writers exhibit in the stories and surrounding interaction, can thus constitute a central aspect for readers and writers alike. Again, none of these aspects are particular to fan fiction alone, but, unlike in much other writing, they are such a central component that the stories divorced from their context—textual, social, and emotional—may not be fully comprehensible. In a discussion several years ago, Ellen Fremedon coined the term Id Vortex, by which she refers to that very tailored and customised writing that caters to the writers’ and/or readers’ kinks, that creates stories that not only move us emotionally because we already care about the characters but also because it uses tropes, characterisations, and scenes that appeal very viscerally: In fandom, we’ve all got this agreement to just suspend shame. I mean, a lot of what we write is masturbation material, and we all know it, and so we can’t really pretend that we’re only trying to write for our readers’ most rarefied sensibilities, you know? We all know right where the Id Vortex is, and we have this agreement to approach it with caution, but without any shame at all. (Ellen Fremedon LJ, 2 Dec. 2004)Writing stories for a particular sexual kink may be the most obvious way fans tailor stories to their own (or others’) desires, but in general, fan stories often seem to be more immediate, more intimate, more revealing than most published writing. This attachment is only strengthened by fans’ immense emotional attachment to the characters, as they may spend years if not decades rewatching their show, discussing all its details, and reading and writing stories upon stories. From Community to Commons These norms and mores continue to evolve as fannish activity becomes more and more visible to the mainstream, and new generations of fans enter fandom within a culture where media is increasingly spreadable across social networks and all fannish activity is collectively described and recognised as “fandom” (Jenkins, Ford, and Green). The default mode of the mainstream often treats “found” material as disseminable, and interfaces encourage such engagement by inviting users to “share” on their collection of social networks. As a result, many new fans see remixing as not only part of their fannish right, but engage in their activity on platforms that make sharing with or without attribution both increasingly easy and normative. Tumblr is the most recent and obvious example of a platform in which reblogging other users’ posts, with or without commentary, is the normative mode. Instead of (or in addition to) uploading one’s story to an archive, a fan writer might post it on Tumblr and consider reblogs as another form of feedback. In fact, our case study and its associated differentiation of legal, moral, and artistic justifications for and against remixing fan works, may indeed be an historical artifact in its own right: media fandom as a small and well-defined community of fans with a common interest and a shared history is the exception rather than the norm in today’s fan culture. When access to stories and other fans required personal initiation, it was easy to teach and enforce a community ethos. Now, however, fan fiction tops Google searches for strings that include both Harry and Draco or Spock and Uhura, and fan art is readily reblogged by sites for shows ranging from MTV’s Teen Wolf to NBC’s Hannibal. Our essay thus must be understood as a brief glimpse into the internal debates of media fans at a particular historical juncture: showcasing not only the clear separation media fan writers make between professional and fan works, but also the strong ethos that online communities can hold and defend—if only for a little while. References Boyle, James. The Public Domain: Enclosing the Commons of the Mind. Ithaca: Yale University Press, 2008. Busker, Rebecca Lucy. “On Symposia: LiveJournal and the Shape of Fannish Discourse.” Transformative Works and Cultures 1 (2008). http://journal.transformativeworks.org/index.php/twc/article/view/49. Busse, Kristina, and Karen Hellekson. “Work in Progress.” In Karen Hellekson and Kristina Busse, eds., Fan Fiction and Fan Communities in the Age of the Internet: New Essays. Jefferson, N.C.: McFarland, 2006. 5–40. Busse, Kristina, and Karen Hellekson. “Identity, Ethics, and Fan Privacy.” In Katherine Larsen and Lynn Zubernis, eds., Fan Culture: Theory/Practice. Newcastle upon Tyne: Cambridge Scholars Publishing, 2012. 38-56. Chander, Anupam, and Madhavi Sunder. “Everyone’s a Superhero: A Cultural Theory of ‘Mary Sue’ Fan Fiction as Fair Use.” California Law Review 95 (2007): 597-626. Coppa, Francesca. “A Brief History of Media Fandom.” In Karen Hellekson and Kristina Busse, eds., Fan Fiction and Fan Communities in the Age of the Internet: New Essays. Jefferson, N.C.: McFarland, 2006. 41–59. Fiesler, Casey. “Everything I Need to Know I Learned from Fandom: How Existing Social Norms Can Help Shape the Next Generation of User-Generated Content.” Vanderbilt Journal of Entertainment and Technology Law 10 (2008): 729-62. Gabaldon, Diana. “Fan Fiction and Moral Conundrums.” Voyages of the Artemis. Blog. 3 May 2010. 7 May 2010 http://voyagesoftheartemis.blogspot.com/2010/05/fan-fiction-and-moral-conundrums.html. Hellekson, Karen. “A Fannish Field of Value: Online Fan Gift Culture.” Cinema Journal 48.4 (2009): 113–18. Hobbs, Robin. “The Fan Fiction Rant.” Robin Hobb’s Home. 2005. 14 May 2006 http://www.robinhobb.com/rant.html. Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York University Press, 2013. Katyal, Sonia. “Performance, Property, and the Slashing of Gender in Fan Fiction.” Journal of Gender, Social Policy, and the Law 14 (2006): 463-518. Lessig, Lawrence. Remix: Making Art and Commerce Thrive in a Hybrid Economy. New York: Penguin, 2008. Mann, Denise. “It’s Not TV, It’s Brand Management.” In Vicki Mayer, Miranda Banks, and John Thornton Caldwell, eds., Production Studies: Cultural Studies of Media Industries. New York: Routledge, 2009. 99-114. Martin, George R.R. “Someone is Angry on the Internet.” LiveJournal. 7 May 2010. 15 May 2013. http://grrm.livejournal.com/151914.html. McCardle, Meredith. “Fandom, Fan Fiction and Fanfare: What’s All the Fuss?” Boston University Journal of Science and Technology Law 9 (2003): 443-68. Rice, Anne. “Important Message From Anne on ‘Fan Fiction’.” n.d. 15 May 2013. http://www.annerice.com/readerinteraction-messagestofans.html. Scott, Suzanne. “Repackaging Fan Culture: The Regifting Economy of Ancillary Content Models.” Transformative Works and Cultures 3 (2009). http://dx.doi.org/10.3983/twc.2009.0150. Sellors, C. Paul. Film Authorship: Auteurs and Other Myths. London: Wallflower, 2010. Tushnet, Rebecca. “Copyright Law, Fan Practices, and the Rights of the Author.” In Jonathan Gray, Cornel Sandvoss, and C. Lee Harrington, eds., Fandom: Identities and Communities in a Mediated World. New York: New York University Press, 2007. 60-71.
APA, Harvard, Vancouver, ISO, and other styles
48

Bosch, Tanja, and Herman Wasserman. "South African tabloid coverage of Covid19: The Daily Sun." Media, Culture & Society, January 17, 2023, 016344372211405. http://dx.doi.org/10.1177/01634437221140514.

Full text
Abstract:
Around the world, tabloid newspapers are routinely surrounded by a moral and cultural panic. They are criticised for lowering standards of journalism and privileging sensation above substance, diverting readers from serious news to entertainment, or foregoing ethical principles. However, scholarship about tabloids have also highlighted the ways in which these papers are frequently better attuned to their readers’ everyday lived experience. In South Africa, tabloid newspapers have also received much criticism in the past for their perceived superficial treatment of important news. This article examines South African tabloid newspapers’ coverage of the Covid-19 pandemic, focussing specifically on a case study of the national newspaper the Daily Sun. The national Daily Sun newspaper boasts the country’s largest circulation figures. Through a quantitative content analysis of 1050 online news stories in the Daily Sun, we found that unlike mainstream front-page news reporting which was largely episodic, negative and alarmist, the majority of Daily Sun coverage was thematic and neutral. Daily Sun news coverage countered Covid-19 related misinformation and provided contextual coverage, with a large focus on the social impacts of Covid-19. The analysis concludes that despite the popular discourse of the reporting, Daily Sun reporting on Covid-19 provided readers with access to information and a focus on the micro aspects of the pandemic versus broader political issues and the views of political or scientific elites.
APA, Harvard, Vancouver, ISO, and other styles
49

Fincham, Andrew, and Nicholas Burton. "Religion and social network analysis: the discipline of early modern quakers." Journal of Management History ahead-of-print, ahead-of-print (November 2, 2020). http://dx.doi.org/10.1108/jmh-02-2020-0011.

Full text
Abstract:
Purpose The importance of networks has been established in the development of commerce and capitalism, with key concepts reflecting both the dynamic and permeable characteristics of networks. Such attributes are exemplified by religious networks, which have been typically dismissed in terms of economic contribution as being both risk-averse and bounded by ethical barriers imposed by theology. This paper aims to examine the Religious Society of Friends (Quakers) in the long 18th century to evidence the multi-plexity and density of connections and suggest that adherence to the Quaker discipline acted as a trust-based attribute and substituted for repeated iteration. Design/methodology/approach The archival investigation centres upon an analysis of “The Catalogue of Quaker Writing” and a close re-reading of the seminal text “Quakers in Science and Industry”, an authoritative account of Quaker firms and families in industry and commerce. By identifying multiple possible social network connections in Raistrick’s work, this paper reviewed and analysed The Catalogue of Quaker Writing to examine the presence or absence of these connections in the Quaker network in the long 18th century. Findings This paper shows how the Quaker network was an unusually dense network that benefited co-religionists by enabling commerce through its unique topography. In a period characterized by the absence of formal institutional mechanisms to regulate behaviour, Quaker discipline acted as a quasi-regulatory mechanism to regulate membership of the network and to govern member moral behaviour. Originality/value The Quakers offer an opportunity to examine an early modern network to gain important insights into key aspects of network topography. By using social network analysis, this paper shows how Quakers performed a multiplicity of roles, which encouraged multiple modes of contact between members of the society in a dense network of contexts, which, in turn, provided high levels of connectedness between individuals. This unique range of roles, shared among a relatively small group of individuals, ensured that the degrees of separation between roles were very few; similarly, the plethora of connections resulted in a density, which not only allowed for multiple ways to engage with other individuals but also ensured no individual would become a bottle-neck or indeed a gateway that would prevent access. This unique topography was also highly unusual in that it was permeable to any aspirant member upon acceptance of the discipline – neither poverty nor lack of social status was barriers to membership. This unusual network offered atypical commercial advantages for its members.
APA, Harvard, Vancouver, ISO, and other styles
50

Davies, Hugh. "UK Research Ethics Committee’s review of the global first SARS-CoV-2 human infection challenge studies." Journal of Medical Ethics, October 5, 2021, medethics—2021–107709. http://dx.doi.org/10.1136/medethics-2021-107709.

Full text
Abstract:
This paper describes the UK Research Ethics Committee’s (REC) preparations and review of the global first SARS-CoV-2 human infection challenge studies. To frame our review, we used the WHO guidance and our UK Health Research Authority ethical review framework. The WHO criteria covered most issues we were concerned about, but we would recommend one further criterion directing RECs to consider alternative research designs. Could research questions be equally well answered by less intrusive studies? The committee met virtually, ensuring broad representation across the UK nations and also ensuring applicants could attend easily. We worked in collaboration with the applicants but while we recognise that such proximity might raise the accusation of ‘collusion’, we made every effort to maintain ‘moral distance’ and all decisions were made by the committee alone. Prior existing processes and policy facilitated training and review but even with this preparation, review took time and this could have hindered a rapid response to the emergency. Review for the various follow-on studies will now be speedier and once the pandemic has subsided, our group could be reconvened in future emergencies. In conclusion, we have tried to make decisions in good faith. We know there is controversy and disagreement and reasonable people may feel we have made the wrong decision. A more detailed analysis, built on the WHO guidance, is provided in online supplemental material.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography