To see the other types of publications on this topic, follow the link: Person re-ID models.

Journal articles on the topic 'Person re-ID models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 46 journal articles for your research on the topic 'Person re-ID models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Minghui, Yafei Zhang, and Huafeng Li. "Survey of Cross-Modal Person Re-Identification from a Mathematical Perspective." Mathematics 11, no. 3 (January 28, 2023): 654. http://dx.doi.org/10.3390/math11030654.

Full text
Abstract:
Person re-identification (Re-ID) aims to retrieve a particular pedestrian’s identification from a surveillance system consisting of non-overlapping cameras. In recent years, researchers have begun to focus on open-world person Re-ID tasks based on non-ideal situations. One of the most representative of these is cross-modal person Re-ID, which aims to match probe data with target data from different modalities. According to the modalities of probe and target data, we divided cross-modal person Re-ID into visible–infrared, visible–depth, visible–sketch, and visible–text person Re-ID. In cross-modal person Re-ID, the most challenging problem is the modal gap. According to the different methods of narrowing the modal gap, we classified the existing works into picture-based style conversion methods, feature-based modality-invariant embedding mapping methods, and modality-unrelated auxiliary information mining methods. In addition, by generalizing the aforementioned works, we find that although deep-learning-based models perform well, the black-box-like learning process makes these models less interpretable and generalized. Therefore, we attempted to interpret different cross-modal person Re-ID models from a mathematical perspective. Through the above work, we attempt to compensate for the lack of mathematical interpretation of models in previous person Re-ID reviews and hope that our work will bring new inspiration to researchers.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Fengxiang, Zhun Zhong, Hong Liu, Zheng Wang, Zhiming Luo, Shaozi Li, Nicu Sebe, and Shin'ichi Satoh. "Learning to Attack Real-World Models for Person Re-identification via Virtual-Guided Meta-Learning." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 4 (May 18, 2021): 3128–35. http://dx.doi.org/10.1609/aaai.v35i4.16422.

Full text
Abstract:
Recent advances in person re-identification (re-ID) have led to impressive retrieval accuracy. However, existing re-ID models are challenged by the adversarial examples crafted by adding quasi-imperceptible perturbations. Moreover, re-ID systems face the domain shift issue that training and testing domains are not consistent. In this study, we argue that learning powerful attackers with high universality that works well on unseen domains is an important step in promoting the robustness of re-ID systems. Therefore, we introduce a novel universal attack algorithm called ``MetaAttack'' for person re-ID. MetaAttack can mislead re-ID models on unseen domains by a universal adversarial perturbation. Specifically, to capture common patterns across different domains, we propose a meta-learning scheme to seek the universal perturbation via the gradient interaction between meta-train and meta-test formed by two datasets. We also take advantage of a virtual dataset (PersonX), instead of real ones, to conduct meta-test. This scheme not only enables us to learn with more comprehensive variation factors but also mitigates the negative effects caused by biased factors of real datasets. Experiments on three large-scale re-ID datasets demonstrate the effectiveness of our method in attacking re-ID models on unseen domains. Our final visualization results reveal some new properties of existing re-ID systems, which can guide us in designing a more robust re-ID model. Code and supplemental material are available at \url{https://github.com/FlyingRoastDuck/MetaAttack_AAAI21}.
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Yang, Hao Sheng, Shuai Wang, Yubin Wu, and Zhang Xiong. "Feature-Level Camera Style Transfer for Person Re-Identification." Applied Sciences 12, no. 14 (July 20, 2022): 7286. http://dx.doi.org/10.3390/app12147286.

Full text
Abstract:
The person re-identification (re-ID) problem has attracted growing interest in the computer vision community. Most public re-ID datasets are captured by multiple non-overlapping cameras, and the same person may appear dissimilar in different camera views due to variances of illuminations, viewpoints and postures. These differences, collectively referred to as camera style variance, make person re-ID still a challenging problem. Recently, researchers have attempted to solve this problem using generative models. The generative adversarial network (GAN) is widely used for the pose transfer or data augmentation to bridge the camera style gap. However, these methods, mostly based on image-level GAN, require huge computational power during the training of generative models. Furthermore, the training process of GAN is separated from the re-ID model, which makes it hard to achieve a global optimal for both models simultaneously. In this paper, the authors propose to alleviate camera style variance in the re-ID problem by adopting a feature-level Camera Style Transfer (CST) model, which can serve as an intra-class augmentation method and enhance the model robustness against camera style variance. Specifically, the proposed CST method transfers the camera style-related information of input features while preserving the corresponding identity information. Moreover, the training process can be embedded into the re-ID model in an end-to-end manner, which means the proposed approach can be deployed with much less time and memory cost. The proposed approach is verified on several different person re-ID baselines. Extensive experiments show the validity of the proposed CST model and its benefits for re-ID performance on the Market-1501 dataset.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Xiangping, Xiatian Zhu, Minxian Li, Pietro Morerio, Vittorio Murino, and Shaogang Gong. "Intra-Camera Supervised Person Re-Identification." International Journal of Computer Vision 129, no. 5 (February 26, 2021): 1580–95. http://dx.doi.org/10.1007/s11263-021-01440-4.

Full text
Abstract:
AbstractExisting person re-identification (re-id) methods mostly exploit a large set of cross-camera identity labelled training data. This requires a tedious data collection and annotation process, leading to poor scalability in practical re-id applications. On the other hand unsupervised re-id methods do not need identity label information, but they usually suffer from much inferior and insufficient model performance. To overcome these fundamental limitations, we propose a novel person re-identification paradigm based on an idea of independent per-camera identity annotation. This eliminates the most time-consuming and tedious inter-camera identity labelling process, significantly reducing the amount of human annotation efforts. Consequently, it gives rise to a more scalable and more feasible setting, which we call Intra-Camera Supervised (ICS) person re-id, for which we formulate a Multi-tAsk mulTi-labEl (MATE) deep learning method. Specifically, MATE is designed for self-discovering the cross-camera identity correspondence in a per-camera multi-task inference framework. Extensive experiments demonstrate the cost-effectiveness superiority of our method over the alternative approaches on three large person re-id datasets. For example, MATE yields 88.7% rank-1 score on Market-1501 in the proposed ICS person re-id setting, significantly outperforming unsupervised learning models and closely approaching conventional fully supervised learning competitors.
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Sheng, Chang Liu, Baochang Zhang, Jinhu Lü, Guodong Guo, and David Doermann. "BiRe-ID: Binary Neural Network for Efficient Person Re-ID." ACM Transactions on Multimedia Computing, Communications, and Applications 18, no. 1s (February 28, 2022): 1–22. http://dx.doi.org/10.1145/3473340.

Full text
Abstract:
Person re-identification (Re-ID) has been promoted by the significant success of convolutional neural networks (CNNs). However, the application of such CNN-based Re-ID methods depends on the tremendous consumption of computation and memory resources, which affects its development on resource-limited devices such as next generation AI chips. As a result, CNN binarization has attracted increasing attention, which leads to binary neural networks (BNNs). In this article, we propose a new BNN-based framework for efficient person Re-ID (BiRe-ID). In this work, we discover that the significant performance drop of binarized models for Re-ID task is caused by the degraded representation capacity of kernels and features. To address the issues, we propose the kernel and feature refinement based on generative adversarial learning (KR-GAL and FR-GAL) to enhance the representation capacity of BNNs. We first introduce an adversarial attention mechanism to refine the binarized kernels based on their real-valued counterparts. Specifically, we introduce a scale factor to restore the scale of 1-bit convolution. And we employ an effective generative adversarial learning method to train the attention-aware scale factor. Furthermore, we introduce a self-supervised generative adversarial network to refine the low-level features using the corresponding high-level semantic information. Extensive experiments demonstrate that our BiRe-ID can be effectively implemented on various mainstream backbones for the Re-ID task. In terms of the performance, our BiRe-ID surpasses existing binarization methods by significant margins, at the level even comparable with the real-valued counterparts. For example, on Market-1501, BiRe-ID achieves 64.0% mAP on ResNet-18 backbone, with an impressive 12.51× speedup in theory and 11.75× storage saving. In particular, the KR-GAL and FR-GAL methods show strong generalization on multiple tasks such as Re-ID, image classification, object detection, and 3D point cloud processing.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Yun-Chun, Yu-Jhe Li, Xiaofei Du, and Yu-Chiang Frank Wang. "Learning Resolution-Invariant Deep Representations for Person Re-Identification." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 8215–22. http://dx.doi.org/10.1609/aaai.v33i01.33018215.

Full text
Abstract:
Person re-identification (re-ID) solves the task of matching images across cameras and is among the research topics in vision community. Since query images in real-world scenarios might suffer from resolution loss, how to solve the resolution mismatch problem during person re-ID becomes a practical problem. Instead of applying separate image super-resolution models, we propose a novel network architecture of Resolution Adaptation and re-Identification Network (RAIN) to solve cross-resolution person re-ID. Advancing the strategy of adversarial learning, we aim at extracting resolution-invariant representations for re-ID, while the proposed model is learned in an end-to-end training fashion. Our experiments confirm that the use of our model can recognize low-resolution query images, even if the resolution is not seen during training. Moreover, the extension of our model for semi-supervised re-ID further confirms the scalability of our proposed method for real-world scenarios and applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Di, Shanshan Zhang, Wanli Ouyang, Jian Yang, and Bernt Schiele. "Hierarchical Online Instance Matching for Person Search." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 10518–25. http://dx.doi.org/10.1609/aaai.v34i07.6623.

Full text
Abstract:
Person Search is a challenging task which requires to retrieve a person's image and the corresponding position from an image dataset. It consists of two sub-tasks: pedestrian detection and person re-identification (re-ID). One of the key challenges is to properly combine the two sub-tasks into a unified framework. Existing works usually adopt a straightforward strategy by concatenating a detector and a re-ID model directly, either into an integrated model or into separated models. We argue that simply concatenating detection and re-ID is a sub-optimal solution, and we propose a Hierarchical Online Instance Matching (HOIM) loss which exploits the hierarchical relationship between detection and re-ID to guide the learning of our network. Our novel HOIM loss function harmonizes the objectives of the two sub-tasks and encourages better feature learning. In addition, we improve the loss update policy by introducing Selective Memory Refreshment (SMR) for unlabeled persons, which takes advantage of the potential discrimination power of unlabeled data. From the experiments on two standard person search benchmarks, i.e. CUHK-SYSU and PRW, we achieve state-of-the-art performance, which justifies the effectiveness of our proposed HOIM loss on learning robust features.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Menglin, Baisheng Lai, Jianqiang Huang, Xiaojin Gong, and Xian-Sheng Hua. "Camera-Aware Proxies for Unsupervised Person Re-Identification." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 4 (May 18, 2021): 2764–72. http://dx.doi.org/10.1609/aaai.v35i4.16381.

Full text
Abstract:
This paper tackles the purely unsupervised person re-identification (Re-ID) problem that requires no annotations. Some previous methods adopt clustering techniques to generate pseudo labels and use the produced labels to train Re-ID models progressively. These methods are relatively simple but effective. However, most clustering-based methods take each cluster as a pseudo identity class, neglecting the large intra-ID variance caused mainly by the change of camera views. To address this issue, we propose to split each single cluster into multiple proxies and each proxy represents the instances coming from the same camera. These camera-aware proxies enable us to deal with large intra-ID variance and generate more reliable pseudo labels for learning. Based on the camera-aware proxies, we design both intra and inter-camera contrastive learning components for our Re-ID model to effectively learn the ID discrimination ability within and across cameras. Meanwhile, a proxy-balanced sampling strategy is also designed, which facilitates our learning further. Extensive experiments on three large-scale Re-ID datasets show that our proposed approach outperforms most unsupervised methods by a significant margin. Especially, on the challenging MSMT17 dataset, we gain 14.3 percent Rank-1 and 10.2 percent mAP improvements when compared to the second place. Code is available at: https://github.com/Terminator8758/CAP-master.
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Zhao, Jiehao Liu, Tie Liu, Li Wang, and Sai Zhao. "Circle-Based Ratio Loss for Person Reidentification." Complexity 2020 (December 29, 2020): 1–11. http://dx.doi.org/10.1155/2020/9860562.

Full text
Abstract:
Person reidentification (re-id) aims to recognize a specific pedestrian from uncrossed surveillance camera views. Most re-id methods perform the retrieval task by comparing the similarity of pedestrian features extracted from deep learning models. Therefore, learning a discriminative feature is critical for person reidentification. Many works supervise the model learning with one or more loss functions to obtain the discriminability of features. Softmax loss is one of the widely used loss functions in re-id. However, traditional softmax loss inherently focuses on the feature separability and fails to consider the compactness of within-class features. To further improve the accuracy of re-id, many efforts are conducted to shrink within-class discrepancy as well as between-class similarity. In this paper, we propose a circle-based ratio loss for person re-identification. Concretely, we normalize the learned features and classification weights to map these vectors in the hypersphere. Then we take the ratio of the maximal intraclass distance and the minimal interclass distance as an objective loss, so the between-class separability and within-class compactness can be optimized simultaneously during the training stage. Finally, with the joint training of an improved softmax loss and the ratio loss, the deep model could mine discriminative pedestrian information and learn robust features for the re-id task. Comprehensive experiments on three re-id benchmark datasets are carried out to illustrate the effectiveness of the proposed method. Specially, 83.12% mAP on Market-1501, 71.70% mAP on DukeMTMC-reID, and 66.26%/63.24% mAP on CUHK03 labeled/detected are achieved, respectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Gao, Junyao, Xinyang Jiang, Huishuai Zhang, Yifan Yang, Shuguang Dou, Dongsheng Li, Duoqian Miao, Cheng Deng, and Cairong Zhao. "Similarity Distribution Based Membership Inference Attack on Person Re-identification." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 12 (June 26, 2023): 14820–28. http://dx.doi.org/10.1609/aaai.v37i12.26731.

Full text
Abstract:
While person Re-identification (Re-ID) has progressed rapidly due to its wide real-world applications, it also causes severe risks of leaking personal information from training data. Thus, this paper focuses on quantifying this risk by membership inference (MI) attack. Most of the existing MI attack algorithms focus on classification models, while Re-ID follows a totally different training and inference paradigm. Re-ID is a fine-grained recognition task with complex feature embedding, and model outputs commonly used by existing MI like logits and losses are not accessible during inference. Since Re-ID focuses on modelling the relative relationship between image pairs instead of individual semantics, we conduct a formal and empirical analysis which validates that the distribution shift of the inter-sample similarity between training and test set is a critical criterion for Re-ID membership inference. As a result, we propose a novel membership inference attack method based on the inter-sample similarity distribution. Specifically, a set of anchor images are sampled to represent the similarity distribution conditioned on a target image, and a neural network with a novel anchor selection module is proposed to predict the membership of the target image. Our experiments validate the effectiveness of the proposed approach on both the Re-ID task and conventional classification task.
APA, Harvard, Vancouver, ISO, and other styles
11

Lei, Zhou, Kangkang Yang, Kai Jiang, and Shengbo Chen. "KDAS-ReID: Architecture Search for Person Re-Identification via Distilled Knowledge with Dynamic Temperature." Algorithms 14, no. 5 (April 26, 2021): 137. http://dx.doi.org/10.3390/a14050137.

Full text
Abstract:
Person re-Identification(Re-ID) based on deep convolutional neural networks (CNNs) achieves remarkable success with its fast speed. However, prevailing Re-ID models are usually built upon backbones that manually design for classification. In order to automatically design an effective Re-ID architecture, we propose a pedestrian re-identification algorithm based on knowledge distillation, called KDAS-ReID. When the knowledge of the teacher model is transferred to the student model, the importance of knowledge in the teacher model will gradually decrease with the improvement of the performance of the student model. Therefore, instead of applying the distillation loss function directly, we consider using dynamic temperatures during the search stage and training stage. Specifically, we start searching and training at a high temperature and gradually reduce the temperature to 1 so that the student model can better learn from the teacher model through soft targets. Extensive experiments demonstrate that KDAS-ReID performs not only better than other state-of-the-art Re-ID models on three benchmarks, but also better than the teacher model based on the ResNet-50 backbone.
APA, Harvard, Vancouver, ISO, and other styles
12

Shen, Aihong, Huasheng Wang, Junjie Wang, Hongchen Tan, Xiuping Liu, and Junjie Cao. "Attention-Aware Adversarial Network for Person Re-Identification." Applied Sciences 9, no. 8 (April 14, 2019): 1550. http://dx.doi.org/10.3390/app9081550.

Full text
Abstract:
Person re-identification (re-ID) is a fundamental problem in the field of computer vision. The performance of deep learning-based person re-ID models suffers from a lack of training data. In this work, we introduce a novel image-specific data augmentation method on the feature map level to enforce feature diversity in the network. Furthermore, an attention assignment mechanism is proposed to enforce that the person re-ID classifier focuses on nearly all important regions of the input person image. To achieve this, a three-stage framework is proposed. First, a baseline classification network is trained for person re-ID. Second, an attention assignment network is proposed based on the baseline network, in which the attention module learns to suppress the response of the current detected regions and re-assign attentions to other important locations. By this means, multiple important regions for classification are highlighted by the attention map. Finally, the attention map is integrated in the attention-aware adversarial network (AAA-Net), which generates high-performance classification results with an adversarial training strategy. We evaluate the proposed method on two large-scale benchmark datasets, including Market1501 and DukeMTMC-reID. Experimental results show that our algorithm performs favorably against the state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
13

WANG, YANGPING, LI LI, JINGYU YANG, and JIANWU DANG. "PERSON RE-IDENTIFICATION BASED ON ATTENTION MECHANISM AND ADAPTIVE WEIGHTING." DYNA 96, no. 1 (March 1, 2021): 186–93. http://dx.doi.org/10.6036/9981.

Full text
Abstract:
Owing to factors such as pose change, illumination condition, background clutter, and occlusion, person re-identification (re-ID) based on video frames is a challenging task. To utilize pixel-level saliency information and discriminative local body information of the image and improve re-ID accuracy in the case of complex pose change and viewpoint difference, a person re-ID network based on attention mechanism and adaptive weight was proposed in this study. Based on the detection of human key points, an attention mechanism was integrated to screen the discriminative information in various parts of the human body. The adaptive weighting method was adopted in the network, providing the extracted local features different weights according to the discriminative information of different human parts. The re-ID accuracy of the network model was verified by experiments. Results demonstrate that the proposed network model can accurately extract the features of discriminative regions in various parts of the human body by integrating the attention mechanism and adaptive region weight, thereby improving the performance of person re-ID. Our method is compared with current widely used person re-ID network models as AACN and HAC. On the Market-1501 dataset, the Rank-1 and mAP values are improved by 4.79% and 2.78% as well as 8% and 3.52%, respectively, and on the DukeMTMC-reID dataset, by 4.92% and 3.26% as well as 5.17% and 3.17%, respectively. Compared with the previous GLAD network model, Rank-1 and mAP values on two experimental datasets are increased by more than 2%. The proposed method provides a good approach to optimize the descriptor of pedestrians for person re-ID in complex environments. Keywords: Person re-identification, Adaptive weight, Attention mechanism, Convolutional neural network
APA, Harvard, Vancouver, ISO, and other styles
14

Wu, Guile, and Shaogang Gong. "Decentralised Learning from Independent Multi-Domain Labels for Person Re-Identification." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 4 (May 18, 2021): 2898–906. http://dx.doi.org/10.1609/aaai.v35i4.16396.

Full text
Abstract:
Deep learning has been successful for many computer vision tasks due to the availability of shared and centralised large-scale training data. However, increasing awareness of privacy concerns poses new challenges to deep learning, especially for human subject related recognition such as person re-identification (Re-ID). In this work, we solve the Re-ID problem by decentralised learning from non-shared private training data distributed at multiple user sites of independent multi-domain label spaces. We propose a novel paradigm called Federated Person Re-Identification (FedReID) to construct a generalisable global model (a central server) by simultaneously learning with multiple privacy-preserved local models (local clients). Specifically, each local client receives global model updates from the server and trains a local model using its local data independent from all the other clients. Then, the central server aggregates transferrable local model updates to construct a generalisable global feature embedding model without accessing local data so to preserve local privacy. This client-server collaborative learning process is iteratively performed under privacy control, enabling FedReID to realise decentralised learning without sharing distributed data nor collecting any centralised data. Extensive experiments on ten Re-ID benchmarks show that FedReID achieves compelling generalisation performance beyond any locally trained models without using shared training data, whilst inherently protects the privacy of each local client. This is uniquely advantageous over contemporary Re-ID methods.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhu, Zhihui, Xinyang Jiang, Feng Zheng, Xiaowei Guo, Feiyue Huang, Xing Sun, and Weishi Zheng. "Viewpoint-Aware Loss with Angular Regularization for Person Re-Identification." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 13114–21. http://dx.doi.org/10.1609/aaai.v34i07.7014.

Full text
Abstract:
Although great progress in supervised person re-identification (Re-ID) has been made recently, due to the viewpoint variation of a person, Re-ID remains a massive visual challenge. Most existing viewpoint-based person Re-ID methods project images from each viewpoint into separated and unrelated sub-feature spaces. They only model the identity-level distribution inside an individual viewpoint but ignore the underlying relationship between different viewpoints. To address this problem, we propose a novel approach, called Viewpoint-Aware Loss with Angular Regularization (VA-reID). Instead of one subspace for each viewpoint, our method projects the feature from different viewpoints into a unified hypersphere and effectively models the feature distribution on both the identity-level and the viewpoint-level. In addition, rather than modeling different viewpoints as hard labels used for conventional viewpoint classification, we introduce viewpoint-aware adaptive label smoothing regularization (VALSR) that assigns the adaptive soft label to feature representation. VALSR can effectively solve the ambiguity of the viewpoint cluster label assignment. Extensive experiments on the Market1501 and DukeMTMC-reID datasets demonstrated that our method outperforms the state-of-the-art supervised Re-ID methods.
APA, Harvard, Vancouver, ISO, and other styles
16

Casao, Sara, Pablo Azagra, Ana C. Murillo, and Eduardo Montijano. "A Self-Adaptive Gallery Construction Method for Open-World Person Re-Identification." Sensors 23, no. 5 (February 28, 2023): 2662. http://dx.doi.org/10.3390/s23052662.

Full text
Abstract:
Person re-identification, or simply re-id, is the task of identifying again a person who has been seen in the past by a perception system. Multiple robotic applications, such as tracking or navigate-and-seek, use re-identification systems to perform their tasks. To solve the re-id problem, a common practice consists in using a gallery with relevant information about the people already observed. The construction of this gallery is a costly process, typically performed offline and only once because of the problems associated with labeling and storing new data as they arrive in the system. The resulting galleries from this process are static and do not acquire new knowledge from the scene, which is a limitation of the current re-id systems to work for open-world applications. Different from previous work, we overcome this limitation by presenting an unsupervised approach to automatically identify new people and incrementally build a gallery for open-world re-id that adapts prior knowledge with new information on a continuous basis. Our approach performs a comparison between the current person models and new unlabeled data to dynamically expand the gallery with new identities. We process the incoming information to maintain a small representative model of each person by exploiting concepts of information theory. The uncertainty and diversity of the new samples are analyzed to define which ones should be incorporated into the gallery. Experimental evaluation in challenging benchmarks includes an ablation study of the proposed framework, the assessment of different data selection algorithms that demonstrate the benefits of our approach, and a comparative analysis of the obtained results with other unsupervised and semi-supervised re-id methods.
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Qi, Hao Huang, Yuling Zhong, Weidong Min, Qing Han, Desheng Xu, and Changwen Xu. "Swin Transformer Based on Two-Fold Loss and Background Adaptation Re-Ranking for Person Re-Identification." Electronics 11, no. 13 (June 21, 2022): 1941. http://dx.doi.org/10.3390/electronics11131941.

Full text
Abstract:
Person re-identification (Re-ID) aims to identify the same pedestrian from a surveillance video in various scenarios. Existing Re-ID models are biased to learn background appearances when there are many background variations in the pedestrian training set. Thus, pedestrians with the same identity will appear with different backgrounds, which interferes with the Re-ID performance. This paper proposes a swin transformer based on two-fold loss (TL-TransNet) to pay more attention to the semantic information of a pedestrian’s body and preserve valuable background information, thereby reducing the interference of corresponding background appearance. TL-TransNet is supervised by two types of losses (i.e., circle loss and instance loss) during the training phase. In the retrieval phase, DeepLabV3+ as a pedestrian background segmentation model is applied to generate body masks in terms of query and gallery set. The background removal results are generated according to the mask and are used to filter out interfering background information. Subsequently, a background adaptation re-ranking is designed to combine the original information with the background-removed information, which digs out more positive samples with large background deviation. Extensive experiments on two public person Re-ID datasets testify that the proposed method achieves competitive robustness performance in terms of the background variation problem.
APA, Harvard, Vancouver, ISO, and other styles
18

Quan, Rong, Biaoyi Xu, and Dong Liang. "Discriminatively Unsupervised Learning Person Re-Identification via Considering Complicated Images." Sensors 23, no. 6 (March 20, 2023): 3259. http://dx.doi.org/10.3390/s23063259.

Full text
Abstract:
State-of-the-art purely unsupervised learning person re-ID methods first cluster all the images into multiple clusters and assign each clustered image a pseudo label based on the cluster result. Then, they construct a memory dictionary that stores all the clustered images, and subsequently train the feature extraction network based on this dictionary. All these methods directly discard the unclustered outliers in the clustering process and train the network only based on the clustered images. The unclustered outliers are complicated images containing different clothes and poses, with low resolution, severe occlusion, and so on, which are common in real-world applications. Therefore, models trained only on clustered images will be less robust and unable to handle complicated images. We construct a memory dictionary that considers complicated images consisting of both clustered and unclustered images, and design a corresponding contrastive loss by considering both kinds of images. The experimental results show that our memory dictionary that considers complicated images and contrastive loss can improve the person re-ID performance, which demonstrates the effectiveness of considering unclustered complicated images in unsupervised person re-ID.
APA, Harvard, Vancouver, ISO, and other styles
19

Song, Yihu, Shuaishi Liu, Siyang Yu, and Siyu Zhou. "Adaptive Label Allocation for Unsupervised Person Re-Identification." Electronics 11, no. 5 (March 2, 2022): 763. http://dx.doi.org/10.3390/electronics11050763.

Full text
Abstract:
Most unsupervised methods of person re-identification (Re-ID) obtain pseudo-labels through clustering. However, in the process of clustering, the hard quantization loss caused by clustering errors will make the model produce false pseudo-labels. In order to solve this problem, an unsupervised model based on softened labels training method is proposed. The innovation of this method is that the correlation among image features is used to find the reliable positive samples and train them in a smooth manner. To further explore the correlation among image features, some modules are carefully designed in this article. The dynamic adaptive label allocation (DALA) method which generates pseudo-labels of adaptive size according to different metric relationships among features is proposed. The channel attention and transformer architecture (CATA) auxiliary module is designed, which, associated with convolutional neural network (CNN), functioned as the feature extractor of the model aimed to capture long range dependencies and acquire more distinguishable features. The proposed model is evaluated on the Market-1501 and the DukeMTMC-reID. The experimental results of the proposed method achieve 60.8 mAP on Market-1501 and 49.6 mAP on DukeMTMC-reID respectively, which outperform most state-of-the-art models in fully unsupervised Re-ID task.
APA, Harvard, Vancouver, ISO, and other styles
20

Gabdullin, Nikita. "Combining Human Parsing with Analytical Feature Extraction and Ranking Schemes for High-Generalization Person Reidentification." Applied Sciences 13, no. 3 (January 18, 2023): 1289. http://dx.doi.org/10.3390/app13031289.

Full text
Abstract:
Person reidentification (re-ID) has been receiving increasing attention in recent years due to its importance for both science and society. Machine learning (particularly Deep Learning (DL)) has become the main re-ID tool that has allowed studies to achieve unprecedented accuracy levels on benchmark datasets. However, there is a known problem of poor generalization in respect of DL models. That is, models that are trained to achieve high accuracy on one dataset perform poorly on other ones and require re-training. In order to address this issue, we present a model without trainable parameters. This, in turn, results in a great potential for high generalization. Through this approach, a fully analytical feature extraction and similarity ranking scheme with DL-based human parsing is combined. Furthermore, it is used in order to obtain the initial subregion classification. We show that such combination, to a high extent, eliminates the drawbacks of existing analytical methods. In addition, we use interpretable color and texture features that have human-readable similarity measures associated with them. In order to verify the proposed method we conduct experiments on Market1501 and CUHK03 datasets, thus achieving a competitive rank-1 accuracy comparable with that of DL models. Most importantly, we show that our method achieves 63.9% and 93.5% rank-1 cross-domain accuracy when applied to transfer learning tasks, while also being completely re-ID dataset agnostic. We also achieve a cross-domain mean average precision (mAP) that is higher than that of DL models in some experiments. Moreover, we also discuss the potential ways of adding new features to further improve the model. We also show the advantages of interpretable features for the purposes of constructing human-generated queries from verbal descriptions in order to conduct searches without a query image.
APA, Harvard, Vancouver, ISO, and other styles
21

Huang, Wenxin, Xian Zhong, Xuemei Jia, Wenxuan Liu, Meng Feng, Zheng Wang, and Shin’ichi Satoh. "Vehicle Re-Identification with Spatio-Temporal Model Leveraging by Pose View Embedding." Electronics 11, no. 9 (April 24, 2022): 1354. http://dx.doi.org/10.3390/electronics11091354.

Full text
Abstract:
Vehicle re-identification (Re-ID) research has intensified as numerous advancements have been made along with the rapid development of person Re-ID. In this paper, we tackle the vehicle Re-ID problem in open scenarios. This research differs from the early-stage studies that focused on a certain view, and it faces more challenges due to view variations, illumination changes, occlusions, etc. Inspired by the research of person Re-ID, we propose leveraging pose view to enhance the discrimination performance of visual features and utilizing keypoints to improve the accuracy of pose recognition. However, the visual appearance information is still limited by the changing surroundings and extremely similar appearances of vehicles. To the best of our knowledge, few methods have been aware of the spatio-temporal information to supplement visual appearance information, but they neglect the influence of the driving direction. Considering the peculiar characteristic of vehicle movements, we observe that vehicles’ poses on camera views indicating their directions are closely related to spatio-temporal cues. Consequently, we design a two-branch framework for vehicle Re-ID, including a Keypoint-based Pose Embedding Visual (KPEV) model and a Keypoint-based Pose-Guided Spatio-Temporal (KPGST) model. These models are integrated into the framework, and the results of KPEV and KPGST are fused based on a Bayesian network. Extensive experiments performed on the VeRi-776 and VehicleID datasets related to functional urban surveillance scenarios demonstrate the competitive performance of our proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
22

Pathak, Priyank, Amir Erfan Eshratifar, and Michael Gormish. "Video Person Re-ID: Fantastic Techniques and Where to Find Them (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13893–94. http://dx.doi.org/10.1609/aaai.v34i10.7219.

Full text
Abstract:
The ability to identify the same person from multiple camera views without the explicit use of facial recognition is receiving commercial and academic interest. The current status-quo solutions are based on attention neural models. In this paper, we propose Attention and CL loss, which is a hybrid of center and Online Soft Mining (OSM) loss added to the attention loss on top of a temporal attention-based neural network. The proposed loss function applied with bag-of-tricks for training surpasses the state of the art on the common person Re-ID datasets, MARS and PRID 2011. Our source code is publicly available on github1.
APA, Harvard, Vancouver, ISO, and other styles
23

Li, Zongyi, Yuxuan Shi, Hefei Ling, Jiazhong Chen, Qian Wang, and Fengfan Zhou. "Reliability Exploration with Self-Ensemble Learning for Domain Adaptive Person Re-identification." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 2 (June 28, 2022): 1527–35. http://dx.doi.org/10.1609/aaai.v36i2.20043.

Full text
Abstract:
Person re-identifcation (Re-ID) based on unsupervised domain adaptation (UDA) aims to transfer the pre-trained model from one labeled source domain to an unlabeled target domain. Existing methods tackle this problem by using clustering methods to generate pseudo labels. However, pseudo labels produced by these techniques may be unstable and noisy, substantially deteriorating models’ performance. In this paper, we propose a Reliability Exploration with Self-ensemble Learning (RESL) framework for domain adaptive person ReID. First, to increase the feature diversity, multiple branches are presented to extract features from different data augmentations. Taking the temporally average model as a mean teacher model, online label refning is conducted by using its dynamic ensemble predictions from different branches as soft labels. Second, to combat the adverse effects of unreliable samples in clusters, sample reliability is estimated by evaluating the consistency of different clusters’ results, followed by selecting reliable instances for training and re-weighting sample contribution within Re-ID losses. A contrastive loss is also utilized with cluster-level memory features which are updated by the mean feature. The experiments demonstrate that our method can signifcantly surpass the state-of-the-art performance on the unsupervised domain adaptive person ReID.
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Xinyu, Xinlong Wang, Jia-Wang Bian, Chunhua Shen, and Mingyu You. "Diverse Knowledge Distillation for End-to-End Person Search." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 4 (May 18, 2021): 3412–20. http://dx.doi.org/10.1609/aaai.v35i4.16454.

Full text
Abstract:
Person search aims to localize and identify a specific person from a gallery of images. Recent methods can be categorized into two groups, i.e., two-step and end-to-end approaches. The former views person search as two independent tasks and achieves dominant results using separately trained person detection and re-identification (Re-ID) models. The latter performs person search in an end-to-end fashion. Although the end-to-end approaches yield higher inference efficiency, they largely lag behind those two-step counterparts in terms of accuracy. In this paper, we argue that the gap between the two kinds of methods is mainly caused by the Re-ID sub-networks of end-to-end methods. To this end, we propose a simple yet strong end-to-end network with diverse knowledge distillation to break the bottleneck. We also design a spatial-invariant augmentation to assist model to be invariant to inaccurate detection results. Experimental results on the CUHK-SYSU and PRW datasets demonstrate the superiority of our method against existing approaches -- it achieves on par accuracy with state-of-the-art two-step methods while maintaining high efficiency due to the single joint model. Code is available at: https://git.io/DKD-PersonSearch.
APA, Harvard, Vancouver, ISO, and other styles
25

Tahir, Muhammad, and Saeed Anwar. "Transformers in Pedestrian Image Retrieval and Person Re-Identification in a Multi-Camera Surveillance System." Applied Sciences 11, no. 19 (October 2, 2021): 9197. http://dx.doi.org/10.3390/app11199197.

Full text
Abstract:
Person Re-Identification is an essential task in computer vision, particularly in surveillance applications. The aim is to identify a person based on an input image from surveillance photographs in various scenarios. Most Person re-ID techniques utilize Convolutional Neural Networks (CNNs); however, Vision Transformers are replacing pure CNNs for various computer vision tasks such as object recognition, classification, etc. The vision transformers contain information about local regions of the image. The current techniques take this advantage to improve the accuracy of the tasks underhand. We propose to use the vision transformers in conjunction with vanilla CNN models to investigate the true strength of transformers in person re-identification. We employ three backbones with different combinations of vision transformers on two benchmark datasets. The overall performance of the backbones increased, showing the importance of vision transformers. We provide ablation studies and show the importance of various components of the vision transformers in re-identification tasks.
APA, Harvard, Vancouver, ISO, and other styles
26

Wu, Jingjing, Jianguo Jiang, Meibin Qi, Cuiqun Chen, and Jingjing Zhang. "An End-to-end Heterogeneous Restraint Network for RGB-D Cross-modal Person Re-identification." ACM Transactions on Multimedia Computing, Communications, and Applications 18, no. 4 (November 30, 2022): 1–22. http://dx.doi.org/10.1145/3506708.

Full text
Abstract:
The RGB-D cross-modal person re-identification (re-id) task aims to identify the person of interest across the RGB and depth image modes. The tremendous discrepancy between these two modalities makes this task difficult to tackle. Few researchers pay attention to this task, and the deep networks of existing methods still cannot be trained in an end-to-end manner. Therefore, this article proposes an end-to-end module for RGB-D cross-modal person re-id. This network introduces a cross-modal relational branch to narrow the gaps between two heterogeneous images. It models the abundant correlations between any cross-modal sample pairs, which are constrained by heterogeneous interactive learning. The proposed network also exploits a dual-modal local branch, which aims to capture the common spatial contexts in two modalities. This branch adopts shared attentive pooling and mutual contextual graph networks to extract the spatial attention within each local region and the spatial relations between distinct local parts, respectively. Experimental results on two public benchmark datasets, that is, the BIWI and RobotPKU datasets, demonstrate that our method is superior to the state-of-the-art. In addition, we perform thorough experiments to prove the effectiveness of each component in the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Fengxiang, Ke Li, Zhun Zhong, Zhiming Luo, Xing Sun, Hao Cheng, Xiaowei Guo, Feiyue Huang, Rongrong Ji, and Shaozi Li. "Asymmetric Co-Teaching for Unsupervised Cross-Domain Person Re-Identification." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 12597–604. http://dx.doi.org/10.1609/aaai.v34i07.6950.

Full text
Abstract:
Person re-identification (re-ID), is a challenging task due to the high variance within identity samples and imaging conditions. Although recent advances in deep learning have achieved remarkable accuracy in settled scenes, i.e., source domain, few works can generalize well on the unseen target domain. One popular solution is assigning unlabeled target images with pseudo labels by clustering, and then retraining the model. However, clustering methods tend to introduce noisy labels and discard low confidence samples as outliers, which may hinder the retraining process and thus limit the generalization ability. In this study, we argue that by explicitly adding a sample filtering procedure after the clustering, the mined examples can be much more efficiently used. To this end, we design an asymmetric co-teaching framework, which resists noisy labels by cooperating two models to select data with possibly clean labels for each other. Meanwhile, one of the models receives samples as pure as possible, while the other takes in samples as diverse as possible. This procedure encourages that the selected training samples can be both clean and miscellaneous, and that the two models can promote each other iteratively. Extensive experiments show that the proposed framework can consistently benefit most clustering based methods, and boost the state-of-the-art adaptation accuracy. Our code is available at https://github.com/FlyingRoastDuck/ACT_AAAI20.
APA, Harvard, Vancouver, ISO, and other styles
28

Peng, Xiting, Yichao Wang, Xiaoyu Zhang, Haibo Yang, Xiongyan Tang, and Shi Bai. "A 6G-Enabled Lightweight Framework for Person Re-Identification on Distributed Edges." Electronics 12, no. 10 (May 17, 2023): 2266. http://dx.doi.org/10.3390/electronics12102266.

Full text
Abstract:
In the upcoming 6G era, edge artificial intelligence (AI), as a key technology, will be able to deliver AI processes anytime and anywhere by the deploying of AI models on edge devices. As a hot issue in public safety, person re-identification (Re-ID) also needs its models to be urgently deployed on edge devices to realize real-time and accurate recognition. However, due to complex scenarios and other practical reasons, the performance of the re-identification model is poor in practice. This is especially the case in public places, where most people have similar characteristics, and there are environmental differences, as well other such characteristics that cause problems for identification, and which make it difficult to search for suspicious persons. Therefore, a novel end-to-end suspicious person re-identification framework deployed on edge devices that focuses on real public scenarios is proposed in this paper. In our framework, the video data are cut images and are input into the You only look once (YOLOv5) detector to obtain the pedestrian position information. An omni-scale network (OSNet) is applied through which to conduct the pedestrian attribute recognition and re-identification. Broad learning systems (BLSs) and cycle-consistent adversarial networks (CycleGAN) are used to remove the noise data and unify the style of some of the data obtained under different shooting environments, thus improving the re-identification model performance. In addition, a real-world dataset of the railway station and actual problem requirements are provided as our experimental targets. The HUAWEI Atlas 500 was used as the edge equipment for the testing phase. The experimental results indicate that our framework is effective and lightweight, can be deployed on edge devices, and it can be applied for suspicious person re-identification in public places.
APA, Harvard, Vancouver, ISO, and other styles
29

Fawad, Muhammad Jamil Khan, and MuhibUr Rahman. "Person Re-Identification by Discriminative Local Features of Overlapping Stripes." Symmetry 12, no. 4 (April 17, 2020): 647. http://dx.doi.org/10.3390/sym12040647.

Full text
Abstract:
The human visual system can recognize a person based on his physical appearance, even if extreme spatio-temporal variations exist. However, the surveillance system deployed so far fails to re-identify the individual when it travels through the non-overlapping camera’s field-of-view. Person re-identification (Re-ID) is the task of associating individuals across disjoint camera views. In this paper, we propose a robust feature extraction model named Discriminative Local Features of Overlapping Stripes (DLFOS) that can associate corresponding actual individuals in the disjoint visual surveillance system. The proposed DLFOS model accumulates the discriminative features from the local patch of each overlapping strip of the pedestrian appearance. The concatenation of histogram of oriented gradients, Gaussian of color, and the magnitude operator of CJLBP bring robustness in the final feature vector. The experimental results show that our proposed feature extraction model achieves rank@1 matching rate of 47.18% on VIPeR, 64.4% on CAVIAR4REID, and 62.68% on Market1501, outperforming the recently reported models from the literature and validating the advantage of the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
30

He, Tao, Leqi Shen, Yuchen Guo, Guiguang Ding, and Zhenhua Guo. "SECRET: Self-Consistent Pseudo Label Refinement for Unsupervised Domain Adaptive Person Re-identification." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 1 (June 28, 2022): 879–87. http://dx.doi.org/10.1609/aaai.v36i1.19970.

Full text
Abstract:
Unsupervised domain adaptive person re-identification aims at learning on an unlabeled target domain with only labeled data in source domain. Currently, the state-of-the-arts usually solve this problem by pseudo-label-based clustering and fine-tuning in target domain. However, the reason behind the noises of pseudo labels is not sufficiently explored, especially for the popular multi-branch models. We argue that the consistency between different feature spaces is the key to the pseudo labels’ quality. Then a SElf-Consistent pseudo label RefinEmenT method, termed as SECRET, is proposed to improve consistency by mutually refining the pseudo labels generated from different feature spaces. The proposed SECRET gradually encourages the improvement of pseudo labels’ quality during training process, which further leads to better cross-domain Re-ID performance. Extensive experiments on benchmark datasets show the superiority of our method. Specifically, our method outperforms the state-of-the-arts by 6.3% in terms of mAP on the challenging dataset MSMT17. In the purely unsupervised setting, our method also surpasses existing works by a large margin. Code is available at https://github.com/LunarShen/SECRET.
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Siyuan, Li Sun, and Qingli Li. "CLIP-ReID: Exploiting Vision-Language Model for Image Re-identification without Concrete Text Labels." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 1 (June 26, 2023): 1405–13. http://dx.doi.org/10.1609/aaai.v37i1.25225.

Full text
Abstract:
Pre-trained vision-language models like CLIP have recently shown superior performances on various downstream tasks, including image classification and segmentation. However, in fine-grained image re-identification (ReID), the labels are indexes, lacking concrete text descriptions. Therefore, it remains to be determined how such models could be applied to these tasks. This paper first finds out that simply fine-tuning the visual model initialized by the image encoder in CLIP, has already obtained competitive performances in various ReID tasks. Then we propose a two-stage strategy to facilitate a better visual representation. The key idea is to fully exploit the cross-modal description ability in CLIP through a set of learnable text tokens for each ID and give them to the text encoder to form ambiguous descriptions. In the first training stage, image and text encoders from CLIP keep fixed, and only the text tokens are optimized from scratch by the contrastive loss computed within a batch. In the second stage, the ID-specific text tokens and their encoder become static, providing constraints for fine-tuning the image encoder. With the help of the designed loss in the downstream task, the image encoder is able to represent data as vectors in the feature embedding accurately. The effectiveness of the proposed strategy is validated on several datasets for the person or vehicle ReID tasks. Code is available at https://github.com/Syliz517/CLIP-ReID.
APA, Harvard, Vancouver, ISO, and other styles
32

She, Liang, Meiyue You, Jianyuan Wang, and Yangyan Zeng. "Video-based Person re-identification with parallel correction and fusion of pedestrian area features." Mathematical Biosciences and Engineering 20, no. 2 (2022): 3504–27. http://dx.doi.org/10.3934/mbe.2023164.

Full text
Abstract:
<abstract><p>Deep learning has provided powerful support for person re-identification (person re-id) over the years, and superior performance has been achieved by state-of-the-art. While under practical application scenarios such as public monitoring, the cameras' resolutions are usually 720p, the captured pedestrian areas tend to be closer to $ 128\times 64 $ small pixel size. Research on person re-id at $ 128\times 64 $ small pixel size is limited by less effective pixel information. The frame image qualities are degraded and inter-frame information complementation requires a more careful selection of beneficial frames. Meanwhile, there are various large differences in person images, such as misalignment and image noise, which are harder to distinguish from person information at the small size, and eliminating a specific sub-variance is still not robust enough. The Person Feature Correction and Fusion Network (FCFNet) proposed in this paper introduces three sub-modules, which strive to extract discriminate video-level features from the perspectives of "using complementary valid information between frames" and "correcting large variances of person features". The inter-frame attention mechanism is introduced through frame quality assessment, guiding informative features to dominate the fusion process and generating a preliminary frame quality score to filter low-quality frames. Two other feature correction modules are fitted to optimize the model's ability to perceive information from small-sized images. The experiments on four benchmark datasets confirm the effectiveness of FCFNet.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
33

"Video-Based Person Re-Identification: Methods, Datasets, and Deep Learning." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 4249–54. http://dx.doi.org/10.35940/ijeat.c6524.029320.

Full text
Abstract:
Video Analytics applications like security and surveillance face a critical problem of person re-identification abbreviated as re-ID. The last decade witnessed the emergence of large-scale datasets and deep learning methods to use these huge data volumes. Most current re-ID methods are classified into either image-based or video-based re-ID. Matching persons across multiple camera views have attracted lots of recent research attention. Feature representation and metric learning are major issues for person re-identification. The focus of re-ID work is now shifting towards developing end-to-end re-Id and tracking systems for practical use with dynamic datasets. Most previous works contributed to the significant progress of person re-identification on still images using image retrieval models. This survey considers the more informative and challenging video-based person re-ID problem, pedestrian re-ID in particular. Publicly available datasets and codes are listed as a part of this work. Current trends which include open re-identification systems, use of discriminative features and deep learning is marching towards new applications in security and surveillance, typically for tracking
APA, Harvard, Vancouver, ISO, and other styles
34

Liu, Deyin, Lin (Yuanbo) Wu, Richang Hong, Zongyuan Ge, Jialie Shen, Farid Boussaid, and Mohammed Bennamoun. "Generative Metric Learning for Adversarially Robust Open-World Person Re-Identification." ACM Transactions on Multimedia Computing, Communications, and Applications, March 12, 2022. http://dx.doi.org/10.1145/3522714.

Full text
Abstract:
The vulnerability of re-identification (re-ID) models under adversarial attacks is of significant concern as criminals may use adversarial perturbations to evade surveillance systems. Unlike a closed-world re-ID setting (i.e., a fixed number of training categories), a reliable re-ID system in the open-world raises the concern of training a robust yet discriminative classifier, which still shows robustness in the context of unknown examples of an identity. In this work, we improve the robustness of open-world re-ID models by proposing a generative metric learning approach to generate adversarial examples that are regularized to produce robust distance metric. The proposed approach leverages the expressive capability of generative adversarial networks to defend the re-ID models against feature disturbance attacks. By generating the target people variants and sampling the triplet units for metric learning, our learned distance metrics are regulated to produce accurate predictions in the feature metric space. Experimental results on the three re-ID datasets, i.e., Market-1501, DukeMTMC-reID and MSMT17 demonstrate the robustness of our method.
APA, Harvard, Vancouver, ISO, and other styles
35

Domínguez-Martín, Javier, María J. Gómez-Silva, and Arturo de la Escalera. "Neural Architectures for Feature Embedding in Person Re-Identification: a comparative view." ACM Transactions on Intelligent Systems and Technology, July 21, 2023. http://dx.doi.org/10.1145/3610298.

Full text
Abstract:
Solving Person Re-Identification (Re-Id) through Deep Convolutional Neural Networks is a daunting challenge, due to the small size and variety of the training data, especially in Single-Shot Re-Id, where only two images per person are available. The lack of training data causes the overfitting of the deep neural models, leading to degenerated performance. This article explores a wide assortment of neural architectures that have been commonly used for object classification and analyses their suitability in a Re-Id model. These architectures have been trained through a Triplet Model, and evaluated over two challenging Single-Shot Re-Id datasets, PRID2011 and CUHK. This comparative study is aimed at obtaining the best-performing architectures, and some concluding guidance to optimize the features embedding for the Re-Identification task. The obtained results present Inception-Resnet and DenseNet as potentially useful models, especially when compared with other methods, specifically designed for solving Re-Id.
APA, Harvard, Vancouver, ISO, and other styles
36

Xu, Xin, Xin Yuan, Zheng Wang, Kai Zhang, and Ruimin Hu. "Rank-in-Rank Loss for Person Re-identification." ACM Transactions on Multimedia Computing, Communications, and Applications, April 30, 2022. http://dx.doi.org/10.1145/3532866.

Full text
Abstract:
Person re-identification (re-ID) is commonly investigated as a ranking problem. However, the performance of existing re-ID models drops dramatically, when they encounter extreme positive-negative class imbalance ( e.g., very small ratio of positive and negative samples) during training. To alleviate this problem, this paper designs a rank-in-rank loss to optimize the distribution of feature embeddings. Specifically, we propose a Differentiable Retrieval-Sort Loss (DRSL) to optimize the re-ID model by ranking each positive sample ahead of the negative samples according to the distance and sorting the positive samples according to the angle ( e.g., similarity score). The key idea of the proposed DRSL lies in minimizing the distance between samples of the same category along with the angle between them. Considering that the ranking and sorting operations are non-differentiable and non-convex, the DRSL also performs the optimization of automatic derivation and backpropagation. In addition, the analysis of the proposed DRSL is provided to illustrate that the DRSL not only maintains the inter-class distance distribution, but also preserves the intra-class similarity structure in terms of angle constraints. Extensive experimental results indicate that the proposed DRSL can improve the performance of the state-of-the-art re-ID models, thus demonstrating its effectiveness and superiority on the re-ID task.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Yue, Fanghui Zhang, Yi Jin, Yigang Cen, Viacheslav Voronin, and Shaohua Wan. "Local Correlation Ensemble with GCN based on Attention Features for Cross-domain Person Re-ID." ACM Transactions on Multimedia Computing, Communications, and Applications, June 9, 2022. http://dx.doi.org/10.1145/3542820.

Full text
Abstract:
Person re-identification (Re-ID) has achieved great success in single-domain. However, it remains a challenging task to adapt a Re-ID model trained on one dataset to another one. Unsupervised domain adaption (UDA) was proposed to migrate a model from a labeled source domain to an unlabeled target domain. The main difference in the cross-domain is different background styles. Although the style transfer approach effectively reduces inter-domain gaps, it ignores the reduction of intra-class differences. Clustering-based pipelines maintain state-of-the-art performance for UDA by learning domain-independent features; however, most existing models do not sufficiently exploit the rich unlabeled samples in target domains due to unsatisfactory clustering. Thus, we propose a novel local correlation ensemble (LCE) model that focuses on the diversity of intra-class information and the reliability of class centers. Specifically, a pedestrian attention (PA) module is proposed to enable the encoder to pay more attention to the person’s features to relieve interference caused by the shared background style. Furthermore, we propose a priority-distance graph convolutional network (PDGCN) module, which employs a GCN network to predict the priority of a node as a class center, and then calculates the distance between nodes with high priority values to screen out the class center nodes. Finally, the encoder features (local) and PDGCN features (context-aware) are combined to perform person Re-ID. The results of experiments on the large-scale public Re-ID datasets verified the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
38

Nguyen, Ha X., Dong N. Hoang, Thang V. Nguyen, Tuan M. Dang, An D. Pham, and Duc-Toan Nguyen. "Person re-identification from multiple surveillance cameras combining face and body feature matching." Modern Physics Letters B, February 22, 2023. http://dx.doi.org/10.1142/s0217984923400316.

Full text
Abstract:
In this work, a new method for human re-identification (Re-ID) from multiple surveillance cameras is proposed. Unlike traditional methods in which only the body features are used for matching, our proposed method uses both body and facial features for the Re-ID process. This combination allows us to re-identify people in challenging conditions, such as people with a uniform or similar-looking outfit, a partial or occluded body, appearance changes, or illumination. The face and body feature extraction models were developed using the state-of-the-art deep neural backbones and the synthesis of existing datasets in the literature. The performance of the method was evaluated on a self-generated dataset, which contains images under challenging conditions. The evaluation results show that our method outperforms traditional methods, in which the accuracy Rank1 reaches 91.30% while the traditional ones have a Rank1 of only 86.96%. This newly introduced method can be used for many practical applications in security surveillance of buildings and offices where challenging conditions often appear.
APA, Harvard, Vancouver, ISO, and other styles
39

Tang, Geyu, Xingyu Gao, and Zhenyu Chen. "Learning Semantic Representation on Visual Attribute Graph for Person Re-Identification and Beyond." ACM Transactions on Multimedia Computing, Communications, and Applications, March 27, 2023. http://dx.doi.org/10.1145/3487044.

Full text
Abstract:
Person re-identification (re-ID) aims to match pedestrian pairs captured from different cameras. Recently, various attribute based models have been proposed to combine the pedestrian attribute as an auxiliary semantic information in order to learn a more discriminative pedestrian representation. However, these methods usually directly concatenate the visual branch and attribute branch embeddings as the final pedestrian representation, which ignores the semantic relation between the pedestrian revealed by attribute similarity. To capture and explore such semantic relation, we propose an unified pedestrian representation framework, called Visual Attribute Graph Embedding Network (VAGEN), to simultaneously learn attribute and visual representation. We unify the visual embedding and attribute similarity into a Visual Attribute Graph (VAG), where pedestrian is considered as a node and attribute similarity as an edge. Then, we learn graph node embedding to generate pedestrian representation through Graph Neural Network. Except for this unified representation for visual and attribute embeddings, VAGEN also conducts implicitly hard example mining for visual similar false positive results, which has not been explored yet among existing attribute based methods. We conduct extensive empirical studies on several person re-ID datasets to evaluate our proposed algorithm from different aspects. The results show that our proposed method outperforms state-of-the-art techniques with considerable margins.
APA, Harvard, Vancouver, ISO, and other styles
40

Schweighofer, Nicolas, Dongze Ye, Haipeng Luo, David Z. D’Argenio, and Carolee Winstein. "Long-term forecasting of a motor outcome following rehabilitation in chronic stroke via a hierarchical bayesian dynamic model." Journal of NeuroEngineering and Rehabilitation 20, no. 1 (June 29, 2023). http://dx.doi.org/10.1186/s12984-023-01202-y.

Full text
Abstract:
Abstract Background Given the heterogeneity of stroke, it is important to determine the best course of motor therapy for each patient, i.e., to personalize rehabilitation based on predictions of long-term outcomes. Here, we propose a hierarchical Bayesian dynamic (i.e., state-space) model (HBDM) to forecast long-term changes in a motor outcome due to rehabilitation in the chronic phase post-stroke. Methods The model incorporates the effects of clinician-supervised training, self-training, and forgetting. In addition, to improve forecasting early in rehabilitation, when data are sparse or unavailable, we use the Bayesian hierarchical modeling technique to incorporate prior information from similar patients. We use HBDM to re-analyze the Motor Activity Log (MAL) data of participants with chronic stroke included in two clinical trials: (1) the DOSE trial, in which participants were assigned to a 0, 15, 30, or 60-h dose condition (data of 40 participants analyzed), and (2) the EXCITE trial, in which participants were assigned a 60-h dose, in either an immediate or a delayed condition (95 participants analyzed). Results For both datasets, HBDM accounts well for individual dynamics in the MAL during and outside of training: mean RMSE = 0.28 for all 40 DOSE participants (participant-level RMSE 0.26 ± 0.19—95% CI) and mean RMSE = 0.325 for all 95 EXCITE participants (participant-level RMSE 0.32 ± 0.31), which are small compared to the 0-5 range of the MAL. Bayesian leave-one-out cross-validation shows that the model has better predictive accuracy than static regression models and simpler dynamic models that do not account for the effect of supervised training, self-training, or forgetting. We then showcase model’s ability to forecast the MAL of “new” participants up to 8 months ahead. The mean RMSE at 6 months post-training was 1.36 using only the baseline MAL and then decreased to 0.91, 0.79, and 0.69 (respectively) with the MAL following the 1st, 2nd, and 3rd bouts of training. In addition, hierarchical modeling improves prediction for a patient early in training. Finally, we verify that this model, despite its simplicity, can reproduce previous findings of the DOSE trial on the efficiency, efficacy, and retention of motor therapy. Conclusions In future work, such forecasting models can be used to simulate different stages of recovery, dosages, and training schedules to optimize rehabilitation for each person. Trial registration This study contains a re-analysis of data from the DOSE clinical trial ID NCT01749358 and the EXCITE clinical trial ID NCT00057018
APA, Harvard, Vancouver, ISO, and other styles
41

Simpson, Catherine. "Cars, Climates and Subjectivity: Car Sharing and Resisting Hegemonic Automobile Culture?" M/C Journal 12, no. 4 (September 3, 2009). http://dx.doi.org/10.5204/mcj.176.

Full text
Abstract:
Al Gore brought climate change into … our living rooms. … The 2008 oil price hikes [and the global financial crisis] awakened the world to potential economic hardship in a rapidly urbanising world where the petrol-driven automobile is still king. (Mouritz 47) Six hundred million cars (Urry, “Climate Change” 265) traverse the world’s roads, or sit idly in garages and clogging city streets. The West’s economic progress has been built in part around the success of the automotive industry, where the private car rules the spaces and rhythms of daily life. The problem of “automobile dependence” (Newman and Kenworthy) is often cited as one of the biggest challenges facing countries attempting to combat anthropogenic climate change. Sociologist John Urry has claimed that automobility is an “entire culture” that has re-defined movement in the contemporary world (Urry Mobilities 133). As such, it is the single most significant environmental challenge “because of the intensity of resource use, the production of pollutants and the dominant culture which sustains the major discourses of what constitutes the good life” (Urry Sociology 57-8). Climate change has forced a re-thinking of not only how we produce and dispose of cars, but also how we use them. What might a society not dominated by the private, petrol-driven car look like? Some of the pre-eminent writers on climate change futures, such as Gwynne Dyer, James Lovelock and John Urry, discuss one possibility that might emerge when oil becomes scarce: societies will descend into civil chaos, “a Hobbesian war of all against all” where “regional warlordism” and the most brutish, barbaric aspects of human nature come to the fore (Urry, “Climate Change” 261). Discussing a post-car society, John Urry also proffers another scenario in his “sociologies of the future:” an Orwellian “digital panopticon” in which other modes of transport, far more suited to a networked society, might emerge on a large scale and, in the long run, “might tip the system” into post-car one before it is too late (Urry, “Climate Change” 261). Amongst the many options he discusses is car sharing. Since its introduction in Germany more than 30 years ago, most of the critical literature has been devoted to the planning, environmental and business innovation aspects of car sharing; however very little has been written on its cultural dimensions. This paper analyses this small but developing trend in many Western countries, but more specifically its emergence in Sydney. The convergence of climate change discourse with that of the global financial crisis has resulted in a focus in the mainstream media, over the last few months, on technologies and practices that might save us money and also help the environment. For instance, a Channel 10 News story in May 2009 focused on the boom in car sharing in Sydney (see: http://www.youtube.com/watch? v=EPTT8vYVXro). Car sharing is an adaptive technology that doesn’t do away with the car altogether, but rather transforms the ways in which cars are used, thought about and promoted. I argue that car sharing provides a challenge to the dominant consumerist model of the privately owned car that has sustained capitalist structures for at least the last 50 years. In addition, through looking at some marketing and promotion tactics of car sharing in Australia, I examine some emerging car sharing subjectivities that both extend and subvert the long-established discourses of the automobile’s flexibility and autonomy to tempt monogamous car buyers into becoming philandering car sharers. Much literature has emerged over the last decade devoted to the ubiquitous phenomenon of automobility. “The car is the literal ‘iron cage’ of modernity, motorised, moving and domestic,” claims Urry (“Connections” 28). Over the course of twentieth century, automobility became “the dominant form of daily movement over much of the planet (dominating even those who do not move by cars)” (Paterson 132). Underpinning Urry’s prolific production of literature is his concept of automobility. This he defines as a complex system of “intersecting assemblages” that is not only about driving cars but the nexus between “production, consumption, machinic complexes, mobility, culture and environmental resource use” (Urry, “Connections” 28). In addition, Matthew Paterson, in his Automobile Politics, asserts that “automobility” should be viewed as everything that makes driving around in a car possible: highways, parking structures and traffic rules (87). While the private car seems an inevitable outcome of a capitalistic, individualistic modern society, much work has gone into the process of naturalising a dominant notion of automobility on drivers’ horizons. Through art, literature, popular music and brand advertising, the car has long been associated with seductive forms of identity, and societies have been built around a hegemonic culture of car ownership and driving as the pre-eminent, modern mode of self-expression. And more than 50 years of a popular Hollywood film genre—road movies—has been devoted to glorifying the car as total freedom, or in its more nihilistic version, “freedom on the road to nowhere” (Corrigan). As Paterson claims, “autonomous mobility of car driving is socially produced … by a range of interventions that have made it possible” (18). One of the main reasons automobility has been so successful, he claims, is through its ability to reproduce capitalist society. It provided a commodity around which a whole set of symbols, images and discourses could be constructed which served to effectively legitimise capitalist society. (30) Once the process is locked-in, it then becomes difficult to reverse as billions of agents have adapted to it and built their lives around “automobility’s strange mixture of co-ercion and flexibility” (Urry, “Climate Change” 266). The Decline of the Car Globally, the greatest recent rupture in the automobile’s meta-narrative of success came about in October 2008 when three CEOs from the major US car firms (General Motors, Ford and Chrysler) begged the United States Senate for emergency loan funds to avoid going bankrupt. To put the economic significance of this into context, Emma Rothschild notes “when the listing of the ‘Fortune 500’ began in 1955, General Motors was the largest American corporation, and it was one of the three largest, measured in revenues, every year until 2007” (Rothschilds, “Can we transform”). Curiously, instead of focusing on the death of the car (industry), as we know it, that this scenario might inevitably herald, much of the media attention focused on the hypocrisy and environmental hubris of the fact that all the CEOs had flown in private luxury jets to Washington. “Couldn’t they have at least jet-pooled?” complained one Democrat Senator (Wutkowski). In their next visit to Washington, most of them drove up in experimental vehicles still in pre-production, including plug-in hybrids. Up until that point no other manufacturing industry had been bailed out in the current financial crisis. Of course it’s not the first time the automobile industries have been given government assistance. The Australian automotive industry has received on-going government subsidies since the 1980s. Most recently, PM Kevin Rudd granted a 6.2 billion dollar ‘green car’ package to Australian automotive manufacturers. His justification to the growing chorus of doubts about the economic legitimacy of such a move was: “Some might say it's not worth trying to have a car industry, that is not my view, it is not the view of the Australian government and it never will be the view of any government which I lead” (The Australian). Amongst the many reasons for the government support of these industries must include the extraordinary interweaving of discourses of nationhood and progress with the success of the car industry. As the last few months reveal, evidently the mantra still prevails of “what’s good for the country is good for GM and vice versa”, as the former CEO of General Motors, Charles “Engine” Wilson, argued back in 1952 (Hirsch). In post-industrial societies like Australia it’s not only the economic aspects of the automotive industries that are criticised. Cars seem to be slowly losing their grip on identity-formation that they managed to maintain throughout “the century of the car” (Gilroy). They are no longer unproblematically associated with progress, freedom, youthfulness and absolute autonomy. The decline and eventual death of the automobile as we know it will be long, arduous and drawn-out. But there are some signs of a post-automobile society emerging, perhaps where cars will still be used but they will not dominate our society, urban space and culture in quite the same way that they have over the last 50 years. Urry discusses six transformations that might ‘tip’ the hegemonic system of automobility into a post-car one. He mentions new fuel systems, new materials for car construction, the de-privatisation of cars, development of communications technologies and integration of networked public transport through smart card technology and systems (Urry, Mobilities 281-284). As Paterson and others have argued, computers and mobile phones have somehow become “more genuine symbols of mobility and in turn progress” than the car (157). As a result, much automobile advertising now intertwines communications technologies with brand to valorise mobility. Car sharing goes some way in not only de-privatising cars but also using smart card technology and networked systems enabling an association with mobility futures. In Automobile Politics Paterson asks, “Is the car fundamentally unsustainable? Can it be greened? Has the car been so naturalised on our mobile horizons that we can’t imagine a society without it?” (27). From a sustainability perspective, one of the biggest problems with cars is still the amount of space devoted to them; highways, garages, car parks. About one-quarter of the land in London and nearly one-half of that in Los Angeles is devoted to car-only environments (Urry, “Connections” 29). In Sydney, it is more like a quarter. We have to reduce the numbers of cars on our roads to make our societies livable (Newman and Kenworthy). Car sharing provokes a re-thinking of urban space. If one quarter of Sydney’s population car shared and we converted this space into green use or local market gardens, then we’d have a radically transformed city. Car sharing, not to be confused with ‘ride sharing’ or ‘car pooling,’ involves a number of people using cars that are parked centrally in dedicated car bays around the inner city. After becoming a member (much like a 6 or 12 monthly gym membership), the cars can be booked (and extended) by the hour via the web or phone. They can then be accessed via a smart card. In Sydney there are 3 car sharing organisations operating: Flexicar (http://www.flexicar.com.au/), CharterDrive (http://www.charterdrive.com.au/) and GoGet (http://www.goget.com.au/).[1] The largest of these, GoGet, has been operating for 6 years and has over 5000 members and 200 cars located predominantly in the inner city suburbs. Anecdotally, GoGet claims its membership is primarily drawn from professionals living in the inner-urban ring. Their motivation for joining is, firstly, the convenience that car sharing provides in a congested, public transport-challenged city like Sydney; secondly, the financial savings derived; and thirdly, members consider the environmental and social benefits axiomatic. [2] The promotion tactics of car sharing seems to reflect this by barely mentioning the environment but focusing on those aspects which link car sharing to futuristic and flexible subjectivities which I outline in the next section. Unlike traditional car rental, the vehicles in car sharing are scattered through local streets in a network allowing local residents and businesses access to the vehicles mostly on foot. One car share vehicle is used by 22-24 members and gets about seven cars off the street (Mehlman 22). With lots of different makes and models of vehicles in each of their fleets, Flexicar’s website claims, “around the corner, around the clock” “Flexicar offers you the freedom of driving your own car without the costs and hassles of owning one,” while GoGet asserts, “like owning a car only better.” Due to the initial lack of interest from government, all the car sharing organisations in Australia are privately owned. This is very different to the situation in Europe where governments grant considerable financial assistance and have often integrated car sharing into pre-existing public transport networks. Urry discusses the spread of car sharing across the Western world: Six hundred plus cities across Europe have developed car-sharing schemes involving 50,000 people (Cervero, 2001). Prototype examples are found such as Liselec in La Rochelle, and in northern California, Berlin and Japan (Motavalli, 2000: 233). In Deptford there is an on-site car pooling service organized by Avis attached to a new housing development, while in Jersey electric hire cars have been introduced by Toyota. (Urry, “Connections” 34) ‘Collaborative Consumption’ and Flexible, Philandering Subjectivities Car sharing shifts the dominant conception of a car from being a ‘commodity’, which people purchase and subsequently identify with, to a ‘service’ or network of vehicles that are collectively used. It does this through breaking down the one car = one person (or one family) ratio with one car instead servicing 20 or more people. One of Paterson’s biggest criticisms concerns car driving as “a form of social exclusion” (44). Car sharing goes some way in subverting the model of hyper-individualism that supports both hegemonic automobility and capitalist structures, whereby the private motorcar produces a “separation of individuals from one another driving in their own private universes with no account for anyone else” (Paterson 90). As a car sharer, the driver has to acknowledge that this is not their private domain, and the car no longer becomes an extension of their living room or bedroom, as is noted in much literature around car cultures (Morris, Sheller, Simpson). There are a community of people using the car, so the driver needs to be attentive to things like keeping the car clean and bringing it back on time so another person can use it. So while car sharing may change the affective relationship and self-identification with the vehicle itself, it doesn’t necessarily change the phenomenological dimensions of car driving, such as the nostalgic pleasure of driving on the open road, or perhaps more realistically in Sydney, the frustration of being caught in a traffic jam. However, the fact the driver doesn’t own the vehicle does alter their relationship to the space and the commodity in a literal as well as a figurative way. Like car ownership, evidently car sharing also produces its own set of limitations on freedom and convenience. That mobility and car ownership equals freedom—the ‘freedom to drive’—is one imaginary which car firms were able to successfully manipulate and perpetuate throughout the twentieth century. However, car sharing also attaches itself to the same discourses of freedom and pervasive individualism and then thwarts them. For instance, GoGet in Sydney have run numerous marketing campaigns that attempt to contest several ‘self-evident truths’ about automobility. One is flexibility. Flexibility (and associated convenience) was one thing that ownership of a car in the late twentieth century was firmly able to affiliate itself with. However, car ownership is now more often associated with being expensive, a hassle and a long-term commitment, through things like buying, licensing, service and maintenance, cleaning, fuelling, parking permits, etc. Cars have also long been linked with sexuality. When in the 1970s financial challenges to the car were coming as a result of the oil shocks, Chair of General Motors, James Roche stated that, “America’s romance with the car is not over. Instead it has blossomed into a marriage” (Rothschilds, Paradise Lost). In one marketing campaign GoGet asked, ‘Why buy a car when all you need is a one night stand?’, implying that owning a car is much like a monogamous relationship that engenders particular commitments and responsibilities, whereas car sharing can just be a ‘flirtation’ or a ‘one night stand’ and you don’t have to come back if you find it a hassle. Car sharing produces a philandering subjectivity that gives individuals the freedom to have lots of different types of cars, and therefore relationships with each of them: I can be a Mini Cooper driver one day and a Falcon driver the next. This disrupts the whole kind of identification with one type of car that ownership encourages. It also breaks down a stalwart of capitalism—brand loyalty to a particular make of car with models changing throughout a person’s lifetime. Car sharing engenders far more fluid types of subjectivities as opposed to those rigid identities associated with ownership of one car. Car sharing can also be regarded as part of an emerging phenomenon of what Rachel Botsman and Roo Rogers have called “collaborative consumption”—when a community gets together “through organized sharing, swapping, bartering, trading, gifting and renting to get the same pleasures of ownership with reduced personal cost and burden, and lower environmental impact” (www.collaborativeconsumption.com). As Urry has stated, these developments indicate a gradual transformation in current economic structures from ownership to access, as shown more generally by many services offered and accessed via the web (Urry Mobilities 283). Rogers and Botsman maintain that this has come about through the “convergence of online social networks increasing cost consciousness and environmental necessity." In the future we could predict an increasing shift to payment to ‘access’ for mobility services, rather than the outright private ownerships of vehicles (Urry, “Connections”). Networked-Subjectivities or a ‘Digital Panopticon’? Cars, no longer able on their own to signify progress in either technical or social terms, attain their symbolic value through their connection to other, now more prevalently ‘progressive’ technologies. (Paterson 155) The term ‘digital panopticon’ has often been used to describe a dystopian world of virtual surveillance through such things as web-enabled social networking sites where much information is public, or alternatively, for example, the traffic surveillance system in London whereby the public can be constantly scrutinised through the centrally monitored cameras that track people’s/vehicle’s movements on city streets. In his “sociologies of the future,” Urry maintains that one thing which might save us from descending into post-car civil chaos is a system governed by a “digital panopticon” mobility system. This would be governed by a nexus system “that orders, regulates, tracks and relatively soon would ‘drive’ each vehicle and monitor each driver/passenger” (Urry, “Connections” 33). The transformation of mobile technologies over the last decade has made car sharing, as a viable business model, possible. Through car sharing’s exploitation of an online booking system, and cars that can be tracked, monitored and traced, the seeds of a mobile “networked-subjectivity” are emerging. But it’s not just the technology people are embracing; a cultural shift is occurring in the way that people understand mobility, their own subjectivity, and more importantly, the role of cars. NETT Magazine did a feature on car sharing, and advertised it on their front cover as “GoGet’s web and mobile challenge to car owners” (May 2009). Car sharing seems to be able to tap into more contemporary understandings of what mobility and flexibility might mean in the twenty-first century. In their marketing and promotion tactics, car sharing organisations often discursively exploit science fiction terminology and generate a subjectivity much more dependent on networks and accessibility (158). In the suburbs people park their cars in garages. In car sharing, the vehicles are parked not in car bays or car parks, but in publically accessible ‘pods’, which promotes a futuristic, sci-fi experience. Even the phenomenological dimensions of swiping a smart card over the front of the windscreen to open the car engender a transformation in access to the car, instead of through a key. This is service-technology of the future while those stuck in car ownership are from the old economy and the “century of the car” (Gilroy). The connections between car sharing and the mobile phone and other communications technologies are part of the notion of a networked, accessible vehicle. However, the more problematic side to this is the car under surveillance. Nic Lowe, of his car sharing organisation GoGet says, “Because you’re tagged on and we know it’s you, you are able to drive the car… every event you do is logged, so we know what time you turned the key, what time you turned it off and we know how far you drove … if a car is lost we can sound the horn to disable it remotely to prevent theft. We can track how fast you were going and even how fast you accelerated … track the kilometres for billing purposes and even find out when people are using the car when they shouldn’t be” (Mehlman 27). The possibility with the GPS technology installed in the car is being able to monitor speeds at which people drive, thereby fining then every minute spent going over the speed limit. While this conjures up the notion of the car under surveillance, it is also a much less bleaker scenario than “a Hobbesian war of all against all”. Conclusion: “Hundreds of Cars, No Garage” The prospect of climate change is provoking innovation at a whole range of levels, as well as providing a re-thinking of how we use taken-for-granted technologies. Sometime this century the one tonne, privately owned, petrol-driven car will become an artefact, much like Sydney trams did last century. At this point in time, car sharing can be regarded as an emerging transitional technology to a post-car society that provides a challenge to hegemonic automobile culture. It is evidently not a radical departure from the car’s vast machinic complex and still remains a part of what Urry calls the “system of automobility”. From a pro-car perspective, its networked surveillance places constraints on the free agency of the car, while for those of the deep green variety it is, no doubt, a compromise. Nevertheless, it provides a starting point for re-thinking the foundations of the privately-owned car. While Urry makes an important point in relation to a society moving from ownership to access, he doesn’t take into account the cultural shifts occurring that are enabling car sharing to be attractive to prospective members: the notion of networked subjectivities, the discursive constructs used to establish car sharing as a thing of the future with pods and smart cards instead of garages and keys. If car sharing became mainstream it could have radical environmental impacts on things like urban space and pollution, as well as the dominant culture of “automobile dependence” (Newman and Kenworthy), as Australia attempts to move to a low carbon economy. Notes [1] My partner Bruce Jeffreys, together with Nic Lowe, founded Newtown Car Share in 2002, which is now called GoGet. [2] Several layers down in the ‘About Us’ link on GoGet’s website is the following information about the environmental benefits of car sharing: “GoGet's aim is to provide a reliable, convenient and affordable transport service that: allows people to live car-free, decreases car usage, improves local air quality, removes private cars from local streets, increases patronage for public transport, allows people to lead more active lives” (http://www.goget.com.au/about-us.html). References The Australian. “Kevin Rudd Throws $6.2bn Lifeline to Car Industry.” 10 Nov. 2008. < http://www.theaustralian.news.com.au/business/story/ 0,28124,24628026-5018011,00.html >.Corrigan, Tim. “Genre, Gender, and Hysteria: The Road Movie in Outer Space.” A Cinema Without Walls: Movies, Culture after Vietnam. New Jersey: Rutgers University Press, 1991. Dwyer, Gwynne. Climate Wars. North Carlton: Scribe, 2008. Featherstone, Mike. “Automobilities: An Introduction.” Theory, Culture and Society 21.4-5 (2004): 1-24. Gilroy, Paul. “Driving while Black.” Car Cultures. Ed. Daniel Miller. Oxford: Berg, 2000. Hirsch, Michael. “Barack the Saviour.” Newsweek 13 Nov. 2008. < http://www.newsweek.com/id/168867 >. Lovelock, James. The Revenge of Gaia: Earth’s Climate Crisis and the Fate of Humanity. Penguin, 2007. Lovelock, James. The Vanishing Face of Gaia. Penguin, 2009. Mehlman, Josh. “Community Driven Success.” NETT Magazine (May 2009): 22-28. Morris, Meaghan. “Fate and the Family Sedan.” East West Film Journal 4.1 (1989): 113-134. Mouritz, Mike. “City Views.” Fast Thinking Winter 2009: 47-50. Newman, P. and J. Kenworthy. Sustainability and Cities: Overcoming Automobile Dependence. Washington DC: Island Press, 1999. Paterson, Matthew. Automobile Politics: Ecology and Cultural Political Economy. Cambridge: Cambridge University Press, 2007. Rothschilds, Emma. Paradise Lost: The Decline of the Auto-Industrial Age. New York: Radom House, 1973. Rothschilds, Emma. “Can We Transform the Auto-Industrial Society?” New York Review of Books 56.3 (2009). < http://www.nybooks.com/articles/22333 >. Sheller, Mimi. “Automotive Emotions: Feeling the Car.” Theory, Culture and Society 21 (2004): 221–42. Simpson, Catherine. “Volatile Vehicles: When Women Take the Wheel.” Womenvision. Ed. Lisa French. Melbourne: Damned Publishing, 2003. 197-210. Urry, John. Sociology Beyond Societies: Mobilities for the 21st Century. London: Routledge, 2000. Urry, John. “Connections.” Environment and Planning D: Society and Space 22 (2004): 27-37. Urry, John. Mobilities. Cambridge, and Maiden, MA: Polity Press, 2008. Urry, John. “Climate Change, Travel and Complex Futures.” British Journal of Sociology 59. 2 (2008): 261-279. Watts, Laura, and John Urry. “Moving Methods, Travelling Times.” Environment and Planning D: Society and Space 26 (2008): 860-874. Wutkowski, Karey. “Auto Execs' Private Flights to Washington Draw Ire.” Reuters News Agency 19 Nov. 2008. < http://www.reuters.com/article/newsOne/idUSTRE4AI8C520081119 >.
APA, Harvard, Vancouver, ISO, and other styles
42

Mules, Warwick. "That Obstinate Yet Elastic Natural Barrier." M/C Journal 4, no. 5 (November 1, 2001). http://dx.doi.org/10.5204/mcj.1936.

Full text
Abstract:
Introduction It used to be the case that for the mass of workers, work was something that was done in order to get by. A working class was simply the sum total of all those workers and their dependents whose wages paid for the necessities of life, providing the bare minimum for family reproduction, to secure a place and a lineage within the social order. However, work has now become something else. Work has become the privileged sign of a new kind of class, whose existence is guaranteed not so much by work, but by the very fact of holding a job. Society no longer divides itself between a ruling elite and a subordinated working class, but between a job-holding, job-aspiring class, and those excluded from holding a job; those unable, by virtue of age, infirmity, education, gender, race or demographics, to participate in the rewards of work. Today, these rewards are not only a regular salary and job satisfaction (the traditional consolations of the working class), but also a certain capacity to plan ahead, to gain control of one's destiny through saving and investment, and to enjoy the pleasures of consumption through the fulfilment of self-images. What has happened to transform the worker from a subsistence labourer to an affluent consumer? In what way has the old working class now become part of the consumer society, once the privileged domain of the rich? And what effects has this transformation had on capitalism and its desire for profit? These questions take on an immediacy when we consider that, in the recent Federal election held in Australia (November 11, 2001), voters in the traditional working class areas of western Sydney deserted the Labour Party (the party of the worker) and instead voted Liberal/conservative (the party of capital and small business). The fibro worker cottage valleys of Parramatta are apparently no more, replaced by the gentrified mansions of an aspiring worker formation, in pursuit of the wealth and independence once the privilege of the educated bourgeoisie. In this brief essay, I will outline an understanding of work in terms of its changing relation to capital. My aim is to show how the terrain of work has shifted so that it no longer operates in strict subordination to capital, and has instead become an investment in capital. The worker no longer works to subsist, but does so as an investment in the future. My argument is situated in the rich theoretical field set out by Karl Marx in his critique of capitalism, which described the labour/capital relation in terms of a repressive, extractive force (the power of capital over labour) and which has since been redefined by various poststructuralist theorists including Michel Foucault and Gilles Deleuze (Anti-Oedipus) in terms of the forces of productive desire. What follows then, is not a Marxist reading of work, but a reading of the way Marx sets forth work in relation to capital, and how this can be re-read through poststructuralism, in terms of the transformation of work from subordination to capital, to investment in capital; from work as the consequence of repression, to work as the fulfilment of desire. The Discipline of Work In his major work Capital Marx sets out a theory of labour in which the task of the worker is to produce surplus value: "Capitalist production is not merely the production of commodities, it is, by its very essence, the production of surplus-value. The worker produces not for himself, but for capital. It is no longer sufficient, therefore, for him simply to produce. He must produce surplus-value." (644) For Marx, surplus-value is generated when commodities are sold in the market for a price greater than the price paid to the worker for producing it: "this increment or excess over the original value I call surplus-value" (251). In order to create surplus value, the time spent by the worker in making a commodity must be strictly controlled, so that the worker produces more than required to fulfil his subsistence needs: ". . . since it is just this excess labour that supplies [the capitalist] with the surplus value" (1011). In other words, capital production is created through a separation between labour and capital: "a division between the product of labour and labour itself, between the objective conditions of labour and the subjective labour-power, was . . . the real foundation and the starting point of the process of capital production" (716). As Michael Ryan has argued, this separation was forced , through an allegiance between capital and the state, to guarantee the conditions for capital renewal by controlling the payment of labour in the form of a wage (84). Marx's analysis of industrialised capital in Capital thus outlines the way in which human labour is transformed into a form of surplus value, by the forced extraction of labour time: "the capitalist forces the worker where possible to exceed the normal rate of intensity [of work] and he forces him as best he can to extend the process of labour beyond the time necessary to replace the amount laid out in wages" (987). For Marx, capitalism is not a voluntary system; workers are not free to enter into and out of their relation with capital, since capital itself cannot survive without the constant supply of labour from which to extract surplus value. Needs and wants can only be satisfied within the labour/capital relation which homogenises labour into exchange value in terms of a wage, pegged to subsistence levels: "the capital earmarked for wages . . . belongs to the worker as soon as it has assumed its true shape of the means of subsistence destined to be consumed by him" (984). The "true shape" of wages, and hence the single, univocal truth of the wage labourer, is that he is condemned to subsistence consumption, because his capacity to share in the surplus value extracted from his own labour is circumscribed by the alliance between capital and the state, where wages are fixed and controlled according to wage market regulations. Marx's account of the labour/capital relation is imposing in its description of the dilemma of labour under the power of capital. Capitalism appears as a thermodynamic system fuelled by labour power, where, in order to make the system homogeneous, to produce exchange value, resistance is reduced: "Because it is capital, the automatic mechanism is endowed, in the person of the capitalist, with consciousness and a will. As capital, therefore, it is animated by the drive to reduce to a minimum the resistance offered by man, that obstinate yet elastic natural barrier." (527) In the capitalist system resistance takes the form of a living residue within the system itself, acting as an "elastic natural barrier" to the extractive force of capital. Marx names this living residue "man". In offering resistance, that is, in being subjected to the force of capital, the figure of man persists as the incommensurable presence of a resistive force composed by a refusal to assimilate. (Lyotard 102) This ambivalent position (the place of many truths) which places man within/outside capital, is not fully recognised by Marx at this stage of his analysis. It suggests the presence of an immanent force, coming from the outside, yet already present in the figure of man (man as "offering" resistance). This force, the counter-force operating through man as the residue of labour, is necessarily active in its effects on the system. That is to say, resistance in the system is not resistance to the system, but the resistance which carries the system elsewhere, to another place, to another time. Unlike the force of capital which works on labour to preserve the system, the resistive force figured in man works its way through the system, transforming it as it goes, with the elusive power to refuse. The separation of labour and capital necessary to create the conditions for capitalism to flourish is achieved by the action of a force operating on labour. This force manifests itself in the strict surveillance of work, through supervisory practices: "the capitalist's ability to supervise and enforce discipline is vital" (Marx 986). Marx's formulation of supervision here and elsewhere, assumes a direct power relation between the supervisor and the supervised: a coercive power in the form of 'the person of the capitalist, with consciousness and a will'. Surplus value can only be extracted at the maximum rate when workers are entirely subjected to physical surveillance. As Foucault has shown, surveillance practices in the nineteenth century involved a panoptic principle as a form of surveillance: "Power has its principle not so much in a person as in a certain concerted distribution of bodies, surfaces, lights, gazes; an arrangement whose internal mechanisms produce the relation in which individuals get caught up." (202) Power is not power over, but a productive power involving the commingling of forces, in which the resistive force of the body does not oppose, but complies with an authoritative force: "there is not a single moment of life from which one cannot extract forces, providing one knows how to differentiate it and combine it with others" (165). This commingling of dominant and resistive forces is distributive and proliferating, allowing the spread of institutions across social terrains, producing both "docile" and "delinquent" bodies at the same time: "this production of delinquency and its investment by the penal apparatus ..." (285, emphasis added). Foucault allows us to think through the dilemma posed by Marx, where labour appears entirely subject to the power of capital, reducing the worker to subsistence levels of existence. Indeed, Foucault's work allows us to see the figure of man, briefly adumbrated in quote from Marx above as "that obstinate yet elastic natural barrier", but refigured as an active, investing, transformative force, operating within the capitalist system, yet sending it on its way to somewhere else. In Foucauldian terms, self-surveillance takes on a normative function during the nineteenth century, producing a set of disciplinary values around the concepts of duty and respectability (Childers 409). These values were not only imposed from above, through education and the state, but enacted and maintained by the workers themselves, through the myriad threads of social conformity operating in daily life, whereby people made themselves suitable to each other for membership of the imagined community of disciplined worker-citizens. In this case, the wellbeing of workers gravitated to self-awareness and self-improvement, seen for instance in the magazines circulating at the time addressed to a worker readership (e.g. The Penny Magazine published in Britain from 1832-1845; see Sinnema 15). Instead of the satisfaction of needs in subsistence consumption, the worker was possessed by a desire for self-improvement, taking place in his spare time which was in turn, consolidated into the ego-ideal of the bourgeois self as the perfected model of civilised, educated man. Here desire takes the form of a repression (Freud 355), where the resistive force of the worker is channelled into maintaining the separation between labour and capital, and where the worker is encouraged to become a little bourgeois himself. The desire for self-improvement by the worker did not lead to a shift into the capitalist classes, but was satisfied in coming to know one's place, in being satisfied with fulfilling one's duty and in living a respectable life; that is in being individuated with respect to the social domain. Figure 1 - "The British Beehive", George Cruickshank's image of the hierarchy of labour in Victorian England (1840, modified 1867). Each profession is assigned an individualised place in the social order. A time must come however, in the accumulation of surplus-value, in the vast accelerating machine of capitalism, when the separation between labour and capital begins to dissolve. This point is reached when the residue left by capital in extracting surplus value is sufficient for the worker to begin consuming for its own sake, to engage in "unproductive expenditure" (Bataille 117) where desire is released as an active force. At this point, workers begin to abandon the repressive disciplines of duty and respectability, and turn instead to the control mechanisms of self-transformation or the "inventing of a self as if from scratch" (Massumi 18). In advanced capitalism, where the accrued wealth has concentrated not only profit but wages as well (a rise in the "standard of living"), workers cease to behave as subordinated to the system, and through their increased spending power re-enter the system as property owners, shareholders, superannuants and debtees with the capacity to access money held in banks and other financial institutions. As investment guru Peter Drucker has pointed out, the accumulated wealth of worker-owned superannuation or "pension" funds, is the most significant driving force of global capital today (Drucker 76-8). In the superannuation fund, workers' labour is not fully expended in the production of surplus value, but re-enters the system as investment on the workers' behalf, indirectly fuelling their capacity to fulfil desires through a rapidly accelerating circulation of money. As a consequence, new consumer industries begin to emerge based on the management of investment, where money becomes a product, subject to consumer choice. The lifestyles of the old capitalist class, itself a simulacra of aristocracy which it replaced, are now reproduced by the new worker-capitalist, but in ersatz forms, proliferating as the sign of wealth and abundance (copies of palatial homes replace real palaces, look-alike Rolex watches become available at cheap prices, medium priced family sedans take on the look and feel of expensive imports, and so forth). Unable to extract the surplus value necessary to feed this new desire for money from its own workforce (which has, in effect, become the main consumer of wealth), capital moves 'offshore' in search of a new labour pool, and repeats what it did to the labour pools in the older social formations in its relentless quest to maximise surplus value. Work and Control We are now witnessing a second kind of labour taking shape out of the deformations of the disciplinary society, where surplus value is not extracted, but incorporated into the labour force itself (Mules). This takes place when the separation between labour and capital dissolves, releasing quantities of "reserve time" (the time set aside from work in order to consume), which then becomes part of the capitalising process itself. In this case workers become "investors in their own lives (conceived of as capital) concerned with obtaining a profitable behaviour through information (conceived of as a production factor) sold to them." (Alliez and Feher 347). Gilles Deleuze has identified this shift in terms of what he calls a "control society" where the individuation of workers guaranteed by the disciplinary society gives way to a cybernetic modulation of "dividuals" or cypher values regulated according to a code (180). For dividualised workers, the resource incorporated into capital is their own lived time, no longer divided between work and leisure, but entirely "consummated" in capital (Alliez and Fehrer 350). A dividualised worker will thus work in order to produce leisure, and conversely enjoy leisure as a form of work. Here we have what appears to be a complete breakdown of the separation of labour and capital instigated by the disciplinary society; a sweeping away of the grounds on which labour once stood as a mass of individuals, conscious of their rivalry with capital over the spoils of surplus value. Here we have a situation where labour itself has become a form of capital (not just a commodity exchangeable on the market), incorporated into the temporalised body of the worker, contributing to the extraction of its own surplus value. Under the disciplinary society, the body of the worker became subject to panoptic surveillance, where "time and motion" studies enabled a more efficient control of work through the application of mathematical models. In the control society there is no need for this kind of panoptic control, since the embodiment of the panoptic principle, anticipated by Foucault and responsible for the individuation of the subject in disciplinary societies, has itself become a resource for extracting surplus value. In effect, dividualised workers survey themselves, not as a form of self-discipline, but as an investment for capitalisation. Dividuals are not motivated by guilt, conscience, duty or devotion to one's self, but by a transubjective desire for the other, the figure of a self projected into the future, and realised through their own bodily becoming. Unlike individuals who watch themselves as an already constituted self in the shadow of a super-ego, dividuals watch themselves in the image of a becoming-other. We might like to think of dividuals as self-correctors operating in teams and groups (franchises) whose "in-ness" as in-dividuals, is derived not from self-reflection, but from directiveness. Directiveness is the disposition of a habitus to find its way within programs designed to maximise performance across a territory. Following Gregory Bateson, we might say that directiveness is the pathway forged between a map and its territory (Bateson 454). A billiard ball sitting on a billiard table needs to be struck in such a way to simultaneously reduce the risk of a rival scoring from it, and maximise the score available, for instance by potting it into a pocket. The actual trajectory of the ball is governed by a logic of "restraint" (399) which sets up a number of virtual pathways, all but one of which is eliminated when the map (the rules and strategies of the game) is applied to the territory of the billiard table. If surveillance was the modus operandi of the old form of capitalism which required a strict control over labour, then directiveness is the new force of capital which wants to eliminate work in the older sense of the word, and replace it with the self-managed flow of capitalising labour. Marx's labour theory of value has led us, via a detour through Foucault and Deleuze, to the edge of the labour/capital divide, where the figure of man reappears, not as a worker subject to capital, but in some kind of partnership with it. This seems to spell the end of the old form of work, which required a strict delineation between labour and capital, where workers became rivals with capital for a share in surplus value. In the new formation of work, workers are themselves little capitalists, whose labour time is produced through their own investments back into the system. Yet, the worker is also subject to the extraction of her labour time in the necessity to submit to capital through the wage relation. This creates a reflexive snarl, embedded in the worker's own self-image, where work appears as leisure and leisure appears as work, causing labour to drift over capital and vice versa, for capital to drift over labour. This drifting, mobile relation between labour and capital cannot be secured through appeals to older forms of worker awareness (duty, responsibility, attentiveness, self-surveillance) since this would require a repression of the desire for self-transformation, and hence a fatal dampening of the dynamics of the market (anathema to the spirit of capitalism). Rather it can only be directed through control mechanisms involving a kind of forced partnership between capital and labour, where both parties recognise their mutual destinies in being "thrown" into the system. In the end, work remains subsumed under capital, but not in its alienated, disciplinary state. Rather work has become a form of capital itself, one's investment in the future, and hence as valuable now as it was before. It's just a little more difficult to see how it can be protected as a 'right' of the worker, since workers are themselves investors of their own labour, and not right-bearing individuals whose position in society has been fixed by the separation of labour from capital. References Alliez, Eric and Michel Feher. "The Luster of Capital." Zone1/2 (1987): 314-359. Bataille, Georges. 'The Notion of Expenditure'. Visions of Excess: Selected Writings, 1927-1939, Trans. and Ed. Alan Stoekl. Minneapolis: Minnesota UP, 1985. 116-29. Bateson, Gregory. Steps to an Ecology of Mind. New York: Ballantine Books, 1972. Childers, Joseph W. "Observation and Representation: Mr. Chadwick Writes the Poor." Victorian Studies37.3 (1994): 405-31. Deleuze, Gilles. Anti-Oedipus: Capitalism and Schizophrenia. Minneapolis: U of Minnesota P, 1983. --. Negotiations, 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. Drucker, Peter F. Post-Capitalist Society. New York: Harper, 1993. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Freud, Sigmund. "The Ego and the Id". On Metapsychology: The Theory of Psychoanalysis. The Pelican Freud Library, Vol 11. Harmondsworth: Penguin, 1984. 339-407. Lyotard, Jean-Francois. Libidinal Economy. Trans. Iain Hamilton Grant,. Bloomington: Indiana UP, 1993. Marx, Karl. Capital, Vol. I. Trans. Ben Fowkes. Harmondsworth: Penguin, 1976. Massumi, Brian. "Everywhere You Wanted to Be: Introduction to Fear." The Politics of Everyday Fear. Ed. Brian Massumi. Minneapolis: U of Minnesota P, 1993. 3-37. Mules, Warwick. "A Remarkable Disappearing Act: Immanence and the Creation of Modern Things." M/C: A Journal of Media and Culture 4.4 (2001). 15 Nov. 2001 <http://www.media-culture.org.au/0108/disappear.php>. Ryan, Michael. Marxism and Deconstruction: A Critical Introduction. Baltimore: John Hopkins Press, 1982. Sinnema, Peter W. Dynamics of the Printed Page: Representing the Nation in the Illustrated London News. Aldershot: Ashgate Press, 1998. Links http://csf.colorado.edu/psn/marx/Archive/1867-C1/ http://www.media-culture.org.au/0108/Disappear.html http://acnet.pratt.edu/~arch543p/help/Foucault.html http://acnet.pratt.edu/~arch543p/help/Deleuze.html Citation reference for this article MLA Style Mules, Warwick. "That Obstinate Yet Elastic Natural Barrier" M/C: A Journal of Media and Culture 4.5 (2001). [your date of access] < http://www.media-culture.org.au/0111/Mules.xml >. Chicago Style Mules, Warwick, "That Obstinate Yet Elastic Natural Barrier" M/C: A Journal of Media and Culture 4, no. 5 (2001), < http://www.media-culture.org.au/0111/Mules.xml > ([your date of access]). APA Style Mules, Warwick. (2001) That Obstinate Yet Elastic Natural Barrier. M/C: A Journal of Media and Culture 4(5). < http://www.media-culture.org.au/0111/Mules.xml > ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
43

Robinson, Jessica Yarin. "Fungible Citizenship." M/C Journal 25, no. 2 (April 25, 2022). http://dx.doi.org/10.5204/mcj.2883.

Full text
Abstract:
Social media companies like to claim the world. Mark Zuckerberg says Facebook is “building a global community”. Twitter promises to show you “what’s happening in the world right now”. Even Parler claims to be the “global town square”. Indeed, among the fungible aspects of digital culture is the promise of geographic fungibility—the interchangeability of location and national provenance. The taglines of social media platforms tap into the social imagination of the Internet erasing distance—Marshall McLuhan’s global village on a touch screen (see fig. 1). Fig. 1: Platform taglines: YouTube, Twitter, Parler, and Facebook have made globality part of their pitch to users. Yet users’ perceptions of geographic fungibility remain unclear. Scholars have proposed forms of cosmopolitan and global citizenship in which national borders play less of a role in how people engage with political ideas (Delanty; Sassen). Others suggest the potential erasure of location may be disorienting (Calhoun). “Nobody lives globally”, as Hugh Dyer writes (64). In this article, I interrogate popular and academic assumptions about global political spaces, looking at geographic fungibility as a condition experienced by users. The article draws on interviews conducted with Twitter users in the Scandinavian region. Norway, Sweden, and Denmark offer an interesting contrast to online spaces because of their small and highly cohesive political cultures; yet these countries also have high Internet penetration rates and English proficiency levels, making them potentially highly globally connected (Syvertsen et al.). Based on a thematic analysis of these interviews, I find fungibility emerges as a key feature of how users interact with politics at a global level in three ways: invisibility: fungibility as disconnection; efficacy: fungibility as empowerment; and antagonism: non-fungibility as strategy. Finally, in contrast to currently available models, I propose that online practices are not characterised so much by cosmopolitan norms, but by what I describe as fungible citizenship. Geographic Fungibility and Cosmopolitan Hopes Let’s back up and take a real-life example that highlights what it means for geography to be fungible. In March 2017, at a high-stakes meeting of the US House Intelligence Committee, a congressman suddenly noticed that President Donald Trump was not only following the hearing on television, but was live-tweeting incorrect information about it on Twitter. “This tweet has gone out to millions of Americans”, said Congressman Jim Himes, noting Donald Trump’s follower count. “16.1 million to be exact” (C-SPAN). Only, those followers weren’t just Americans; Trump was tweeting to 16.1 million followers worldwide (see Sevin and Uzunoğlu). Moreover, the committee was gathered that day to address an issue related to geographic fungibility: it was the first public hearing on Russian attempts to interfere in the 2016 American presidential race—which occurred, among other places, on Twitter. In a way, democratic systems are based on fungibility. One person one vote. Equality before the law. But land mass was not imagined to be commutable, and given the physical restrictions of communication, participation in the public sphere was largely assumed to be restricted by geography (Habermas). But online platforms offer a fundamentally different structure. Nancy Fraser observes that “public spheres today are not coextensive with political membership. Often the interlocutors are neither co-nationals nor fellow citizens” (16). Netflix, YouTube, K-Pop, #BLM: the resources that people draw on to define their worlds come less from nation-specific media (Robertson 179). C-SPAN’s online feed—if one really wanted to—is as easy to click on in Seattle as in Stockholm. Indeed, research on Twitter finds geographically dispersed networks (Leetaru et al.). Many Twitter users tweet in multiple languages, with English being the lingua franca of Twitter (Mocanu et al.). This has helped make geographic location interchangeable, even undetectable without use of advanced methods (Stock). Such conditions might set the stage for what sociologists have envisioned as cosmopolitan or global public spheres (Linklater; Szerszynski and Urry). That is, cross-border networks based more on shared interest than shared nationality (Sassen 277). Theorists observing the growth of online communities in the late 1990s and early 2000s proposed that such activity could lead to a shift in people’s perspectives on the world: namely, by closing the communicative distance with the Other, people would also close the moral distance. Delanty suggested that “discursive spaces of world openness” could counter nationalist tendencies and help mobilise cosmopolitan citizens against the negative effects of globalisation (44). However, much of this discourse dates to the pre-social media Internet. These platforms have proved to be more hierarchical, less interactive, and even less global than early theorists hoped (Burgess and Baym; Dahlgren, “Social Media”; Hindman). Although ordinary citizens certainly break through, entrenched power dynamics and algorithmic structures complicate the process, leading to what Bucher describes as a reverse Panopticon: “the possibility of constantly disappearing, of not being considered important enough” (1171). A 2021 report by the Pew Research Center found most Twitter users receive few if any likes and retweets of their content. In short, it may be that social media are less like Marshall McLuhan’s global village and more like a global version of Marc Augé’s “non-places”: an anonymous and disempowering whereabouts (77–78). Cosmopolitanism itself is also plagued by problems of legitimacy (Calhoun). Fraser argues that global public opinion is meaningless without a constituent global government. “What could efficacy mean in this situation?” she asks (15). Moreover, universalist sentiment and erasure of borders are not exactly the story of the last 15 years. Media scholar Terry Flew notes that given Brexit and the rise of figures like Trump and Bolsonaro, projections of cosmopolitanism were seriously overestimated (19). Yet social media are undeniably political places. So how do we make sense of users’ engagement in the discourse that increasingly takes place here? It is this point I turn to next. Citizenship in the Age of Social Media In recent years, scholars have reconsidered how they understand the way people interact with politics, as access to political discourse has become a regular, even mundane part of our lives. Increasingly they are challenging old models of “informed citizens” and traditional forms of political participation. Neta Kligler-Vilenchik writes: the oft-heard claims that citizenship is in decline, particularly for young people, are usually based on citizenship indicators derived from these legacy models—the informed/dutiful citizen. Yet scholars are increasingly positing … citizenship [is not] declining, but rather changing its form. (1891) In other words, rather than wondering if tweeting is like a citizen speaking in the town square or merely scribbling in the margins of a newspaper, this line of thinking suggests tweeting is a new form of citizen participation entirely (Bucher; Lane et al.). Who speaks in the town square these days anyway? To be clear, “citizenship” here is not meant in the ballot box and passport sense; this isn’t about changing legal definitions. Rather, the citizenship at issue refers to how people perceive and enact their public selves. In particular, new models of citizenship emphasise how people understand their relation to strangers through discursive means (Asen)—through talking, in other words, in its various forms (Dahlgren, “Talkative Public”). This may include anything from Facebook posts to online petitions (Vaughan et al.) to digital organising (Vromen) to even activities that can seem trivial, solitary, or apolitical by traditional measures, such as “liking” a post or retweeting a news story. Although some research finds users do see strategic value in such activities (Picone et al.), Lane et al. argue that small-scale acts are important on their own because they force us to self-reflect on our relationship to politics, under a model they call “expressive citizenship”. Kligler-Vilenchik argues that such approaches to citizenship reflect not only new technology but also a society in which public discourse is less formalised through official institutions (newspapers, city council meetings, clubs): “each individual is required to ‘invent themselves’, to shape and form who they are and what they believe in—including how to enact their citizenship” she writes (1892). However, missing from these new understandings of politics is a spatial dimension. How does the geographic reach of social media sites play into perceptions of citizenship in these spaces? This is important because, regardless of the state of cosmopolitan sentiment, political problems are global: climate change, pandemic, regulation of tech companies, the next US president: many of society’s biggest issues, as Beck notes, “do not respect nation-state or any other borders” (4). Yet it’s not clear whether users’ correlative ability to reach across borders is empowering, or overwhelming. Thus, inspired particularly by Delanty’s “micro” cosmopolitanism and Dahlgren’s conditions for the formation of citizenship (“Talkative Public”), I am guided by the following questions: how do people negotiate geographic fungibility online? And specifically, how do they understand their relationship to a global space and their ability to be heard in it? Methodology Christensen and Jansson have suggested that one of the underutilised ways to understand media cultures is to talk to users directly about the “mediatized everyday” (1474). To that end, I interviewed 26 Twitter users in Norway, Denmark, and Sweden. The Scandinavian region is a useful region of study because most people use the Web nearly every day and the populations have high English proficiency (Syvertsen et al.). Participants were found in large-scale data scrapes of Twitter, using linguistic and geographic markers in their profiles, a process similar to the mapping of the Australian Twittersphere (Bruns et al.). The interviewees were selected because of their mixed use of Scandinavian languages and English and their participation in international networks. Participants were contacted through direct messages on Twitter or via email. In figure 2, the participants’ timeline data have been graphed into a network map according to who users @mentioned and retweeted, with lines representing tweets and colours representing languages. The participants include activists, corporate consultants, government employees, students, journalists, politicians, a security guard, a doctor, a teacher, and unemployed people. They range from age 24 to 60. Eight are women, reflecting the gender imbalance of Twitter. Six have an immigrant background. Eight are right-leaning politically. Participants also have wide variation in follower counts in order to capture a variety of experiences on the platform (min=281, max=136,000, median=3,600, standard deviation=33,708). All users had public profiles, but under Norwegian rules for research data, they will be identified here by an ID and their country, gender, and follower count (e.g., P01, Sweden, M, 23,000). Focussing on a single platform allowed the interviews to be more specific and makes it easier to compare the participants’ responses, although other social media often came up in the course of the interviews. Twitter was selected because it is often used in a public manner and has become an important channel for political communication (Larsson and Moe). The interviews lasted around an hour each and were conducted on Zoom between May 2020 and March 2021. Fig. 2: Network map of interview participants’ Twitter timelines. Invisibility: The Abyss of the Global Village Each participant was asked during the interview how they think about globality on Twitter. For many, it was part of the original reason for joining the platform. “Twitter had this reputation of being the hangout of a lot of the world’s intellectuals”, said P022 (Norway, M, 136,000). One Swedish woman described a kind of cosmopolitan curation process, where she would follow people on every continent, so that her feed would give her a sense of the world. “And yes, you can get that from international papers”, she told me, “but if I actually consumed as much as I do on Twitter in papers, I would be reading papers and articles all day” (P023, Sweden, F, 384). Yet while globality was part of the appeal, it was also an abstraction. “I mean, the Internet is global, so everything you do is going to end up somewhere else”, said one Swedish user (P013, M, 12,000). Users would echo the taglines that social media allow you to “interact with someone half a world away” (P05, Norway, M, 3,300) but were often hard-pressed to recall specific examples. A strong theme of invisibility—or feeling lost in an abyss—ran throughout the interviews. For many users this manifested in a lack of any visible response to their tweets. Even when replying to another user, the participants didn’t expect much dialogic engagement with them (“No, no, that’s unrealistic”.) For P04 (Norway, F, 2,000), tweeting back a heart emoji to someone with a large following was for her own benefit, much like the intrapersonal expressions described by Lane et al. that are not necessarily intended for other actors. P04 didn’t expect the original poster to even see her emoji. Interestingly, invisibility was more of a frustration among users with several thousand followers than those with only a few hundred. Having more followers seemed to only make Twitter appear more fickle. “Sometimes you get a lot of attention and sometimes it’s completely disregarded” said P05 (Norway, M, 3,300). P024 (Sweden, M, 2,000) had essentially given up: “I think it’s fun that you found me [to interview]”, he said, “Because I have this idea that almost no one sees my tweets anymore”. In a different way, P08 (Norway, F) who had a follower count of 121,000, also felt the abstraction of globality. “It’s almost like I’m just tweeting into a void or into space”, she said, “because it's too many people to grasp or really understand that these are real people”. For P08, Twitter was almost an anonymous non-place because of its vastness, compared with Facebook and Instagram where the known faces of her friends and family made for more finite and specific places—and thus made her more self-conscious about the visibility of her posts. Efficacy: Fungibility as Empowerment Despite the frequent feeling of global invisibility, almost all the users—even those with few followers—believed they had some sort of effect in global political discussions on Twitter. This was surprising, and seemingly contradictory to the first theme. This second theme of empowerment is characterised by feelings of efficacy or perception of impact. One of the most striking examples came from a Danish man with 345 followers. I wondered before the interview if he might have automated his account because he replied to Donald Trump so often (see fig. 3). The participant explained that, no, he was just trying to affect the statistics on Trump’s tweet, to get it ratioed. He explained: it's like when I'm voting, I'm not necessarily thinking [I’m personally] going to affect the situation, you know. … It’s the statistics that shows a position—that people don't like it, and they’re speaking actively against it. (P06, Denmark, M, 345) Other participants described their role similarly—not as making an impact directly, but being “one ant in the anthill” or helping information spread “like rings in the water”. One woman in Sweden said of the US election: I can't go to the streets because I'm in Stockholm. So I take to their streets on Twitter. I'm kind of helping them—using the algorithms, with retweets, and re-enforcing some hashtags. (P018, Sweden, F, 7,400) Note that the participants rationalise their Twitter activities through comparisons to classic forms of political participation—voting and protesting. Yet the acts of citizenship they describe are very much in line with new norms of citizenship (Vaughan et al.) and what Picone et al. call “small acts of engagement”. They are just acts aimed at the American sphere instead of their national sphere. Participants with large followings understood their accounts had a kind of brand, such as commenting on Middle Eastern politics, mocking leftist politicians, or critiquing the media. But these users were also sceptical they were having any direct impact. Rather, they too saw themselves as being “a tiny part of a combined effect from a lot of people” (P014, Norway, M, 39,000). Fig. 3: Participant P06 replies to Trump. Antagonism: Encounters with Non-Fungibility The final theme reflects instances when geography became suddenly apparent—and thrown back in the faces of the users. This was often in relation to the 2020 American election, which many of the participants were following closely. “I probably know more about US politics than Swedish”, said P023 (Sweden, F, 380). Particularly among left-wing users who listed a Scandinavian location in their profile, tweeting about the topic had occasionally led to encounters with Americans claiming foreign interference. “I had some people telling me ‘You don't have anything to do with our politics. You have no say in this’” said P018 (Sweden, F, 7,400). In these instances, the participants likewise deployed geography strategically. Participants said they would claim legitimacy because the election would affect their country too. “I think it’s important for the rest of the world to give them [the US] that feedback. That ‘we’re depending on you’” said P017 (Sweden, M, 280). As a result of these interactions, P06 started to pre-emptively identify himself as Danish in his tweets, which in a way sacrificed his own geographic fungibility, but also reinforced a wider sense of geographic fungibility on Twitter. In one of his replies to Donald Trump, Jr., he wrote, “Denmark here. The world is hoping for real leader!” Conclusion: Fungible Citizenship The view that digital media are global looms large in academic and popular imagination. The aim of the analysis presented here is to help illuminate how these perceptions play into practices of citizenship in digital spaces. One of the contradictions inherent in this research is that geographic or linguistic information was necessary to find the users interviewed. It may be that users who are geographically anonymous—or even lie about their location—would have a different relationship to online globality. With that said, several key themes emerged from the interviews: the abstraction and invisibility of digital spaces, the empowerment of geographic fungibility, and the occasional antagonistic deployment of non-fungibility by other users and the participants. Taken together, these themes point to geographic fungibility as a condition that can both stifle as well as create new arenas for political expression. Even spontaneous and small acts that aren’t expected to ever reach an audience (Lane et al.) nevertheless are done with an awareness of social processes that extend beyond the national sphere. Moreover, algorithms and metrics, while being the source of invisibility (Bucher), were at times a means of empowerment for those at a physical distance. In contrast to the cosmopolitan literature, it is not so much that users didn’t identify with their nation as their “community of membership” (Sassen)—they saw it as giving them an important perspective. Rather, they considered politics in the EU, US, UK, Russia, and elsewhere to be part of their national arena. In this way, the findings support Delanty’s description of “changes within … national identities rather than in the emergence in new identities” (42). Yet the interviews do not point to “the desire to go beyond ethnocentricity and particularity” (42). Some of the most adamant and active global communicators were on the right and radical right. For them, opposition to immigration and strengthening of national identity were major reasons to be on Twitter. Cross-border communication for them was not a form of resistance to nationalism but wholly compatible with it. Instead of the emergence of global or cosmopolitan citizenship then, I propose that what has emerged is a form of fungible citizenship. This is perhaps a more ambivalent, and certainly a less idealistic, view of digital culture. It implies that users are not elevating their affinities or shedding their national ties. Rather, the transnational effects of political decisions are viewed as legitimate grounds for political participation online. This approach to global platforms builds on and nuances current discursive approaches to citizenship, which emphasise expression (Lane et al.) and contribution (Vaughan et al.) rather than formal participation within institutions. Perhaps the Scandinavian users cannot cast a vote in US elections, but they can still engage in the same forms of expression as any American with a Twitter account. That encounters with non-fungibility were so notable to the participants also points to the mundanity of globality on social media. Vaughan et al. write that “citizens are increasingly accustomed to participating in horizontal networks of relationships which facilitate more expressive, smaller forms of action” (17). The findings here suggest that they are also accustomed to participating in geographically agnostic networks, in which their expressions of citizenship are at once small, interchangeable, and potentially global. References Asen, Robert. "A Discourse Theory of Citizenship." Quarterly Journal of Speech 90.2 (2004): 189–211. Augé, Marc. Non-Places: Introduction to an Anthropology of Supermodernity. Trans. John Howe. London: Verso, 1995. Beck, Ulrich. The Cosmopolitan Vision. Trans. Ciaran Cronin. Cambridge: Polity, 2006. Bruns, Axel, et al. "The Australian Twittersphere in 2016: Mapping the Follower/Followee Network." Social Media + Society 3.4 (2017): 1–15. Bucher, Taina. "Want to Be on the Top? Algorithmic Power and the Threat of Invisibility on Facebook." New Media & Society 14.7 (2012): 1164–80. Burgess, Jean, and Nancy Baym. Twitter: A Biography. New York: New York UP, 2020. C-SPAN. Russian Election Interference, House Select Intelligence Committee. 24 Feb. 2017. Transcript. 21 Mar. 2017 <https://www.c-span.org/video/?425087-1/fbi-director-investigating-links-trump-campaign-russia>. Calhoun, Craig. Nations Matter: Culture, History, and the Cosmopolitan Dream. New York: Routledge, 2007. Christensen, Miyase, and André Jansson. "Complicit Surveillance, Interveillance, and the Question of Cosmopolitanism: Toward a Phenomenological Understanding of Mediatization." New Media & Society 17.9 (2015): 1473–91. Dahlgren, Peter. "In Search of the Talkative Public: Media, Deliberative Democracy and Civic Culture." Javnost – The Public 9.3 (2002): 5–25. ———. "Social Media and Political Participation: Discourse and Deflection." Critique, Social Media and the Information Society. Eds. Christian Fuchs and Marisol Sandoval. New York: Routledge, 2014. 191–202. Delanty, Gerard. "The Cosmopolitan Imagination: Critical Cosmopolitanism and Social Theory." British Journal of Sociology 57.1 (2006): 25–47. Dyer, Hugh C. Coping and Conformity in World Politics. Routledge, 2009. Flew, Terry. "Globalization, Neo-Globalization and Post-Globalization: The Challenge of Populism and the Return of the National." Global Media and Communication 16.1 (2020): 19–39. Fraser, Nancy. "Transnationalizing the Public Sphere: On the Legitimacy and Efficacy of Public Opinion in a Post-Westphalian World." Theory, Culture & Society 24.4 (2007): 7–30. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger. Cambridge, Mass.: MIT P, 1991 [1962]. Kligler-Vilenchik, Neta. "Alternative Citizenship Models: Contextualizing New Media and the New ‘Good Citizen’." New Media & Society 19.11 (2017): 1887–903. Lane, Daniel S., Kevin Do, and Nancy Molina-Rogers. "What Is Political Expression on Social Media Anyway? A Systematic Review." Journal of Information Technology & Politics (2021): 1–15. Larsson, Anders Olof, and Hallvard Moe. "Twitter in Politics and Elections: Insights from Scandinavia." Twitter and Society. Eds. Katrin Weller et al. New York: Peter Lang, 2014. 319–30. Linklater, Andrew. "Cosmopolitan Citizenship." Handbook of Citizenship Studies. Eds. Engin F. Isin and Bryan S. Turner. London: Sage, 2002. 317–32. McLuhan, Marshall. Understanding Media: The Extensions of Man. London: Ark, 1987 [1964]. Mocanu, Delia, et al. "The Twitter of Babel: Mapping World Languages through Microblogging Platforms." PLOS ONE 8.4 (2013): e61981. Picone, Ike, et al. "Small Acts of Engagement: Reconnecting Productive Audience Practices with Everyday Agency." New Media & Society 21.9 (2019): 2010–28. Robertson, Alexa. Mediated Cosmopolitanism: The World of Television News. Cambridge: Polity, 2010. Sassen, Saskia. "Towards Post-National and Denationalized Citizenship." Handbook of Citizenship Studies. Eds. Engin F. Isin and Bryan S. Turner. London: Sage, 2002. 277–91. Sevin, Efe, and Sarphan Uzunoğlu. "Do Foreigners Count? Internationalization of Presidential Campaigns." American Behavioral Scientist 61.3 (2017): 315–33. Stock, Kristin. "Mining Location from Social Media: A Systematic Review." Computers, Environment and Urban Systems 71 (2018): 209–40. Syvertsen, Trine, et al. The Media Welfare State: Nordic Media in the Digital Era. New Media World. Ann Arbor: U of Michigan P, 2014. Szerszynski, Bronislaw, and John Urry. "Cultures of Cosmopolitanism." The Sociological Review 50.4 (2002): 461–81. Vaughan, Michael, et al. "The Role of Novel Citizenship Norms in Signing and Sharing Online Petitions." Political Studies (2022). Vromen, Ariadne. Digital Citizenship and Political Engagement: The Challenge from Online Campaigning and Advocacy Organisations. London: Palgrave Macmillan, 2017.
APA, Harvard, Vancouver, ISO, and other styles
44

Abidin, Crystal. "Micro­microcelebrity: Branding Babies on the Internet." M/C Journal 18, no. 5 (October 14, 2015). http://dx.doi.org/10.5204/mcj.1022.

Full text
Abstract:
Babies and toddlers are amassing huge followings on social media, achieving microcelebrity status, and raking in five figure sums. In East Asia, many of these lucrative “micro­-microcelebrities” rise to fame by inheriting exposure and proximate microcelebrification from their social media Influencer mothers. Through self-branding techniques, Influencer mothers’ portrayals of their young’ children’s lives “as lived” are the canvas on which (baby) products and services are marketed to readers as “advertorials”. In turning to investigate this budding phenomenon, I draw on ethnographic case studies in Singapore to outline the career trajectory of these young children (under 4yo) including their social media presence, branding strategies, and engagement with their followers. The chapter closes with a brief discussion on some ethical considerations of such young children’s labour in the social media age.Influencer MothersTheresa Senft first coined the term “microcelebrity” in her work Camgirls as a burgeoning online trend, wherein people attempt to gain popularity by employing digital media technologies, such as videos, blogs, and social media. She describes microcelebrities as “non-actors as performers” whose narratives take place “without overt manipulation”, and who are “more ‘real’ than television personalities with ‘perfect hair, perfect friends and perfect lives’” (Senft 16), foregrounding their active response to their communities in the ways that maintain open channels of feedback on social media to engage with their following.Influencers – a vernacular industry term albeit inspired by Katz & Lazarsfeld’s notion of “personal influence” that predates Internet culture – are one type of microcelebrity; they are everyday, ordinary Internet users who accumulate a relatively large following on blogs and social media through the textual and visual narration of their personal lives and lifestyles, engage with their following in “digital” and “physical” spaces, and monetize their following by integrating “advertorials” into their blog or social media posts and making physical appearances at events. A pastiche of “advertisement” and “editorial”, advertorials in the Influencer industry are highly personalized, opinion-laden promotions of products/services that Influencers personally experience and endorse for a fee. Influencers in Singapore often brand themselves as having “relatability”, or the ability to persuade their followers to identify with them (Abidin). They do so by make consciously visible the backstage (Goffman) of the usually “inaccessible”, “personal”, and “private” aspects of mundane, everyday life to curate personae that feel “authentic” to fans (Marwick 114), and more accessible than traditional celebrity (Senft 16).Historically, the Influencer industry in Singapore can be traced back to the early beginnings of the “blogshop” industry from the mid-2000s and the “commercial blogging” industry. Influencers are predominantly young women, and market products and services from diverse industries, although the most popular have been fashion, beauty, F&B, travel, and electronics. Most prominent Influencers are contracted to management agencies who broker deals in exchange for commission and assist in the production of their vlogs. Since then, the industry has grown, matured, and expanded so rapidly that Influencers developed emergent models of advertorials, with the earliest cohorts moving into different life stages and monetizing several other aspects of their personal lives such as the “micro-microcelebrity” of their young children. What this paper provides is an important analysis of the genesis and normative practices of micro-microcelebrity commerce in Singapore from its earliest years, and future research trajectories in this field.Micro-Microcelebrity and Proximate MicrocelebrificationI define micro-microcelebrities as the children of Influencers who have themselves become proximate microcelebrities, having derived exposure and fame from their prominent Influencer mothers, usually through a more prolific, deliberate, and commercial form of what Blum-Ross defines as “sharenting”: the act of parents sharing images and stores about their children in digital spaces such as social networking sites and blogs. Marwick (116-117), drawing from Rojek’s work on types of celebrity – distinguishes between two types of microcelebrity: “ascribed microcelebrity” where the online personality is made recognizable through the “production of celebrity media” such as paparazzi shots and user-produced online memes, or “achieved microcelebrity” where users engage in “self-presentation strateg[ies]”, such as fostering the illusion of intimacy with fans, maintaining a persona, and selective disclosure about oneself.Micro-microcelebrities lie somewhere between the two: In a process I term “proximate microcelebrification”, micro-microcelebrities themselves inherit celebrity through the preemptive and continuous exposure from their Influencer mothers, many beginning even during the pre-birth pregnancy stages in the form of ultrasound scans, as a form of “achieved microcelebrity”. Influencer mothers whose “presentational strategies” (cf. Marshall, “Promotion” 45) are successful enough (as will be addressed later) gain traction among followers, who in turn further popularize the micro-microcelebrity by setting up fan accounts, tribute sites, and gossip forums through which fame is heightened in a feedback loop as a model of “ascribed microcelebrity”.Here, however, I refrain from conceptualizing these young stars as “micro-Influencers” for unlike Influencers, these children do not yet curate their self-presentation to command the attention of followers, but instead are used, framed, and appropriated by their mothers for advertorials. In other words, Influencer mothers “curate [micro-microcelebrities’] identities into being” (Leaver, “Birth”). Following this, many aspects of their micro-microcelebrities become rapidly commodified and commercialized, with advertisers clamoring to endorse anything from maternity hospital stays to nappy cream.Although children of mommybloggers have the prospect to become micro-microcelebrities, both groups are conceptually distinct. Friedman (200-201) argues that among mommybloggers arose a tension between those who adopt “the raw authenticity of nonmonetized blogging”, documenting the “unglamorous minutiae” of their daily lives and a “more authentic view of motherhood” and those who use mommyblogs “primarily as a source of extra income rather than as a site for memoir”, focusing on “parent-centered products” (cf. Mom Bloggers Club).In contrast, micro-microcelebrities and their digital presence are deliberately commercial, framed and staged by Influencer mothers in order to maximize their advertorial potential, and are often postured to market even non-baby/parenting products such as fast food and vehicles (see later). Because of the overt commerce, it is unclear if micro-microcelebrity displays constitute “intimate surveillance”, an “almost always well-intentioned surveillance of young people by parents” (Leaver, “Born” 4). Furthermore, children are generally peripheral to mommybloggers whose own parenting narratives take precedence as a way to connect with fellow mothers, while micro-microcelebrities are the primary feature whose everyday lives and digital presence enrapture followers.MethodologyThe analysis presented is informed by my original fieldwork with 125 Influencers and related actors among whom I conducted a mixture of physical and digital personal interviews, participant observation, web archaeology, and archival research between December 2011 and October 2014. However, the material presented here is based on my digital participant observation of publicly accessible and intentionally-public digital presence of the first four highly successful micro-microcelebrities in Singapore: “Baby Dash” (b.2013) is the son of Influencer xiaxue, “#HeYurou” (b.2011) is the niece of Influencer bongqiuqiu, “#BabyElroyE” (b.2014) is the son of Influencer ohsofickle, and “@MereGoRound” (b.2015) is the daughter of Influencer bongqiuqiu.The microcelebrity/social media handles of these children take different forms, following the platform on which their parent/aunt has exposed them on the most. Baby Dash appears in all of xiaxue’s digital platforms under a variety of over 30 indexical, ironic, or humourous hashtags (Leaver, “Birth”) including “#pointylipped”, #pineappledash”, and “#面包脸” (trans. “bread face”); “#HeYurou” appears on bongqiuqiu’s Instagram and Twitter; “#BabyElroyE” appears on ohsofickle’s Instagram and blog, and is the central figure of his mother’s new YouTube channel; and “@MereGoRound” appears on all of bongqiuqiu’s digital platforms but also has her own Instagram account and dedicated YouTube channel. The images reproduced here are screenshot from Influencer mothers’ highly public social media: xiaxue, bongqiuqiu, and ohsofickle boast 593k, 277k, and 124k followers on Instagram and 263k, 41k, and 17k followers on Twitter respectively at the time of writing.Anticipation and Digital EstatesIn an exclusive front-pager (Figure 1) on the day of his induced birth, it was announced that Baby Dash had already received up to SGD25,000 worth of endorsement deals brokered by his Influencer mother, xiaxue. As the first micro-microcelebrity in his cohort (his mother was among the pioneer Influencers), Baby Dash’s Caesarean section was even filmed and posted on xiaxue’s YouTube channel in three parts (Figure 2). xiaxue had announced her pregnancy on her blog while in her second trimester, following which she consistently posted mirror selfies of her baby bump.Figure 1 & 2, screenshot April 2013 from ‹instagram.com/xiaxue›In her successful attempt at generating anticipation, the “bump” itself seemed to garner its own following on Twitter and Instagram, with many followers discussing how the Influencer dressed “it”, and how “it” was evolving over the weeks. One follower even compiled a collage of xiaxue’s “bump” chronologically and gifted it to the Influencer as an art image via Twitter on the day she delivered Baby Dash (Figure 3 & 4). Followers also frequently speculated and bantered about how her baby would look, and mused about how much they were going to adore him. Figure 3 & 4, screenshot March 2013 from ‹twitter.com/xiaxue› While Lupton (42) has conceptualized the sharing of images that precede birth as a “rite of passage”, Influencer mothers who publish sonograms deliberately do so in order to claim digital estates for their to-be micro-microcelebrities in the form of “reserved” social media handles, blog URLs, and unique hashtags for self-branding. For instance, at the 3-month mark of her pregnancy, Influencer bongqiuqiu debuted her baby’s dedicated hashtag, “#MereGoRound” in a birth announcement on her on Instagram account. Shortly after, she started an Instagram account, “@MereGoRound”, for her baby, who amassed over 5.5k followers prior to her birth. Figure 5 & 6, screenshot March 2015 from instagram.com/meregoround and instagram.com/bongqiuqiuThe debut picture features a heavily pregnant belly shot of bongqiuqiu (Figure 5), creating much anticipation for the arrival of a new micro-microcelebrity: in the six months leading up to her birth, various family, friends, and fans shared Instagram images of their gifts and welcome party for @MereGoRound, and followers shared congratulations and fan art on the dedicated Instagram hashtag. During this time, bongqiuqiu also frequently updated followers on her pregnancy progress, not without advertising her (presumably sponsored) gynecologist and hospital stay in her pregnancy diaries (Figure 6) – like Baby Dash, even as a foetus @MereGoRound was accumulating advertorials. Presently at six months old, @MereGoRound boasts almost 40k followers on Instagram on which embedded in the narrative of her growth are sponsored products and services from various advertisers.Non-Baby-Related AdvertorialsPrior to her pregnancy, Influencer bongqiuqiu hopped onto the micro-microcelebrity bandwagon in the wake of Baby Dash’s birth, by using her niece “#HeYurou” in her advertorials. Many Influencers attempt to naturalize their advertorials by composing their post as if recounting a family event. With reference to a child, parent, or partner, they may muse or quip about a product being used or an experience being shared in a bid to mask the distinction between their personal and commercial material. bongqiuqiu frequently posted personal, non-sponsored images engaging in daily mundane activities under the dedicated hashtag “#HeYurou”.However, this was occasionally interspersed with pictures of her niece holding on to various products including storybooks (Figure 8) and shopping bags (Figure 9). At first glance, this might have seemed like any mundane daily update the Influencer often posts. However, a close inspection reveals the caption bearing sponsor hashtags, tags, and campaign information. For instance, one Instagram post shows #HeYurou casually holding on to and staring at a burger in KFC wrapping (Figure 7), but when read in tandem with bongqiuqiu’s other KFC-related posts published over a span of a few months, it becomes clear that #HeYurou was in fact advertising for KFC. Figure 7, 8, 9, screenshot December 2014 from ‹instagram.com/bongqiuqiu›Elsewhere, Baby Dash was incorporated into xiaxue’s car sponsorship with over 20 large decals of one of his viral photos – dubbed “pineapple Dash” among followers – plastered all over her vehicle (Figure 10). Followers who spot the car in public are encouraged to photograph and upload the image using its dedicated hashtag, “#xiaxuecar” as part of the Influencer’s car sponsorship – an engagement scarcely related to her young child. Since then, xiaxue has speculated producing offshoots of “pineapple Dash” products including smartphone casings. Figure 10, screenshot December 2014 from ‹instagram.com/xiaxue›Follower EngagementSponsors regularly organize fan meet-and-greets headlined by micro-microcelebrities in order to attract potential customers. Photo opportunities and the chance to see Baby Dash “in the flesh” frequently front press and promotional material of marketing campaigns. Elsewhere on social media, several Baby Dash fan and tribute accounts have also emerged on Instagram, reposting images and related media of the micro-microcelebrity with overt adoration, no doubt encouraged by xiaxue, who began crowdsourcing captions for Baby Dash’s photos.Influencer ohsofickle postures #BabyElroyE’s follower engagement in a more subtle way. In her YouTube channel that debut in the month of her baby’s birth, ohsofickle produces video diaries of being a young, single, mother who is raising a child (Figure 11). In each episode, #BabyElroyE is the main feature whose daily activities are documented, and while there is some advertising embedded, ohsofickle’s approach on YouTube is much less overt than others as it features much more non-monetized personal content (Figure 12). Her blog serves as a backchannel to her vlogs, in which she recounts her struggles with motherhood and explicitly solicits the advice of mothers. However, owing to her young age (she became an Influencer at 17 and gave birth at 24), many of her followers are teenagers and young women who respond to her solicitations by gushing over #BabyElroyE’s images on Instagram. Figure 11 & 12, screenshot September 2015 from ‹instagram.com/ohsofickle›PrivacyAs noted by Holloway et al. (23), children like micro-microcelebrities will be among the first cohorts to inherit “digital profiles” of their “whole lifetime” as a “work in progress”, from parents who habitually underestimate or discount the privacy and long term effects of publicizing information about their children at the time of posting. This matters in a climate where social media platforms can amend privacy policies without user consent (23), and is even more pressing for micro-microcelebrities whose followers store, republish, and recirculate information in fan networks, resulting in digital footprints with persistence, replicability, scalability, searchability (boyd), and extended longevity in public circulation which can be attributed back to the children indefinitely (Leaver, “Ends”).Despite minimum age restrictions and recent concerns with “digital kidnapping” where users steal images of other young children to be re-posted as their own (Whigham), some social media platforms rarely police the proliferation of accounts set up by parents on behalf of their underage children prominently displaying their legal names and life histories, citing differing jurisdictions in various countries (Facebook; Instagram), while others claim to disable accounts if users report an “incorrect birth date” (cf. Google for YouTube). In Singapore, the Media Development Authority (MDA) which governs all print and digital media has no firm regulations for this but suggests that the age of consent is 16 judging by their recommendation to parents with children aged below 16 to subscribe to Internet filtering services (Media Development Authority, “Regulatory” 1). Moreover, current initiatives have been focused on how parents can impart digital literacy to their children (Media Development Authority, “Empowered”; Media Literacy Council) as opposed to educating parents about the digital footprints they may be unwittingly leaving about their children.The digital lives of micro-microcelebrities pose new layers of concern given their publicness and deliberate publicity, specifically hinged on making visible the usually inaccessible, private aspects of everyday life (Marshall, “Persona” 5).Scholars note that celebrities are individuals for whom speculation of their private lives takes precedence over their actual public role or career (Geraghty 100-101; Turner 8). However, the personae of Influencers and their young children are shaped by ambiguously blurring the boundaries of privacy and publicness in order to bait followers’ attention, such that privacy and publicness are defined by being broadcast, circulated, and publicized (Warner 414). In other words, the publicness of micro-microcelebrities is premised on the extent of the intentional publicity rather than simply being in the public domain (Marwick 223-231, emphasis mine).Among Influencers privacy concerns have aroused awareness but not action – Baby Dash’s Influencer mother admitted in a national radio interview that he has received a death threat via Instagram but feels that her child is unlikely to be actually attacked (Channel News Asia) – because privacy is a commodity that is manipulated and performed to advance their micro-microcelebrities’ careers. As pioneer micro-microcelebrities are all under 2-years-old at present, future research warrants investigating “child-centred definitions” (Third et al.) of the transition in which they come of age, grow an awareness of their digital presence, respond to their Influencer mothers’ actions, and potentially take over their accounts.Young LabourThe Ministry of Manpower (MOM) in Singapore, which regulates the employment of children and young persons, states that children under the age of 13 may not legally work in non-industrial or industrial settings (Ministry of Manpower). However, the same document later ambiguously states underaged children who do work can only do so under strict work limits (Ministry of Manpower). Elsewhere (Chan), it is noted that national labour statistics have thus far only focused on those above the age of 15, thus neglecting a true reflection of underaged labour in Singapore. This is despite the prominence of micro-microcelebrities who are put in front of (video) cameras to build social media content. Additionally, the work of micro-microcelebrities on digital platforms has not yet been formally recognized as labour, and is not regulated by any authority including Influencer management firms, clients, the MDA, and the MOM. Brief snippets from my ethnographic fieldwork with Influencer management agencies in Singapore similarly reveal that micro-microcelebrities’ labour engagements and control of their earnings are entirely at their parents’ discretion.As models and actors, micro-microcelebrities are one form of entertainment workers who if between the ages of 15 days and 18 years in the state of California are required to obtain an Entertainment Work Permit to be gainfully employed, adhering to strict work, schooling, and rest hour quotas (Department of Industrial Relations). Furthermore, the Californian Coogan Law affirms that earnings by these minors are their own property and not their parents’, although they are not old enough to legally control their finances and rely on the state to govern their earnings with a legal guardian (Screen Actors Guild). However, this similarly excludes underaged children and micro-microcelebrities engaged in creative digital ecologies. Future research should look into safeguards and instruments among young child entertainers, especially for micro-micrcocelebrities’ among whom commercial work and personal documentation is not always distinct, and are in fact deliberately intertwined in order to better engage with followers for relatabilityGrowing Up BrandedIn the wake of moral panics over excessive surveillance technologies, children’s safety on the Internet, and data retention concerns, micro-microcelebrities and their Influencer mothers stand out for their deliberately personal and overtly commercial approach towards self-documenting, self-presenting, and self-publicizing from the moment of conception. As these debut micro-microcelebrities grow older and inherit digital publics, personae, and careers, future research should focus on the transition of their ownership, engagement, and reactions to a branded childhood in which babies were postured for an initimate public.ReferencesAbidin, Crystal. “Communicative Intimacies: Influencers and Perceived Interconnectedness.” Ada: A Journal of Gender, New Media, & Technology. Forthcoming, Nov 2015.Aiello, Marianne. “Mommy Blog Banner Ads Get Results.” Healthcare Marketing Advisor 17 Nov. 2010. HealthLeaders Media. 16 Aug. 2015 ‹http://healthleadersmedia.com/content/MAR-259215/Mommy-Blog-Banner-Ads-Get-Results›.Azzarone, Stephanie. “When Consumers Report: Mommy Blogging Your Way to Success.” Playthings 18 Feb. 2009. Upfront: Marketing. 16 Aug. 2015 ‹http://mamanista.com/media/Mamanista_playthings_full.pdf›.Blum-Ross, Alicia. “’Sharenting’: Parent Bloggers and Managing Children’s Digital Footprints.” Parenting for a Digital Future, 17 Jun. 2015. 16 Aug. 2015 ‹http://blogs.lse.ac.uk/parenting4digitalfuture/2015/06/17/managing-your-childs-digital-footprint-and-or-parent-bloggers-ahead-of-brit-mums-on-the-20th-of-june/›.boyd, danah. “Social Network Sites and Networked Publics: Affordances, Dymanics and Implications.” A Networked Self: Identity, Community, and Culture on Social Network Sites. Ed. Zizi Papacharissi. London: Routledge, 2010. 39–58.Business Wire. “Attention All Mommy Bloggers: TheBump.com Launches 2nd Annual The Bump Mommy Blog Awards.” Business Wire 2 Nov. 2010. 16 Aug. 2015 ‹http://www.businesswire.com/news/home/20101102007005/en/Attention-Mommy-Bloggers-TheBump.com-Launches-2nd-Annual#.VdDsXp2qqko›.Channel News Asia. “Blogger Xiaxue ‘On the Record’.” Channel News Asia 10 Jul. 2015. 16 Aug. 2015 ‹http://www.channelnewsasia.com/news/singapore/blogger-xiaxue-on-the/1975712.html›.Chan, Wing Cheong. “Protection of Underaged Workers in Singapore: Domestic and International Regulation.” Singapore Academy of Law Journal 17 (2005): 668-692. ‹http://www.sal.org.sg/digitallibrary/Lists/SAL%20Journal/Attachments/376/2005-17-SAcLJ-668-Chan.pdf›.Department of Industrial Relations. “California Child Labor Laws.” Department of Industrial Relations, 2013. 16 Aug. 2015 ‹http://www.dir.ca.gov/DLSE/ChildLaborLawPamphlet.pdf›.Facebook. “How Do I Report a Child under the Age of 13?” Facebook 2015. 16 Aug. 2015 ‹https://www.facebook.com/help/157793540954833›.Friedman, Mary. Mommyblogs and the Changing Face of Motherhood. Toronto, ON: University of Toronto Press, 2013.Geraghty, Christine. “Re-Examining Stardom: Questions of Texts, Bodies and Performance.” Stardom and Celebrity: A Reader. Eds. Sean Redmond & Su Holmes. Los Angeles: Sage, 2007. 98-110.Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin Books, 1956. Google. “Age Requirements on Google Accounts.” Google Support 2015. 16 Aug. 2015 ‹https://support.google.com/accounts/answer/1350409?hl=en›.Holloway, Donell, Lelia Green, and Sonia Livingstone. “Zero to Eight: Young Children and Their Internet Use.” EU Kids Online 2013. London: London School of Economics. 16. Aug 2015 ‹http://eprints.lse.ac.uk/52630/1/Zero_to_eight.pdf›.Howell, Whitney L.J. “Mom-to-Mom Blogs: Hospitals Invite Women to Share Experiences.” H&HN 84.10(2010): 18. ‹http://connection.ebscohost.com/c/articles/54858655/mom-to-mom-blogs-hospitals-invite-women-share-experiences-mommy-blogs-are-catching-as-way-let-parents-interact-compare-notes›.Instagram. “Tips for Parents.” Instagram Help 2015. 16 Aug. 2015 ‹https://help.instagram.com/154475974694511/›.Katz, Elihu, and Paul F. Lazarsfeld. Personal Influence: The Part Played by People in the Flow of Mass Communications. New Brunswick: Transaction Publishers, 2009. Leaver, Tama. “The Ends of Online Identity”. Paper presented at Internet Research 12, Seattle, 2011.Leaver, Tama. “Birth and Death on Social Media: Dr Tama Leaver.” Lecture presented at Curtin University, 20 Jul. 2015.. 16 Aug. 2015 ‹https://www.youtube.com/watch?v=rQ6eW6qxGx8›.Leaver, Tama. “Born Digital? Presence, Privacy, and Intimate Surveillance.” Re-Orientation: Translingual Transcultural Transmedia: Studies in Narrative, Language, Identity, and Knowledge. Eds. John Hartley & Weiguo Qu. Fudan University Press, forthcoming.Lupton, Deborah. The Social Worlds of the Unborn. Basingstoke: Palgrave MacMillan, 2013.Marshall, P. David. "The Promotion and Presentation of the Self: Celebrity as Marker of Presentational Media." Celebrity Studies 1.1 (2010): 35-48. Marshall, P. David. “Persona Studies: Mapping the Proliferation of the Public Self.” Journalism 15.2 (2013): 153-170. Marwick, Alice E. Status Update: Celebrity, Publicity, & Branding in the Social Media Age. New Haven, CT: Yale University Press, 2013.Media Development Authority. “The Regulatory Options to Facilitate the Adoption of Internet Parental Controls.” Regulations and Licensing 2015. 16 Aug. 2015 ‹http://www.mda.gov.sg/RegulationsAndLicensing/Consultation/Documents/Consultation%20Papers/Public%20consultation%20paper%20for%20Internet%20parental%20controls_21%20Apr_final.pdf›.Media Development Authority. “Be Empowered! Protecting Your Kids in the Digital Age.” Documents 2015. 16 Aug. 2015 ‹http://www.mda.gov.sg/Documents/Newsletter/Issue08/Pages/02.aspx.html›.Media Literacy Council. “Clique Click: Bringing Up Children in the Digital Age.” Resources 2014. 16 Aug. 2015 ‹http://www.medialiteracycouncil.sg/Lists/Resources/Attachments/176/Clique%20Click.pdf›.Ministry of Manpower. “Employing Young Persons and Children.” Employment 26 May 2014. 16 Aug. 2015 ‹http://www.mom.gov.sg/employment-practices/young-persons-and-children›.Mom Bloggers Club. “Eight Proven Ways to Monetize Your Mom Blog.” Mom Bloggers Club 19 Nov. 2009. 15 Aug. 2015 ‹http://www.mombloggersclub.com/page/eight-proven-ways-to-monetize?id=988554%3APage%3A345278&page=3#comments›.Morrison, Aimee. “‘Suffused by Feeling and Affect:’ The Intimate Public of Personal Mommy Blogging.” Biography 34.1 (2011): 37-55.Nash, Meredith. “Shapes of Motherhood: Exploring Postnatal Body Image through Photographs.” Journal of Gender Studies (2013): 1-20. ‹http://www.tandfonline.com/doi/abs/10.1080/09589236.2013.797340#.VdDsvZ2qqko›.Rojek, Chris. Celebrity. London: Reaktion Books, 2001. Screen Actors Guild. “Coogan Law.” SAGAFTRA 2015. 16 Aug. 2015 ‹http://www.sagaftra.org/content/coogan-law›.Senft, Theresa. M. Camgirls: Celebrity & Community in the Age of Social Networks. New York, NY: Peter Lang, 2008.Stevenson, Seth. “Popularity Counts.” Wired 20.5 (2012): 120.Tatum, Christine. “Mommy Blogs Mull and Prove Market Might.” Denver Post 23 Oct 2007. 16 Aug. 2015 ‹http://www.denverpost.com/search/ci_7250753›.Third, Amanda, Delphine Bellerose, Urszula Dawkins, Emma Keltie, and Kari Pihl. “Children’s Rights in the Digital Age.” Young and Well Cooperative Research Centre 2014. 16 Aug. 2015 ‹http://www.youngandwellcrc.org.au/wp-content/uploads/2014/10/Childrens-Rights-in-the-Digital-Age_Report_single_FINAL_.pdf >.Thompson, Stephanie. “Mommy Blogs: A Marketer’s Dream; Growing Number of Well-Produced Sites Put Advertisers in Touch with an Affluent, Loyal Demo.” AD AGE 26 Feb. 2007. 16 Aug. 2015 ‹http://adage.com/article/digital/mommy-blogs-a-marketer-s-dream/115194/›.Turner, Graeme. Understanding Celebrity. Los Angeles: Sage, 2004.Warner, Michael. “Publics and Counter Publics.” Quarterly Journal of Speech 88.4 (2002): 413-425. Whigham, Nick. “Digital Kidnapping Will Make You Think Twice about What You Post to Social Media.” News.com.au 15 July 2015. 16 Aug. 2015 ‹http://www.news.com.au/lifestyle/real-life/digital-kidnapping-will-make-you-think-twice-about-what-you-post-to-social-media/story-fnq2oad4-1227449635495›.
APA, Harvard, Vancouver, ISO, and other styles
45

Gregson, Kimberly. "Bad Avatar!" M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2708.

Full text
Abstract:
While exploring the virtual world Second Life one day, I received a group message across the in-world communication system – “there’s a griefer on the beach. Stay away from the beach till we catch him.” There was no need to explain; everyone receiving the message knew what a griefer was and had a general idea of the kinds of things that could be happening. We’d all seen griefers at work before – someone monopolising the chat channel so no one else can communicate, people being “caged” at random, or even weapons fire causing so much “overhead” that all activity in the area slows to a crawl. These kinds of attacks are not limited to virtual worlds. Most people have experienced griefing in their everyday lives, which might best be defined as having fun at someone else’s expense. More commonly seen examples of this in the real world include teasing, bullying, and harassment; playground bullies have long made other children’s free time miserable. More destructive griefing includes arson and theft. Griefing activities happen in all kinds of games and virtual worlds. Griefers who laugh at new users and “yell” (so that all players can hear) that they stink, have followed new users of Disney’s tween-popular ToonTown. Griefers pose as friendly, helpful players who offer to show new users a path through difficult parts of a game, but then who abandon the new user in a spot where he or she does not have the skills to proceed. In World of Warcraft, a popular massively multiplayer online role playing game (MMORPG) created by Blizzard with more than seven million registered, if not active, users, griefers engage in what is known as corpse camping; they sit by a corpse, killing it over and over every time the player tries to get back into the game. The griefer gets a small number of experience points; the player being killed gets aggravated and has to wait out the griefing to play the game again (Warner & Raiter). Griefing in World of Warcraft was featured in an award nominated episode of the television program South Park, in which one character killed every other player he met. This paper considers different types of griefing, both in online games and virtual worlds, and then looks at the actions other players, those being griefed, take against griefers. A variety of examples from Second Life are considered because of the open-structure of the world and its developing nature. Definitions and Types Griefing in online environments such as video games and virtual worlds has been defined as “purposefully engaging in activities to disrupt the gaming experience of other players” (Mulligan & Patrovsky 250). The “purposeful” part of the definition means that accidental bumping and pushing, behaviours often exhibited by new users, are not griefing (Warner & Raiter). Rossingol defines a griefer as, “a player of malign intentions. They will hurt, humiliate and dishevel the average gamer through bending and breaking the rules of online games. ...They want glory, gain or just to partake in a malignant joy at the misfortune of others.” Davis, who maintains a gaming blog, describes Second Life as being populated by “those who build things and those who like to tear them down,” with the latter being the griefers who may be drawn to the unstructured anything-goes nature of the virtual world (qtd. in Girard). Definitions of griefing differ based on context. For instance, griefing has been examined in a variety of multi-player online games. These games often feature missions where players have to kill other players (PvP), behaviour that in other contexts such as virtual worlds would be considered griefing. Putting a monster on the trail of a player considered rude or unskilled might be a way to teach a lesson, but also an example of griefing (Taylor). Foo and Koivisto define griefing in MMORPGs as “play styles that disrupt another player’s gaming experience, usually with specific intention. When the act is not specifically intended to disrupt and yet the actor is the sole beneficiary, it is greed play, a subtle form of grief play” (11). Greed play usually involves actions that disrupt the game play of others but without technically breaking any game rules. A different way of looking at griefing is that it is a sign that the player understands the game or virtual world deeply enough to take advantage of ambiguities in the rules by changing the game to something new (Koster). Many games have a follow option; griefers pick a victim, stand near them, get as naked as possible, and then just follow them around without talking or explaining their actions (Walker). Another example is the memorial service in World of Warcraft for a player who died in real life. The service was interrupted by an attack from another clan; everyone at the memorial service was killed. It is not clear cut who the griefers actually were in this case – the mourners who chose to have their peaceful service in an area marked for player combat or the attackers following the rules for that area and working to earn points and progress in the game. In the case of the mourners, they were changing the rules of the game to suit them, to create something unique – a shared space to mourn a common friend. But they were definitely not playing by the rules. The attackers, considered griefers by many both in and outside of the game, did nothing that broke any rules of the game, though perhaps they broke rules of common decency (“World”); what they did does not fit into the definition of griefing, as much as do the actions of the mourners (Kotaku). Reshaping the game can be done to embed a new, sometimes political, message into the game. A group named Velvet Strike formed to protest US military action. They went into Counter Strike to bring a “message of peace, love and happiness to online shooters by any means necessary” (King). They placed spray painted graphics containing anti-war messages into the game; when confronted with people from other teams the Velvet Strike members refused to shoot (King). The group website contains “recipes” for non-violent game play. One “recipe” involved the Velvet Strike member hiding at the beginning of a mission and not moving for the rest of the game. The other players would shoot each other and then be forced to spend the rest of the game looking for the last survivor in order to get credit for the win. Similar behaviour has been tried inside the game America’s Army. Beginning March, 2006, deLappe, an artist who opposes the U.S. government’s involvement in Iraq, engaged in griefing behaviour by filling (spamming) the in-game text channel with the names of the people killed in the war; no one else can communicate on that channel. Even his character name, dead-in-Iraq, is an anti-war protest (deLappe). “I do not participate in the proscribed mayhem. Rather, I stand in position and type until I am killed. After death, I hover over my dead avatar’s body and continue to type. Upon being re-incarnated in the next round, I continue the cycle” (deLappe n.p.). What about these games and virtual worlds might lead people to even consider griefing? For one thing, they seem anonymous, which can lead to irresponsible behaviour. Players use fake names. Characters on the screen do not seem real. Another reason may be that rules can be broken in videogames and virtual worlds with few consequences, and in fact the premise of the game often seems to encourage such rule breaking. The rules are not always clearly laid out. Each game or world has a Terms of Service agreement that set out basic acceptable behaviour. Second Life defines griefing in terms of the Terms of Service that all users agree to when opening accounts. Abuse is when someone consciously and with malicious intent violates those terms. On top of that limited set of guidelines, each landowner in a virtual world such as Second Life can also set rules for their own property, from dress code, to use of weapons, to allowable conversation topics. To better understand griefing, it is necessary to consider the motivations of the people involved. Early work on categorising player types was completed by Bartle, who studied users of virtual worlds, specifically MUDs, and identified four player types: killers, achievers, socialisers, and explorers. Killers and achievers seem most relevant in a discussion about griefing. Killers enjoy using other players to get ahead. They want to do things to other people (not for or with others), and they get the most pleasure if they can act without the consent of the other player. Knowing about a game or a virtual world gives no power unless that knowledge can be used to gain some advantage over others and to enhance your standing in the game. Achievers want power and dominance in a game so they can do things to the game and master it. Griefing could help them feel a sense of power if they got people to do their will to stop the griefing behavior. Yee studied the motivations of people who play MMORPGs. He found that people who engage in griefing actually scored high in being motivated to play by both achieving and competition (“Facets”). Griefers often want attention. They may want to show off their scripting skills in the hope of earning respect among other coders and possibly be hired to program for others. But many players are motivated by a desire to compete and to win; these categories do not seem to be adequate for understanding the different types of griefing (Yee, “Faces of Grief”). The research on griefing in games has also suggested ways to categorise griefers in virtual worlds. Suler divides griefers into two types (qtd. in Becker). The first is those who grief in order to make trouble for authority figures, including the people who create the worlds. A few of the more spectacular griefing incidents seem designed to cause trouble for Linden Lab, the creators of Second Life. Groups attacked the servers that run Second Life, known as the grid, in October of 2005; this became known as the “gray goo attack” (Second Life; Wallace). Servers were flooded with objects and Second Life had to be taken off line to be restored from backups. More organised groups, such as the W-hats, the SL Liberation Army, and Patriotic Nigas engage in more large scale and public griefing. Some groups hope to draw attention to the group’s goals. The SL Liberation Army wants Linden Lab to open up the governance of the virtual world so that users can vote on changes and policies being implemented and limit corporate movement into Second Life (MarketingVox). Patriotic Nigas, with about 35 active members, want to slow the entry of corporations into Second Life (Cabron, “Who are Second Life’s”). One often discussed griefer attack in Second Life included a flood of pink flying penises directed against land owner and the first person to have made a profit of more than one million United States dollars in a virtual world, Anshe Chung, during a well-publicised and attended interview in world with technology news outlet CNET (Walsh, “Second Life Millionaire” ). The second type proposed by Suler is the griefer who wants to hurt and victimise others (qtd. in Becker). Individual players often go naked into PG-rated areas to cause trouble. Weapons are used in areas where weapons are banned. Second Life publishes a police blotter, which lists examples of minor griefing and assigned punishment, including incidents of disturbing the peace and violating community standards for which warnings and short bans have been issued. These are the actions of individuals for the most part, as were the people who exploited security holes to enter the property uninvited during the grand opening of Endemol’s Big Brother island in Second Life; guests to the opening were firebombed and caged. One of the griefers explained her involvement: Well I’m from The Netherlands, and as you might know the tv concept of big brother was invented here, and it was in all the newspapers in Holland. So I thought It would be this huge event with lots of media. Then I kinda got the idea ‘hey I could ruin this and it might make the newspaper or tv. So that’s what set me off, lol. (qtd. in Sklar) Some groups do grief just to annoy. The Patriotic Nigas claim to have attacked the John Edwards headquarters inside SL wearing Bush ‘08 buttons (Cabron, “John Edwards Attackers”), but it was not a political attack. The group’s founder, Mudkips Acronym (the name of his avatar in SL) said, “I’m currently rooting for Obama, but that doesn’t mean we won’t raid him or anything. We’ll hit anyone if it’s funny, and if the guy I want to be president in 2008’s campaign provides the lulz, we’ll certainly not cross him off our list” (qtd. in Cabron, “John Edwards Attackers”). If they disrupt a high profile event or site, the attack will be covered by media that can amplify the thrill of the attack, enhance their reputation among other griefers, and add to their enjoyment of the griefing. Part of the definition of griefing is that the griefer enjoys causing other players pain and disrupting their game. One resident posted on the SL blog, “Griefers, for the most part, have no other agenda other than the thrill of sneaking one past and causing a big noise. Until a spokesperson comes forward with a manifesto, we can safely assume that this is the work of the “Jackass” generation, out to disrupt things to show that they can“ (Scarborough). Usually to have fun, griefers go after individuals, rather than the owners and administrators of the virtual world and so fit into Suler’s second type of griefing. These griefers enjoy seeing others get angry and frustrated. As one griefer said: Understanding the griefer mindset begins with this: We don’t take the game seriously at all. It continues with this: It’s fun because you react. Lastly: We do it because we’re jerks and like to laugh at you. I am the fly that kamikazes into your soup. I am the reason you can’t have nice things … . If I make you cry, you’ve made my day. (Drake) They have fun by making the other players mad. “Causing grief is the name of his game. His objective is simple: Make life hell for anyone unlucky enough to be playing with him. He’s a griefer. A griefer is a player bent on purposely frustrating others during a multiplayer game” (G4). “I’m a griefer. It’s what I do,” the griefer says. “And, man, people get so pissed off. It’s great” (G4). Taking Action against Griefers Understanding griefing from the griefer point of view leads us to examine the actions of those being griefed. Suler suggests several pairs of opposing actions that can be taken against griefers, based on his experience in an early social environment called Palace. Many of the steps still being used fit into these types. He first describes preventative versus remedial action. Preventative steps include design features to minimise griefing. The Second Life interface includes the ability to build 3D models and to create software; it also includes a menu for land owners to block those features at will, a design feature that helps prevent much griefing. Remedial actions are those taken by the administrators to deal with the effects of griefing; Linden Lab administrators can shut down whole islands to keep griefer activities from spreading to nearby islands. The second pair is interpersonal versus technical; interpersonal steps involve talking to the griefers to get them to stop ruining the game for others, while technical steps prevent griefers from re-entering the world. The elven community in Second Life strongly supports interpersonal steps; they have a category of members in their community known as guardians who receive special training in how to talk to people bent on destroying the peacefulness of the community or disturbing an event. The creators of Camp Darfur on Better World island also created a force of supporters to fend off griefer attacks after the island was destroyed twice in a week in 2006 (Kenzo). Linden Lab also makes use of technical methods; they cancel accounts so known griefers can not reenter. There were even reports that they had created a prison island where griefers whose antics were not bad enough to be totally banned would be sent via a one-way teleporter (Walsh, “Hidden Virtual World Prison”). Some users of Second Life favour technical steps; they believe that new users should be held a fixed amount of time on the Orientation island which would stop banned users from coming back into the world immediately. The third is to create tools for average users or super users (administrators); both involve software features, some of which are available to all users to help them make the game good for them while others are available only to people with administrator privileges. Average users who own land have a variety of tools available to limit griefing behaviour on their own property. In Second Life, the land owner is often blamed because he or she did not use the tools provided to landowners by Linden Lab; they can ban individual users, remove users from the land, mute their conversation, return items left on the property, and prevent people from building or running scripts. As one landowner said, “With the newbies coming in there, I’ve seen their properties just littered with crap because they don’t know protective measures you need to take as far as understanding land control and access rights” (qtd. in Girard). Super users, those who work for Linden Lab, can remove a player from the game for a various lengths of time based on their behaviour patterns. Responses to griefers can also be examined as either individual or joint actions. Individual actions include those that land owners can take against individual griefers. Individual users, regardless of account type, can file abuse reports against other individuals; Linden Lab investigates these reports and takes appropriate action. Quick and consistent reporting of all griefing, no matter how small, is advocated by most game companies and user groups as fairly successful. Strangely, some types of joint actions have been not so successful. Landowners have tried to form the Second Life Anti-Griefing Guild, but it folded because of lack of involvement. Groups providing security services have formed; many event organisers use this kind of service. (Hoffman). More successful efforts have included the creation of software, such as SLBanLink.com, Karma, and TrustNet that read lists of banned users into the banned list on all participating property. A last category of actions to be taken against griefers, and a category used by most residents of virtual worlds, is to leave them alone—to ignore them, to tolerate their actions. The thinking is that, as with many bullies in real life, griefers want attention; when deprived of that, they will move on to find other amusements. Yelling and screaming at griefers just reinforces their bad behaviour. Users simply teleport to other locations or log off. They warn others of the griefing behaviour using the various in-world communication tools so they too can stay away from the griefers. Most of the actions described above are not useful against griefers for whom a bad reputation is part of their credibility in the griefer community. The users of Second Life who staged the Gray Goo denial of service attack in October, 2005 fit into that category. They did nothing to hide the fact that they wanted to cause massive trouble; they named the self-replicating object that they created Grief Spawn and discussed ways to bring down the world on griefer forums (Wallace) Conclusion The most effective griefing usually involves an individual or small group who are only looking to have fun at someone else’s expense. It’s a small goal, and as long as there are any other users, it is easy to obtain the desired effect. In fact, as word spreads of the griefing and users feel compelled to change their behaviour to stave off future griefer attacks, the griefers have fun and achieve their goal. The key point here is that everyone has the same goal – have fun. Unfortunately, for one group – the griefers – achieving their goal precludes other users from reaching theirs. Political griefers are less successful in achieving their goals. Political creative play as griefing, like other kinds of griefing, is not particularly effective, which is another aspect of griefing as error. Other players react with frustration and violence to the actions of griefers such as deLappe and Velvet-Strike. If griefing activity makes people upset, they are less open to considering the political or economic motives of the griefers. Some complaints are relatively mild; “I’m all for creative protest and what not, but this is stupid. It’s not meaningful art or speaking out or anything of the type, its just annoying people who are never going to change their minds about how awesome they think war is” (Borkingchikapa). Others are more negative: “Somebody really needs to go find where that asshole lives and beat the shit out of him. Yeah, it’s a free country and he can legally pull this crap, but that same freedom extends to some patriot kicking the living shit out of him” (Reynolds). In this type of griefing no one’s goals for using the game are satisfied. The regular users can not have fun, but neither do they seem to be open to or accepting of the political griefer’s message. This pattern of success and failure may explain why there are so many examples of griefing to disrupt rather then the politically motivated kind. It may also suggest why efforts to curb griefing have been so ineffective in the past. Griefers who seek to disrupt for fun would see it as a personal triumph if others organised against them. Even if they found themselves banned from one area, they could quickly move somewhere else to have their fun since whom or where they harass does not really matter. Perhaps not all griefing is in error, rather, only those griefing activities motivated by any other goal than have fun. People invest their time and energy in creating their characters and developing skills. The behaviour of people in these virtual environments has a definite bearing on the real world. And perhaps that explains why people in these virtual worlds react so strongly to the behaviour. So, remember, stay off the beach until they catch the griefers, and if you want to make up the game as you go along, be ready for the other players to point at you and say “Bad, Bad Avatar.” References Bartle, Richard. “Players Who Suit MUDs.” Journal of MUD Research 1.1 (June 1996). 10 Sep. 2007 http://www.mud.co.uk/richard/hcds.htm>. Becker, David. Inflicting Pain on “Griefers.” 13 Dec. 2004. 10 Oct. 2007 http://www.news.com/Inflicting-pain-on-griefers/2100-1043_3-5488403.html>. Borkingchikapa. Playing America’s Army. 30 May 2006. 10 Aug. 2007 http://www.metafilter.com/51938/playing-Americas-Army>. Cabron, Lou. John Edwards Attackers Unmasked. 5 Mar. 2007. 29 Apr. 2007 http://www.10zenmonkeys.com/2007/03/05/john-edwards-virtual-attackers-unmasked/>. Cabron, Lou. Who Are Second Life’s “Patriotic Nigas”? 8 Mar. 2007. 30 Apr. 2007 http://www.10zenmonkeys.com/2007/03/08/patriotic-nigras-interview-john-edwards-second-life/>. DeLappe, Joseph. Joseph deLappe. 2006. 10 Aug. 2007. http://www.unr.edu/art/DELAPPE/DeLappe%20Main%20Page/DeLappe%20Online%20MAIN.html>. Drake, Shannon. “Jerk on the Internet.” The Escapist Magazine 15 Nov. 2005: 31-32. 20 June 2007 http://www.escapistmagazine.com/issue/19/31>. Foo, Chek Yang. Redefining Grief Play. 2004. 10 Oct. 2007 http://64.233.167.104/search?q=cache:1mBYzWVqAsIJ:www.itu.dk/op/papers/ yang_foo.pdf+foo+koivisto&hl=en&ct=clnk&cd=7&gl=us&client=firefox-a>. Foo, Chek Yang, and Elina Koivisto. Grief Player Motivations. 2004. 15 Aug. 2007 http://www.itu.dk/op/papers/yang_foo_koivisto.pdf>. G4. Confessions of a Griefer. N.D. 21 June 2007 http://www.g4tv.com/xplay/features/42527/Confessions_of_a_Griefer.html>. Girard, Nicole. “Griefer Madness: Terrorizing Virtual Worlds.”_ Linux Insider_ 19 Sep. 2007. 3 Oct. 2007 http://www.linuxinsider.com/story/59401.html>. Hoffman, E. C. “Tip Sheet: When Griefers Attack.” Business Week. 2007. 21 June 2007 http://www.businessweek.com/playbook/07/0416_1.htm>. Kenzo, In. “Comment: Has Plastic Duck Migrated Back to SL?” Second Life Herald Apr. 2006. 10 Oct. 2007 http://www.secondlifeherald.com/slh/2006/04/has_plastic_duc.html>. King, Brad. “Make Love, Not War.” Wired June 2002. 10 Aug. 2007 http://www.wired.com/gaming/gamingreviews/news/2002/06/52894>. Koster, Raph. A Theory of Fun for Game Design. Scotsdale, AZ: Paraglyph, 2005. Kotaku. _WoW Funeral Party Gets Owned. _2006. 15 Aug. 2007 http://kotaku.com/gaming/wow/wow-funeral-party-gets-owned-167354.php>. MarketingVox. Second Life Liberation Army Targets Brands. 7. Dec. 2006. 10 Aug. 2007 http://www.marketingvox.com/archives/2006/12/07/second-life-liberation-army-targets-brands/>. Mulligan, Jessica, and Bridget Patrovsky. Developing Online Games: An Insider’s Guide. Indianapolis: New Riders, 2003. Reynolds, Ren. Terra Nova: dead-in-iraq. 7 May 2006. 15 Aug. 2007 http://terranova.blogs.com/terra_nova/2006/05/deadiniraq_.html>. Rossingnol, Jim. “A Deadly Dollar.” The Escapist Magazine 15 Nov. 2005: 23-27. 20 June 2007 http://www.escapistmagazine.com/issue/19/23>. Scarborough, Solivar. Mass Spam Issue Inworld Being Investigated. 13 Oct. 2006. 20 June 2007 http://blog.secondlife.com/2006/10/13/mass-spam-issue-inworld-being-investigated/>. Sklar, Urizenus. “Big Brother Opening Hypervent Griefed for 4 Hours.” Second Life Herald 12 Dec. 2006. 10 Aug. 2007 http://www.secondlifeherald.com/slh/2006/12/big_brother_ope.html>. Suler, John. The Bad Boys of Cyberspace. 1997. 10 Oct. 2007 http://www-usr.rider.edu/~suler/psycyber/badboys.html>. Taylor, T.L. Play between Worlds: Exploring Online Game Culture. Cambridge, MA: MIT, 2006. Velvet Strike. Velvet-Strike. N.D. 10 Aug. 2007 http://www.opensorcery.net/velvet-strike/nonflame.html>. Walker, John. “How to Be a Complete Bastard.” PC Gamer 13 Mar. 2007. 10 Aug. 2007 http://www.computerandvideogames.com/article.php?id=159883&site=pcg>. Wallace, Mark. “The Day the Grid Disappeared.” Escapist Magazine 15 Nov. 2005: 11. 20 June 2007 http://www.escapistmagazine.com/issue/19/11>. Walsh, Tony. Hidden Virtual-World Prison Revealed. 3 Jan. 2006. 10 Oct. 2007 http://www.secretlair.com/index.php?/clickableculture/entry/hidden_virtual_world_prison_revealed/>. Walsh, Tony. Second Life Millionaire Interview Penis-Bombed. 20 Dec. 2006. 10 Oct. 2007 http://www.secretlair.com/index.php?/clickableculture/entry/second_life_millionaire_interview_penis_bombed/>. Warner, Dorothy, and Mike Raiter. _Social Context in Massively-Multiplayer Online Games. _2005. 20 Aug. 2007 http://www.i-r-i-e.net/inhalt/004/Warner-Raiter.pdf>. “World of Warcraft: Funeral Ambush.” 2006. YouTube. 15 Aug. 2007 http://www.youtube.com/watch?v=31MVOE2ak5w>. Yee, Nicholas. Facets: 5 Motivational Factors for Why People Play MMORPG’s. 2002. 10 Oct. 2007 http://www.nickyee.com/facets/home.html>. Yee, Nicholas. Faces of Grief. 2005. June 2007 http://www.nickyee.com/daedalus/archives/000893.php?page=1>. Citation reference for this article MLA Style Gregson, Kimberly. "Bad Avatar!: Griefing in Virtual Worlds." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/06-gregson.php>. APA Style Gregson, K. (Oct. 2007) "Bad Avatar!: Griefing in Virtual Worlds," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/06-gregson.php>.
APA, Harvard, Vancouver, ISO, and other styles
46

Potts, Graham. "For God and Gaga: Comparing the Same-Sex Marriage Discourse and Homonationalism in Canada and the United States." M/C Journal 15, no. 6 (September 14, 2012). http://dx.doi.org/10.5204/mcj.564.

Full text
Abstract:
We Break Up, I Publish: Theorising and Emotional Processing like Taylor Swift In 2007 after the rather painful end of my first long-term same-sex relationship I asked myself two questions (and like a good graduate student wrote a paper about it that was subsequently published): (1) what is love; (2) and if love exists, are queer and straight love somehow different. I asked myself the second question because, unlike my previous “straight” breakups (back when I honestly thought I was straight), this one was different, was far more messy, and seemed to have a lot to do with the fact that my then fresh ex-boyfriend and I had dramatically different ideas about how the relationship should look, work, be codified, or if it should or could be codified. It was an eye-opening experience since the truth that these different ideas existed—basically his point of view—really only “came out” in my mind through the act and learning involved in that breakup. Until then, from a Queer Theory perspective, you could have described me as a “man who had sex with men,” called himself homosexual, but was so homonormative that if you’d approached me with even a light version of Michel Foucault’s thoughts on “Friendship as a Way of Life” I’d have looked at you as queerly, and cluelessly, as possible. Mainstream Queer Theory would have put the end of the relationship down to the difference and conflict between what is pejoratively called the “marriage-chasing-Gay-normaliser,” represented by me, and the “radical-Queer(ness)-of-difference” represented by my ex-boyfriend, although like a lot of theory, that misses the personal (which I recall being political...), and a whole host of non-theoretical problems that plagued that relationship. Basically I thought Queer/Homosexual/Lesbian/Transgendered and the rest of the alphabet soup was exactly the same as Straight folks both with respect to a subjective understanding of the self, social relations and formations, and how you acted or enacted yourself in public and private except in the bedroom.. I thought, since Canada had legalised same-sex marriage, all was well and equal (other than the occasional hate-crime which would then be justly punished). Of course I understood that at that point Canada was the exception and not the rule with respect to same-sex rights and same-sex marriage, so it followed in my mind that most of our time collectively should be spent supporting those south of the border or overseas who still faced restrictions on these basic rights, or out-and-out violence, persecution and even state-sanctioned death for just being who they are and/or trying to express it. And now, five years on, stating that Canada is the exception as opposed to the rule with respect to the legalisation of same-sex marriage and the codification of same-sex rights in law has the potential to be outdated as the recent successes of social movements, court rulings and the tenor of political debate and voting has shifted internationally with rapid speed. But it was only because of that breakup that these theoretical and practical issues had come out of my queer closet and for the first time I started to question some necessary link between love and codification (marriage), and how the queer in Queer relationships does or potentially can disrupt this link. And not just for Queers, but for Straight folk too, which is the primary point that should be underlined now and is addressed at the end of this paper. Because, embittered as I was at the time, I still basically agree with the theoretical position that I came to in that paper on love—based on a queering of the terms of Alain Badiou—where I affirmed that love resisted codification, especially in its queer form, because it is fidelity to an act and truth between two or more partners which resists the rigid walls of State-based codification (Potts, Love Hurts; Badiou, Ethics and Saint Paul). But as one of the peer reviewers for this paper rightly pointed out, the above distinctions between my ex and myself implicitly rely upon a State-centric model of rights and freedoms, which I attacked in the first paper, but which I freely admit I am guilty of utilising and arguing in favour of here. But that is because I am interested, here, not in talking about love as an abstract concept towards which we should work in our personal relationships, but as the state of things, and specifically the state of same-sex marriage and the discourse and images which surrounds it, which means that the State does matter. This is specifically so given the lack of meaningful challenges to the State System in Canada and the US. I maintain, following Butler, that it is through power, and our response to the representatives of power “hailing us,” that we become bodies that matter and subjects (Bodies That Matter; The Psychic Life of Power; and Giving An Account of Oneself). While her re-reading of Althusser in these texts argues that we should come to a philosophical and political position which challenges this State-based form of subject creation and power, she also notes that politically and philosophically we have yet to articulate such a position clearly, and I’d say that this is especially the case for what is covered and argued in the mainstream (media) debate on same-sex marriage. So apropos what is arguably Foucault’s most mature analysis of “power,” and while agreeing that my State-based argument for inclusion and rights does indeed strengthen the “biopolitical” (The History of Sexuality 140 and 145) control over, in this case, Queer populations, I argue that this is nonetheless the political reality with which we are working in and analyzing, and that is my concern here. Despite a personal desire that this not be the case, the State or state sanctioned institutions do continue to hold a monopoly of power in conferring subjecthood and rights. To take a page from Jeremy Bentham, I would say that arguing from a position which does not start from or seriously consider the State as the current basis for rights and subjecthood, though potentially less ethically problematic and more in line with my personal politics, is tantamount to talking and arguing about “nonsense on stilts.” “Caught in a Bad Romance?” Comparing Homonationalist Trajectories and the Appeal of Militarist Discourse to LGBT Grassroots Organisations In comparing the discourses and enframings of the debate over same-sex marriage between Canada in the mid 1990s and early 2000s and in the US today, one might presume that how it came to say “I do” in Canada and how it might or might not get “left at the altar” in the US, is the result of very different national cultures. But this would just subscribe to one of a number of “cultural explanations” for perceived differences between Canada and the US that are usually built upon straw-man comparisons which then pillorise the US for something or other. And in doing so it would continue an obscuration that Canada, unlike the US, is unproblematically open and accepting when it comes to multicultural, multiracial and multisexual diversity and inclusion. Which Canada isn’t nor has it ever been. When you look at the current discourse in both countries—by their key political representatives on the international stage—you find the opposite. In the US, you have President Barack Obama, the first sitting President to come out in favour of same-sex marriage, and the Secretary of State, Hillary Clinton, setting same-sex rights at home and abroad as key policy planks (Gay Rights are Human Rights). Meanwhile, in Canada, you have Prime Minister Stephen Harper, in office since 2006, openly support his Conservative Party’s “traditional marriage” policy which is thankfully made difficult to implement because of the courts, and John Baird, the badly closeted Minister of Foreign Affairs, who doesn’t mention same-sex rights at home or with respect to foreign relations—unless it is used as supplementary evidence to further other foreign policy goals (c.f. Seguin)—only showing off his sexuality outside of the press-gallery to drum up gay-conservative votes or gay-conservative fundraising at LGBTQ community events which his government is then apt to pull funding for (c.f. Bradshaw). Of course my point is not to just reverse the stereotypes, painting an idyllic picture of the US and a grim one of Canada. What I want to problematise is the supposed national cultural distinctions which are naturalised when arguments are made through them as to why same-sex marriage was legalised in Canada, while the Defense of Marriage Act still stands in the US. To follow and extend Jasbir Puar’s argument from Terrorist Assemblages, what we see in both same-sex marriage debates and discourses is really the same phenomenon, but, so far, with different outcomes and having different manifestations. Puar contends that same-sex rights, like most equalising rights for minority groups, are only granted when all three of the following conditions prevail: (1) in a state or narrative of exception, where the nation grants a minority group equal rights because “the nation” feels threatened from without; (2) only on the condition that normalisation (or homonormalisation in the case of the Queer community) occurs, with those who don’t conform pushed further from a place in the national-subject; (3) and that the price of admission into being the “allowed Queer” is an ultra-patriotic identification with the Nation. In Canada, the state or narrative of exception was an “attack” from within which resulted in the third criterion being downplayed (although it is still present). Court challenges in a number of provinces led in each case to a successful ruling in favour of legalising same-sex marriage. Appeals to these rulings made their way to the Supreme Court, who likewise ruled in favour of the legalisation of same-sex marriage. This ruling came with an order to the Canadian Parliament that it had to change the existing marriage laws and definition of marriage to make it inclusive of same-sex marriage. This “attack” was performed by the judiciary who have traditionally (c.f. Makin) been much less partisan in appointment or ruling than their counterparts in the US. When new marriage laws were proposed to take account of the direction made by the courts, the governing Liberal Party and then Prime Minister Paul Martin made it a “free vote” so members of his own party could vote against it if they chose. Although granted with only lacklustre support by the governing party, the Canadian LGBTQ community rejoiced and became less politically active, because we’d won, right? International Queers flocked to Canada—one in four same-sex weddings since legalisation in Canada have been to out of country residents (Postmedia News)—as long as they had the proper socioeconomic profile (which is also a racialised profile) to afford the trip and wedding. This caused a budding same-sex marriage tourism and queer love normalisation industry to be built around the Canada Queer experience because especially at the time of legalisation Canada was still one of the few countries to allow for same-sex marriages. What this all means is that homonationalism in Canada is much less charged. It manifests itself as fitting in and not just keeping up with the Joneses when it comes to things like community engagement and Parent Teacher Association (PTA) meetings, but trying to do them one better (although only by a bit so as not to offend). In essence, the comparatively bland process in the 1990s by which Canada slowly underwent a state of exception by a non-politically charged and non-radical professional judiciary simply interpreting the Canadian Charter of Rights and Freedoms at the provincial and then the federal level is mirrored in the rather bland and non-radical homonationalism which resulted. So unlike the US, the rhetoric of the LGBT community stays subdued unless there’s a hint that the right to same-sex divorce might get hit by Conservative Party guns, in which case all hell breaks loose (c.f. Ha). While the US is subject to the same set of logics for the currently in-progress enactment of legalising same-sex marriage, the state of exception is dramatically different. Puar argues it is the never-ending War on Terror. This also means that the enframings and debate in the US are exceptionally charged and political, leading to a very different type of homonationalism and homonationalist subject than is found in Canada. American homonationalism has not radically changed from Puar’s description, but due to leadership from the top (Obama, Clinton and Lady Gaga) the intensity and thereby structured confinement of what is an acceptable Queer-American subject has become increasingly rigid. What is included and given rights is the hyper-patriotic queer-soldier, the defender of the nation. And what reinforces the rigidity of what amounts to a new “glass closet” for queers is that grassroots organisations have bought into the same rhetoric, logic, and direction as to how to achieve equality as the Homecoming advertisement from the Equal Love Campaign in Britain shows. For the other long-leading nation engaged in the War on Terror narrative, Homecoming provides the imagery of a gay member of the armed services draped in the flag proposing to his partner at the end of duty overseas that ends with the following text: “All men can be heroes. All men can be husbands. End discrimination.” Can’t get more patriotic—and heteronormative with the use of the term “husbands”—than that. Well, unless you’re Lady Gaga. Now Lady Gaga stands out as a public figure whom has taken an explicitly pro-queer and pro-LGBT stance from the outset of her career. And I do not want to diminish the fact that she has been admirably effective in her campaigning and consistent pro-queer and pro-LGBT stance. While above I characterised her input above as leadership from the top, she also, in effect, by standing outside of State Power unlike Obama and Clinton, and being able to be critical of it, is able to push the State in a more progressive direction. This was most obviously evidenced in her very public criticism of the Democratic Party and President Obama for not moving quickly enough to adopt a more pro-queer and pro-LGBT stance after the 2008 election where such promises were made. So Lady Gaga plays a doubled role whereby she also acts as a spokesperson for the grassroots—some would call this co-opting, but that is not the charge made here as she has more accurately given her pre-existing spotlight and Twitter and Facebook presence over to progressive campaigns—and, given her large mainstream media appeal and willingness to use this space to argue for queer and LGBT rights, performs the function of a grassroots organisation by herself as far as the general public is concerned. And in her recent queer activism we see the same sort of discourse and images utilised as in Homecoming. Her work over the first term of Obama’s Presidency—what I’m going to call “The Lady Gaga Offensive”—is indicative: she literally and metaphorically wrapped herself in the American flag, screaming “Obama, ARE YOU LISTENING!!! Repeal ‘Don’t Ask, Don’t Tell’ and [have the homophobic soldiers] go home, go home, go home!” (Lady Gaga Rallies for Repeal of Don’t Ask, Don’t Tell). And presumably to the same home of otherness that is occupied by the terrorist or anything that falls under the blanket of “anti-American” in Puar’s critique of this approach to political activism. This speech was modelled on her highly successful one at the National Equality March in 2009, which she ended with “Bless God and Bless the Gays.” When the highly watched speeches are taken together you literally can’t top them for Americanness, unless it is by a piece of old-fashioned American apple-pie bought at a National Rifle Association (NRA) bake-sale. And is likely why, after Obama’s same-sex “evolution,” the pre-election ads put out by the Democratic Party this year focused so heavily on the repeal of “Don’t Ask, Don’t Tell” and the queer patriotic soldier or veteran’s obligation to or previous service in bearing arms for the country. Now if the goal is to get formal and legal equality quickly, then as a political strategy, to get people onside with same-sex marriage, and from that place to same-sex rights and equal social recognition and respect, this might be a good idea. Before, that is, moving on to a strategy that actually gets to the roots of social inequality and doesn’t rely on “hate of ‘the other’” which Puar’s analysis points out is both a byproduct of and rooted in the base of any nationalist based appeal for minoritarian rights. And I want to underline that I am here talking about what strategy seems to be appealing to people, as opposed to arguing an ethically unproblematic and PC position on equality that is completely inclusive of all forms of love. Because Lady Gaga’s flag-covered and pro-military scream was answered by Obama with the repeal of “Don’t Ask, Don’t Tell” and the extension of some benefits to same-sex couples, and has Obama referring to Gaga as “your leader” in the pre-election ads and elsewhere. So it isn’t really surprising to find mainstream LGBT organisations adopting the same discourse and images to get same-sex rights including marriage. One can also take recent poll numbers from Canada as indicative as well. While only 10 percent of Canadians have trust in political parties, and 17 and 16 percent have trust in Parliament and Prime Minister Harper respectively, a whopping 53 percent have trust in the Canadian Forces (Leblanc). One aspect that undergirds Puar’s argument is that especially at a "time of war," more than average levels of affection or trust is shown for those institutions that defend “us,” so that if the face of that institution is reinscribed to the look of the hyper-patriotic queer-soldier (by advertising of the Homecoming sort which is produced not by the State but by grassroots LGBT organisations), then it looks like these groups seem to be banking that support for Gays and Lesbians in general, and same-sex marriage in specific, will further rise if LGBT and Queer become substantively linked in the imagination of the general public with the armed forces. But as 1980s Rockers Heart Asked: “But There’s Something That You Forgot. What about Love?” What these two homonationalist trajectories and rhetorics on same-sex marriage entirely skip over is how exactly you can codify “love.” Because isn’t that the purpose of marriage? Saying you can codify it is like grasping at a perfectly measured and exact cubic foot of air and telling it to stay put in the middle of a hurricane. So to return to how I ended my earlier exploration of love and if it could or should be codified: it means that as I affirm love, and as I remain in fidelity to it, I subject myself in my fundamental weakness constantly to the "not-known;" to constant heartbreak; to affirmations which I cannot betray as it would be a betrayal of the truth process itself. It's as if at the very moment the Beatles say the words 'All you need is love' they were subjected to wrenching heartbreak and still went on: 'All you need is love...' (Love Hurts) Which is really depressing when I look back at it now. But it was a bad breakup, and I can tend to the morose in word choice and cultural references when depressed. But it also remains essentially my position. If you impose “till death or divorce do us part” on to love you’re really only just participating in the chimera of static love and giving second wind to a patriarchal institution which has had a crappy record when it comes to equality. It also has the potential to preserve asymmetrical roles “traditional marriage” contains from when the institution was only extended to straight couples. And isn’t equality the underlying philosophical principle and political position that we’re supposedly fighting for if we’re arguing for an equal right to get married? Again, it’s important to try and codify the same rights for everyone through the State at the present time because I honestly don’t see major changes confronting the nation state system in Canada or the US in the near future. We remain the play-children of a digitally entrenched form of Foucaultian biopower that is State and Capital directed. Because while the Occupy Wall Street movements got a lot of hay in the press, I’ve yet to see any substantive or mainstreamed political change come out of them—if someone can direct me to their substantive contribution to the recent US election I’d be happy to revise my position—which is likely to our long term detriment. So this is a pragmatic analysis, one of locating one node in the matrices of power relations, of seeing how mainstream LGBT political organisations and Lady Gaga are applying the “theoretical tool kits” given to us by Foucault and Puar, and seeing how these organisations and Gaga are applying them, but in this case in a way that is likely counter to authorial intention(s) and personal politics (Power/Knowledge 145, 193; Terrorist Assemblages). So what this means is that we’re likely to continue to see, in mainstream images of same-sex couples put out by grassroots LGBT organisations, a homonationalism and ideological construction that grows more and more out of touch with Queer realities—the “upper-class house-holding PTA Gay”; although on a positive note I should point out that the Democratic Party in the US seems to be at least including both white and non-white faces in their pre-election same-sex marriage ads—and one that most Queers don’t or can’t fit themselves into especially when it comes down to the economic aspect of that picture, which is contradictory and problematic (c.f. Christopher). It also means that in the US the homonationalism on the horizon looks the same as in Canada except with a healthy dose of paranoia of outsiders and “the other” and a flag draped membership in the NRA, that is, for when the queer super-soldier is not in uniform. It’s a straightjacket for a closet that is becoming smaller because it seeks, through the images projected, inclusion for only a smaller and smaller social sub-set of the Lesbian and Gay community and leaves out more and more of the Queer community than it was five years ago when Puar described it. So instead of trying to dunk the queer into the institution of patriarchy, why not, by showing how so many Queers, their relationships, and their loving styles don’t fit into these archetypes help give everyone, including my “marriage-chasing-Gay-normaliser” former self a little “queer eye, for all eyes.” To look at and see modern straight marriage through the lenses and reasons LGBT and Queer communities (by-and-large) fought for years for access to it: as the codification and breakdown of some rights and responsibilities (i.e. taking care of children); as an act which gives you straightforward access to health benefits and hospital visitation rights; as an easy social signifier for others of a commitment to another person that doesn’t use diluted language like “special friend;” and because when it comes down to it that “in sickness and in health” part of the vow—in the language of a queered Badiou, a vow can be read as the affirmation of a universal and disinterested truth (love) and a moment which can’t be erased retrospectively, say, by divorce—seems like a sincere way to value at least one of those you really care for in the world. And hopefully it, as a side-benefit, it acts as a reminder but is not the actuality of that first fuzzy feeling which (hopefully) doesn’t go away. But I learned my lesson the first time and know that the fuzzy feeling might disappear as it often does. It doesn’t matter how far we try and cram it into any variety of homonationalist closets, since it’ll always find a way to not be there, no matter how tight you thought you’d locked the door to keep it in for good if it wants out. Because you can’t keep emotions by contract: so at the end of the day the logical, ethical and theoretically sound position is to argue for the abolition of marriage as an institution. However, Plato and others have been making that argument for thousands of years, and it still doesn’t seem to have gained popular traction. And we also need to realise, contrary to the opinion of my former self and The Beatles, that you really do need more than love as fidelity to an event of you and your partner’s making when you are being denied your partners health benefits just because you are a same-sex couple, especially when those health benefits could be saving your life. And if same-sex marriage codification is a quick fix for that and similar issues for those who can fit into the State sanctioned same-sex marriage walls, which admittedly leaves some members of the Queer community who don’t overlap out, as part of an overall and more inclusive strategy that does include them then I’m in favour of it. That is, till the time comes that Straight and Queer can, over time and with a lot of mutual social learning, explore how to recognise and give equal rights with or without State based codification to the multiple queer and sometimes polyamorous relationship models that already populate the Gay and Straight worlds right now. So in the meantime continue to count me down as a “marriage-chasing-Gay.” But just pragmatically, not to normalise, as one of a diversity of political strategies for equality and just for now. References Badiou, Alain. Ethics: An Essay on the Understanding of Evil. New York: Verso, 2001. ———. Saint Paul: The Foundation of Universalism, Stanford: Stanford UP, 2003. Bradshaw, James. “Pride Toronto Denied Federal Funding.” The Globe and Mail. 7 May. 2012 ‹http://www.theglobeandmail.com/news/toronto/pride-toronto-denied-federal-funding/article1211065/›. Butler, Judith. Gender Trouble: Feminism and the Subversion of Identity. New York: Routledge,1990. ———. Bodies That Matter: On the Discursive Limits of “Sex”. New York: Routledge, 1993. ———. Excitable Speech: A Politics of the Performative. New York: Routledge, 1997. ———. The Psychic Life of Power: Theories of Subjection. Stanford: Stanford UP, 1997. ———. Giving an Account of Oneself. New York: Fordham UP, 2005. Christopher, Nathaniel. “Openly Gay Men Make Less money, Survey Shows.” Xtra! .5 Nov. 2012 ‹http://www.xtra.ca/public/Vancouver/Openly_gay_men_make_less_money_survey_shows-12756.aspx›. Clinton, Hillary. “Gay Rights Are Human Rights, And Human Rights Are Gay Rights.” United Nations General Assembly. 26 Dec. 2011 ‹http://thinkprogress.org/lgbt/2011/12/06/383003/sec-clinton-to-un-gay-rights-are-human-rights-and-human-rights-are-gay-rights/?mobile=nc›. Foucault, Michel. Power/Knowledge: Selected Interviews and Other Writings 1972-1977. Ed. Colin Gordon. Trans. Colin Gordon, Leo Marshall, John Mepham, Kate Soper. New York: Random House,1980. —. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Toronto: Random House, 1977. —. The History of Sexuality Volume One: An Introduction. Trans. Robert Hurley. New York: Random House, 1978. Heart. “What About Love.” Heart. Capitol Records, 1985. CD. Ha, Tu Thanh. “Dan Savage: ‘I Had Been Divorced Overnight’.” The Globe and Mail. 12 Jan. 2012 ‹http://www.theglobeandmail.com/news/politics/dan-savage-i-had-been-divorced-overnight/article1358211/›. “Homecoming.” Equal Love Campaign. ‹http://www.youtube.com/watch?v=a54UBWFXsF4›. Leblanc, Daniel. “Harper Among Least Trusted Leaders, Poll Shows.” The Globe and Mail. 12 Nov. 2012 ‹http://www.theglobeandmail.com/news/politics/harper-among-least-trusted-leaders-poll-shows/article5187774/#›. Makin, Kirk. “The Coming Conservative Court: Harper to Reshape Judiciary.” The Globe and Mail. 24 Aug. 2012 ‹http://www.theglobeandmail.com/news/politics/the-coming-conservative-court-harper-to-reshape-judiciary/article595398/›. “Lady Gaga Rallies for Repeal of ‘Don’t Ask, Don’t Tell’ in Portland, Maine.” 9 Sep. 2010 ‹http://www.youtube.com/watch?v=g4rGla6OzGc›. “Lady Gaga Speaks at Gay Rights Rally in Washington DC as Part of the National Equality March.” 11 Oct. 2009 ‹http://www.youtube.com/watch?v=7jepWXu-Z38›. “Obama’s Stirring New Gay Rights Ad.” Newzar.com. 24 May. 2012 ‹http://newzar.com/obamas-stirring-new-gay-rights-ad/›. Postmedia News. “Same-sex Marriage in Canada will not be Revisited, Harper Says.” 12 Jan. 2012 ‹http://news.nationalpost.com/2012/01/12/same-sex-marriage-in-canada-will-not-be-revisited-harper-says/›. Potts, Graham. “‘Love Hurts’: Hunter S. Thompson, the Marquis de Sade and St. Paul Queer Alain Badiou’s Truth and Fidelity.” CTheory. rt002: 2009 ‹http://www.ctheory.net/articles.aspx?id=606›. Puar, Jasbir. Terrorist Assemblages: Homonationalism in Queer Times. London: Duke UP, 2007. Seguin, Rheal. “Baird Calls Out Iran on Human Rights Violations.” The Globe and Mail. 22 Oct. 2012 ‹http://www.theglobeandmail.com/news/politics/baird-calls-out-iran-on-human-rights-violations/article4628968/›.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography