Academic literature on the topic 'Physical distribution of goods Australia Data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Physical distribution of goods Australia Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Physical distribution of goods Australia Data processing"

1

Wijesundera, Isuri, Malka N. Halgamuge, Thas Nirmalathas, and Thrishantha Nanayakkara. "A Geographic Primitive-Based Bayesian Framework to Predict Cyclone-Induced Flooding*." Journal of Hydrometeorology 14, no. 2 (April 1, 2013): 505–23. http://dx.doi.org/10.1175/jhm-d-12-040.1.

Full text
Abstract:
Abstract The effectiveness of managing cyclone-induced floods is highly dependent on how fast reasonably accurate predictions can be made, which is a particularly difficult task given the multitude of highly variable physical factors. Even with supercomputers, collecting and processing vast amounts of data from numerous asynchronous sources makes it challenging to achieve high prediction efficiency. This paper presents a model that combines prior knowledge, including rainfall data statistics and topographical features, with any new precipitation data to generate a probabilistic prediction using Bayesian learning, where the advantages of data-oriented and heuristic modeling are combined. The terrain is partitioned into geographic primitives (GPs) based on manual inspection of flood propagation vector fields in order to simplify the stochastic system identification. High calculation efficiency is achieved through statistically summarizing simultaneous events spread across geography into primitives, allowing a distributed updating algorithm leading to parallel computing. Markov chain processes identified for each of these GPs, based on both simulation and measured rainfall data, are then used in real-time predictions of water flow probabilities. The model takes a comprehensive approach, which enables flood prediction even before the landfall of a cyclone through modularizing the algorithm into three prediction steps: cyclone path, rainfall probability density distribution, and temporal dynamics of flood density distribution. Results of comparative studies based on real data of two cyclones (Yasi and Tasha) that made landfall in Queensland, Australia, in 2010/11 show that the model is capable of predicting up to 3 h ahead of the official forecast, with a 33% improvement of accuracy compared to the models presently being used.
APA, Harvard, Vancouver, ISO, and other styles
2

Wahyu, Anna, Ade Filla Intan, Arddhiles Adhitama, Febrian Nur Fadhli, Ferda Elita Putri, Gunarta Sutantio, Henest Paskah, et al. "Integrated Analysis of Microtremor Horizontal to Vertical Spectral Ratio, Surface Waves Dispersion Curve, and Seismic Refraction Tomography to Estimate Weathered Layer Thickness and Seismic Vulnerability: Case Study Kalirejo Village, Kokap Sub-District, Kulon Progo Regency." Jurnal Fisika Indonesia 22, no. 3 (April 27, 2020): 23. http://dx.doi.org/10.22146/jfi.v22i3.55648.

Full text
Abstract:
Subduction of Indo-Australia plate to Eurasia plate and locally active fault nearby Kulon Progo play as major source for earthquake events. After effect due to earthquake has different level of damage which depend on the magnitude and site characteristics. The horizontal-to-vertical spectral ratio (HVSR) passive seismic method is being used drastically to help in mapping the level of site vulnerability to earthquake event. HVSR analysis results help us acquire some physical values including weathered layer thickness where Vs 30 reference came from surface waves dispersion curve analysis of the MASW method as it is used as a parameter in calculating thickness value. Seismic refraction tomography is used to create subsurface model thus we may see the extent of underlying layer and its implication to earthquake event.Data measurements distribution are scattered in Kalirejo Village with the total of 63 passive seismic data, 33 MASW data, and 7 lines of seismic refraction acquisition. Some data show inadequate quality to be taken into further processing step, so data sorting activity should be carefully done. As a result, 21 of 63 passive seismic data are considered adequate to represent site physical values. Dominant frequency values ranging from 2 to 20 Hz, amplification factor varies between 1.5-12.5, and seismic vulnerability indices varies between 0.3-20. Surface waves dispersion curve inversion results are Vs 30 values ranging from 350 m/s to 980 m/s and seismic refraction tomography model shows Vp model with velocity values ranging from 0.2 to 3.2 km/s.
APA, Harvard, Vancouver, ISO, and other styles
3

Moore, Christopher Luke. "Digital Games Distribution: The Presence of the Past and the Future of Obsolescence." M/C Journal 12, no. 3 (July 15, 2009). http://dx.doi.org/10.5204/mcj.166.

Full text
Abstract:
A common criticism of the rhythm video games genre — including series like Guitar Hero and Rock Band, is that playing musical simulation games is a waste of time when you could be playing an actual guitar and learning a real skill. A more serious criticism of games cultures draws attention to the degree of e-waste they produce. E-waste or electronic waste includes mobiles phones, computers, televisions and other electronic devices, containing toxic chemicals and metals whose landfill, recycling and salvaging all produce distinct environmental and social problems. The e-waste produced by games like Guitar Hero is obvious in the regular flow of merchandise transforming computer and video games stores into simulation music stores, filled with replica guitars, drum kits, microphones and other products whose half-lives are short and whose obsolescence is anticipated in the annual cycles of consumption and disposal. This paper explores the connection between e-waste and obsolescence in the games industry, and argues for the further consideration of consumers as part of the solution to the problem of e-waste. It uses a case study of the PC digital distribution software platform, Steam, to suggest that the digital distribution of games may offer an alternative model to market driven software and hardware obsolescence, and more generally, that such software platforms might be a place to support cultures of consumption that delay rather than promote hardware obsolescence and its inevitability as e-waste. The question is whether there exists a potential for digital distribution to be a means of not only eliminating the need to physically transport commodities (its current 'green' benefit), but also for supporting consumer practices that further reduce e-waste. The games industry relies on a rapid production and innovation cycle, one that actively enforces hardware obsolescence. Current video game consoles, including the PlayStation 3, the Xbox 360 and Nintendo Wii, are the seventh generation of home gaming consoles to appear within forty years, and each generation is accompanied by an immense international transportation of games hardware, software (in various storage formats) and peripherals. Obsolescence also occurs at the software or content level and is significant because the games industry as a creative industry is dependent on the extensive management of multiple intellectual properties. The computing and video games software industry operates a close partnership with the hardware industry, and as such, software obsolescence directly contributes to hardware obsolescence. The obsolescence of content and the redundancy of the methods of policing its scarcity in the marketplace has been accelerated and altered by the processes of disintermediation with a range of outcomes (Flew). The music industry is perhaps the most advanced in terms of disintermediation with digital distribution at the center of the conflict between the legitimate and unauthorised access to intellectual property. This points to one issue with the hypothesis that digital distribution can lead to a reduction in hardware obsolescence, as the marketplace leader and key online distributor of music, Apple, is also the major producer of new media technologies and devices that are the paragon of stylistic obsolescence. Stylistic obsolescence, in which fashion changes products across seasons of consumption, has long been observed as the dominant form of scaled industrial innovation (Slade). Stylistic obsolescence is differentiated from mechanical or technological obsolescence as the deliberate supersedence of products by more advanced designs, better production techniques and other minor innovations. The line between the stylistic and technological obsolescence is not always clear, especially as reduced durability has become a powerful market strategy (Fitzpatrick). This occurs where the design of technologies is subsumed within the discourses of manufacturing, consumption and the logic of planned obsolescence in which the product or parts are intended to fail, degrade or under perform over time. It is especially the case with signature new media technologies such as laptop computers, mobile phones and portable games devices. Gamers are as guilty as other consumer groups in contributing to e-waste as participants in the industry's cycles of planned obsolescence, but some of them complicate discussions over the future of obsolescence and e-waste. Many gamers actively work to forestall the obsolescence of their games: they invest time in the play of older games (“retrogaming”) they donate labor and creative energy to the production of user-generated content as a means of sustaining involvement in gaming communities; and they produce entirely new game experiences for other users, based on existing software and hardware modifications known as 'mods'. With Guitar Hero and other 'rhythm' games it would be easy to argue that the hardware components of this genre have only one future: as waste. Alternatively, we could consider the actual lifespan of these objects (including their impact as e-waste) and the roles they play in the performances and practices of communities of gamers. For example, the Elmo Guitar Hero controller mod, the Tesla coil Guitar Hero controller interface, the Rock Band Speak n' Spellbinder mashup, the multiple and almost sacrilegious Fender guitar hero mods, the Guitar Hero Portable Turntable Mod and MAKE magazine's Trumpet Hero all indicate a significant diversity of user innovation, community formation and individual investment in the post-retail life of computer and video game hardware. Obsolescence is not just a problem for the games industry but for the computing and electronics industries more broadly as direct contributors to the social and environmental cost of electrical waste and obsolete electrical equipment. Planned obsolescence has long been the experience of gamers and computer users, as the basis of a utopian mythology of upgrades (Dovey and Kennedy). For PC users the upgrade pathway is traversed by the consumption of further hardware and software post initial purchase in a cycle of endless consumption, acquisition and waste (as older parts are replaced and eventually discarded). The accumulation and disposal of these cultural artefacts does not devalue or accrue in space or time at the same rate (Straw) and many users will persist for years, gradually upgrading and delaying obsolescence and even perpetuate the circulation of older cultural commodities. Flea markets and secondhand fairs are popular sites for the purchase of new, recent, old, and recycled computer hardware, and peripherals. Such practices and parallel markets support the strategies of 'making do' described by De Certeau, but they also continue the cycle of upgrade and obsolescence, and they are still consumed as part of the promise of the 'new', and the desire of a purchase that will finally 'fix' the users' computer in a state of completion (29). The planned obsolescence of new media technologies is common, but its success is mixed; for example, support for Microsoft's operating system Windows XP was officially withdrawn in April 2009 (Robinson), but due to the popularity in low cost PC 'netbooks' outfitted with an optimised XP operating system and a less than enthusiastic response to the 'next generation' Windows Vista, XP continues to be popular. Digital Distribution: A Solution? Gamers may be able to reduce the accumulation of e-waste by supporting the disintermediation of the games retail sector by means of online distribution. Disintermediation is the establishment of a direct relationship between the creators of content and their consumers through products and services offered by content producers (Flew 201). The move to digital distribution has already begun to reduce the need to physically handle commodities, but this currently signals only further support of planned, stylistic and technological obsolescence, increasing the rate at which the commodities for recording, storing, distributing and exhibiting digital content become e-waste. Digital distribution is sometimes overlooked as a potential means for promoting communities of user practice dedicated to e-waste reduction, at the same time it is actively employed to reduce the potential for the unregulated appropriation of content and restrict post-purchase sales through Digital Rights Management (DRM) technologies. Distributors like Amazon.com continue to pursue commercial opportunities in linking the user to digital distribution of content via exclusive hardware and software technologies. The Amazon e-book reader, the Kindle, operates via a proprietary mobile network using a commercially run version of the wireless 3G protocols. The e-book reader is heavily encrypted with Digital Rights Management (DRM) technologies and exclusive digital book formats designed to enforce current copyright restrictions and eliminate second-hand sales, lending, and further post-purchase distribution. The success of this mode of distribution is connected to Amazon's ability to tap both the mainstream market and the consumer demand for the less-than-popular; those books, movies, music and television series that may not have been 'hits' at the time of release. The desire to revisit forgotten niches, such as B-sides, comics, books, and older video games, suggests Chris Anderson, linked with so-called “long tail” economics. Recently Webb has queried the economic impact of the Long Tail as a business strategy, but does not deny the underlying dynamics, which suggest that content does not obsolesce in any straightforward way. Niche markets for older content are nourished by participatory cultures and Web 2.0 style online services. A good example of the Long Tail phenomenon is the recent case of the 1971 book A Lion Called Christian, by Anthony Burke and John Rendall, republished after the author's film of a visit to a resettled Christian in Africa was popularised on YouTube in 2008. Anderson's Long Tail theory suggests that over time a large number of items, each with unique rather than mass histories, will be subsumed as part of a larger community of consumers, including fans, collectors and everyday users with a long term interest in their use and preservation. If digital distribution platforms can reduce e-waste, they can perhaps be fostered by to ensuring digital consumers have access to morally and ethically aware consumer decisions, but also that they enjoy traditional consumer freedoms, such as the right to sell on and change or modify their property. For it is not only the fixation on the 'next generation' that contributes to obsolescence, but also technologies like DRM systems that discourage second hand sales and restrict modification. The legislative upgrades, patches and amendments to copyright law that have attempted to maintain the law's effectiveness in competing with peer-to-peer networks have supported DRM and other intellectual property enforcement technologies, despite the difficulties that owners of intellectual property have encountered with the effectiveness of DRM systems (Moore, Creative). The games industry continues to experiment with DRM, however, this industry also stands out as one of the few to have significantly incorporated the user within the official modes of production (Moore, Commonising). Is the games industry capable (or willing) of supporting a digital delivery system that attempts to minimise or even reverse software and hardware obsolescence? We can try to answer this question by looking in detail at the biggest digital distributor of PC games, Steam. Steam Figure 1: The Steam Application user interface retail section Steam is a digital distribution system designed for the Microsoft Windows operating system and operated by American video game development company and publisher, Valve Corporation. Steam combines online games retail, DRM technologies and internet-based distribution services with social networking and multiplayer features (in-game voice and text chat, user profiles, etc) and direct support for major games publishers, independent producers, and communities of user-contributors (modders). Steam, like the iTunes games store, Xbox Live and other digital distributors, provides consumers with direct digital downloads of new, recent and classic titles that can be accessed remotely by the user from any (internet equipped) location. Steam was first packaged with the physical distribution of Half Life 2 in 2004, and the platform's eventual popularity is tied to the success of that game franchise. Steam was not an optional component of the game's installation and many gamers protested in various online forums, while the platform was treated with suspicion by the global PC games press. It did not help that Steam was at launch everything that gamers take objection to: a persistent and initially 'buggy' piece of software that sits in the PC's operating system and occupies limited memory resources at the cost of hardware performance. Regular updates to the Steam software platform introduced social network features just as mainstream sites like MySpace and Facebook were emerging, and its popularity has undergone rapid subsequent growth. Steam now eclipses competitors with more than 20 million user accounts (Leahy) and Valve Corporation makes it publicly known that Steam collects large amounts of data about its users. This information is available via the public player profile in the community section of the Steam application. It includes the average number of hours the user plays per week, and can even indicate the difficulty the user has in navigating game obstacles. Valve reports on the number of users on Steam every two hours via its web site, with a population on average between one and two million simultaneous users (Valve, Steam). We know these users’ hardware profiles because Valve Corporation makes the results of its surveillance public knowledge via the Steam Hardware Survey. Valve’s hardware survey itself conceptualises obsolescence in two ways. First, it uses the results to define the 'cutting edge' of PC technologies and publishing the standards of its own high end production hardware on the companies blog. Second, the effect of the Survey is to subsequently define obsolescent hardware: for example, in the Survey results for April 2009, we can see that the slight majority of users maintain computers with two central processing units while a significant proportion (almost one third) of users still maintained much older PCs with a single CPU. Both effects of the Survey appear to be well understood by Valve: the Steam Hardware Survey automatically collects information about the community's computer hardware configurations and presents an aggregate picture of the stats on our web site. The survey helps us make better engineering and gameplay decisions, because it makes sure we're targeting machines our customers actually use, rather than measuring only against the hardware we've got in the office. We often get asked about the configuration of the machines we build around the office to do both game and Steam development. We also tend to turn over machines in the office pretty rapidly, at roughly every 18 months. (Valve, Team Fortress) Valve’s support of older hardware might counter perceptions that older PCs have no use and begins to reverse decades of opinion regarding planned and stylistic obsolescence in the PC hardware and software industries. Equally significant to the extension of the lives of older PCs is Steam's support for mods and its promotion of user generated content. By providing software for mod creation and distribution, Steam maximises what Postigo calls the development potential of fan-programmers. One of the 'payoffs' in the information/access exchange for the user with Steam is the degree to which Valve's End-User Licence Agreement (EULA) permits individuals and communities of 'modders' to appropriate its proprietary game content for use in the creation of new games and games materials for redistribution via Steam. These mods extend the play of the older games, by requiring their purchase via Steam in order for the individual user to participate in the modded experience. If Steam is able to encourage this kind of appropriation and community support for older content, then the potential exists for it to support cultures of consumption and practice of use that collaboratively maintain, extend, and prolong the life and use of games. Further, Steam incorporates the insights of “long tail” economics in a purely digital distribution model, in which the obsolescence of 'non-hit' game titles can be dramatically overturned. Published in November 2007, Unreal Tournament 3 (UT3) by Epic Games, was unappreciated in a market saturated with games in the first-person shooter genre. Epic republished UT3 on Steam 18 months later, making the game available to play for free for one weekend, followed by discounted access to new content. The 2000 per cent increase in players over the game's 'free' trial weekend, has translated into enough sales of the game for Epic to no longer consider the release a commercial failure: It’s an incredible precedent to set: making a game a success almost 18 months after a poor launch. It’s something that could only have happened now, and with a system like Steam...Something that silently updates a purchase with patches and extra content automatically, so you don’t have to make the decision to seek out some exciting new feature: it’s just there anyway. Something that, if you don’t already own it, advertises that game to you at an agreeably reduced price whenever it loads. Something that enjoys a vast community who are in turn plugged into a sea of smaller relevant communities. It’s incredibly sinister. It’s also incredibly exciting... (Meer) Clearly concerns exist about Steam's user privacy policy, but this also invites us to the think about the economic relationship between gamers and games companies as it is reconfigured through the private contractual relationship established by the EULA which accompanies the digital distribution model. The games industry has established contractual and licensing arrangements with its consumer base in order to support and reincorporate emerging trends in user generated cultures and other cultural formations within its official modes of production (Moore, "Commonising"). When we consider that Valve gets to tax sales of its virtual goods and can further sell the information farmed from its users to hardware manufacturers, it is reasonable to consider the relationship between the corporation and its gamers as exploitative. Gabe Newell, the Valve co-founder and managing director, conversely believes that people are willing to give up personal information if they feel it is being used to get better services (Leahy). If that sentiment is correct then consumers may be willing to further trade for services that can reduce obsolescence and begin to address the problems of e-waste from the ground up. Conclusion Clearly, there is a potential for digital distribution to be a means of not only eliminating the need to physically transport commodities but also supporting consumer practices that further reduce e-waste. For an industry where only a small proportion of the games made break even, the successful relaunch of older games content indicates Steam's capacity to ameliorate software obsolescence. Digital distribution extends the use of commercially released games by providing disintermediated access to older and user-generated content. For Valve, this occurs within a network of exchange as access to user-generated content, social networking services, and support for the organisation and coordination of communities of gamers is traded for user-information and repeat business. Evidence for whether this will actively translate to an equivalent decrease in the obsolescence of game hardware might be observed with indicators like the Steam Hardware Survey in the future. The degree of potential offered by digital distribution is disrupted by a range of technical, commercial and legal hurdles, primary of which is the deployment of DRM, as part of a range of techniques designed to limit consumer behaviour post purchase. While intervention in the form of legislation and radical change to the insidious nature of electronics production is crucial in order to achieve long term reduction in e-waste, the user is currently considered only in terms of 'ethical' consumption and ultimately divested of responsibility through participation in corporate, state and civil recycling and e-waste management operations. The message is either 'careful what you purchase' or 'careful how you throw it away' and, like DRM, ignores the connections between product, producer and user and the consumer support for environmentally, ethically and socially positive production, distribrution, disposal and recycling. This article, has adopted a different strategy, one that sees digital distribution platforms like Steam, as capable, if not currently active, in supporting community practices that should be seriously considered in conjunction with a range of approaches to the challenge of obsolescence and e-waste. References Anderson, Chris. "The Long Tail." Wired Magazine 12. 10 (2004). 20 Apr. 2009 ‹http://www.wired.com/wired/archive/12.10/tail.html›. De Certeau, Michel. The Practice of Everyday Life. Berkeley: U of California P, 1984. Dovey, Jon, and Helen Kennedy. Game Cultures: Computer Games as New Media. London: Open University Press,2006. Fitzpatrick, Kathleen. The Anxiety of Obsolescence. Nashville: Vanderbilt UP, 2008. Flew, Terry. New Media: An Introduction. South Melbourne: Oxford UP, 2008. Leahy, Brian. "Live Blog: DICE 2009 Keynote - Gabe Newell, Valve Software." The Feed. G4TV 18 Feb. 2009. 16 Apr. 2009 ‹http://g4tv.com/thefeed/blog/post/693342/Live-Blog-DICE-2009-Keynote-–-Gabe-Newell-Valve-Software.html›. Meer, Alec. "Unreal Tournament 3 and the New Lazarus Effect." Rock, Paper, Shotgun 16 Mar. 2009. 24 Apr. 2009 ‹http://www.rockpapershotgun.com/2009/03/16/unreal-tournament-3-and-the-new-lazarus-effect/›.Moore, Christopher. "Commonising the Enclosure: Online Games and Reforming Intellectual Property Regimes." Australian Journal of Emerging Technologies and Society 3. 2, (2005). 12 Apr. 2009 ‹http://www.swin.edu.au/sbs/ajets/journal/issue5-V3N2/abstract_moore.htm›. Moore, Christopher. "Creative Choices: Changes to Australian Copyright Law and the Future of the Public Domain." Media International Australia 114 (Feb. 2005): 71–83. Postigo, Hector. "Of Mods and Modders: Chasing Down the Value of Fan-Based Digital Game Modification." Games and Culture 2 (2007): 300-13. Robinson, Daniel. "Windows XP Support Runs Out Next Week." PC Business Authority 8 Apr. 2009. 16 Apr. 2009 ‹http://www.pcauthority.com.au/News/142013,windows-xp-support-runs-out-next-week.aspx›. Straw, Will. "Exhausted Commodities: The Material Culture of Music." Canadian Journal of Communication 25.1 (2000): 175. Slade, Giles. Made to Break: Technology and Obsolescence in America. Cambridge: Harvard UP, 2006. Valve. "Steam and Game Stats." 26 Apr. 2009 ‹http://store.steampowered.com/stats/›. Valve. "Team Fortress 2: The Scout Update." Steam Marketing Message 20 Feb. 2009. 12 Apr. 2009 ‹http://storefront.steampowered.com/Steam/Marketing/message/2269/›. Webb, Richard. "Online Shopping and the Harry Potter Effect." New Scientist 2687 (2008): 52-55. 16 Apr. 2009 ‹http://www.newscientist.com/article/mg20026873.300-online-shopping-and-the-harry-potter-effect.html?page=2›. With thanks to Dr Nicola Evans and Dr Frances Steel for their feedback and comments on drafts of this paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Rizwana, M., Padmalini Singh, N. Ahalya, and T. Mohanasundaram. "Assessing the awareness of nutritional benefits of millets amongst women in Bangalore." British Food Journal, June 2, 2022. http://dx.doi.org/10.1108/bfj-05-2021-0593.

Full text
Abstract:
PurposeThe goal of the present study is to examine the degree of knowledge amongst Indian women about millet grain and its nutritional advantages. Millet is regarded to be five times more nutritious than rice and wheat. Despite the fact that millet contributes to 10% of India's food grain basket and has an annual production of 18 million tonnes, it is not consumed in the same proportion as mainstream cereals (that is rice and wheat). As a result, the study's primary objective is to determine the level of awareness and consumption pattern of millet amongst Indian women regarding millet grains.Design/methodology/approachThe research was carried out in the city of Bengaluru in the state of Karnataka, India. For the purpose of study, a sample of 855 female respondents was approached using a non-probability sampling technique known as convenience sampling. The data were gathered through the use of a self-administered structured questionnaire.FindingsAccording to the findings of the study, the vast majority of respondents consume millet for preserving overall health. Building self and family immunity is the most important factor with 4.11 mean scores and low standard deviation of 0.985. The results reveal that 80.6% of women in the study are aware of millet but only 62.7% of women are consuming millet. The motivating factors and demotivating factors leading to consumption and non-consumption behaviour, respectively have also been identified. The study also reveals that demographic factors such as age, qualification and income have a direct influence on millet consumption.Research limitations/implicationsThe scope of research can be extended to explore the impact of millet consumption on long term health benefits of millet amongst the target respondents. Further, the study can be extended to explore the consumption pattern of millet among different target audience in various parts of India. The media interventions in creating awareness of millet consumption benefits need to be studied for increasing the consumption of millet.Practical implicationsCompanies involved in producing Fast Moving Consumer Goods (FMCG) products can be encouraged to produce millet based foods like cereals, biscuits, ready to eat foods etc. Workshops can be organized to raise awareness on how the millet can replace traditional grains in the cooking process.Social implicationsPolicy measures may include millet being promoted through technology dissemination, creating awareness about advantages of millet and including millet in the Public Distribution System (PDS). It is also important to promote the cultivation, maintenance and processing of the local variety of millet with competent marketing strategies so as to increase their cultivation comparable to the cash crops. Farmers should be educated on the importance of cultivation of minor millet.Originality/valueThe fast-paced lifestyle of urban Indians has a direct impact on their dietary preferences. The World Health Organization (WHO) recommends that people have a nutritionally balanced diet and engage in regular physical activity to reduce health risks. In India, as a result of women's increased participation in the workforce, women are forced to manage many tasks and obligations, which has detrimental effects on their health. The poor nutritional status of modern-day workers is attributed to a lack of education, lack of awareness and a general disregard for health-related concerns. There is a need to investigate if Indian women are aware of the nutritional benefits of millet grains that are higher in protein.
APA, Harvard, Vancouver, ISO, and other styles
5

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
6

Jethani, Suneel. "New Media Maps as ‘Contact Zones’: Subjective Cartography and the Latent Aesthetics of the City-Text." M/C Journal 14, no. 5 (October 18, 2011). http://dx.doi.org/10.5204/mcj.421.

Full text
Abstract:
Any understanding of social and cultural change is impossible without a knowledge of the way media work as environments. —Marshall McLuhan. What is visible and tangible in things represents our possible action upon them. —Henri Bergson. Introduction: Subjective Maps as ‘Contact Zones’ Maps feature heavily in a variety of media; they appear in textbooks, on television, in print, and on the screens of our handheld devices. The production of cartographic texts is a process that is imbued with power relations and bound up with the production and reproduction of social life (Pinder 405). Mapping involves choices as to what information is and is not included. In their organisation, categorisation, modeling, and representation maps show and they hide. Thus “the idea that a small number of maps or even a single (and singular) map might be sufficient can only apply in a spatialised area of study whose own self-affirmation depends on isolation from its context” (Lefebvre 85–86). These isolations determine the way we interpret the physical, biological, and social worlds. The map can be thought of as a schematic for political systems within a confined set of spatial relations, or as a container for political discourse. Mapping contributes equally to the construction of experiential realities as to the representation of physical space, which also contains the potential to incorporate representations of temporality and rhythm to spatial schemata. Thus maps construct realities as much as they represent them and coproduce space as much as the political identities of people who inhabit them. Maps are active texts and have the ability to promote social change (Pickles 146). It is no wonder, then, that artists, theorists and activists alike readily engage in the conflicted praxis of mapping. This critical engagement “becomes a method to track the past, embody memories, explain the unexplainable” and manifest the latent (Ibarra 66). In this paper I present a short case study of Bangalore: Subjective Cartographies a new media art project that aims to model a citizen driven effort to participate in a critical form of cartography, which challenges dominant representations of the city-space. I present a critical textual analysis of the maps produced in the workshops, the artist statements relating to these works used in the exhibition setting, and statements made by the participants on the project’s blog. This “praxis-logical” approach allows for a focus on the project as a space of aggregation and the communicative processes set in motion within them. In analysing such projects we could (and should) be asking questions about the functions served by the experimental concepts under study—who has put it forward? Who is utilising it and under what circumstances? Where and how has it come into being? How does discourse circulate within it? How do these spaces as sites of emergent forms of resistance within global capitalism challenge traditional social movements? How do they create self-reflexive systems?—as opposed to focusing on ontological and technical aspects of digital mapping (Renzi 73). In de-emphasising the technology of digital cartography and honing in on social relations embedded within the text(s), this study attempts to complement other studies on digital mapping (see Strom) by presenting a case from the field of politically oriented tactical media. Bangalore: Subjective Cartographies has been selected for analysis, in this exploration of media as “zone.” It goes some way to incorporating subjective narratives into spatial texts. This is a three-step process where participants tapped into spatial subjectivities by data collection or environmental sensing led by personal reflection or ethnographic enquiry, documenting and geo-tagging their findings in the map. Finally they engaged an imaginative or ludic process of synthesising their data in ways not inherent within the traditional conventions of cartography, such as the use of sound and distortion to explicate the intensity of invisible phenomena at various coordinates in the city-space. In what follows I address the “zone” theme by suggesting that if we apply McLuhan’s notion of media as environment together with Henri Bergson’s assertion that visibility and tangibility constitutes the potential for action to digital maps, projects such as Bangalore: Subjective Cartographies constitute a “contact zone.” A type of zone where groups come together at the local level and flows of discourse about art, information communication, media, technology, and environment intersect with local histories and cultures within the cartographic text. A “contact zone,” then, is a site where latent subjectivities are manifested and made potentially politically potent. “Contact zones,” however, need not be spaces for the aggrieved or excluded (Renzi 82), as they may well foster the ongoing cumulative politics of the mundane capable of developing into liminal spaces where dominant orders may be perforated. A “contact zone” is also not limitless and it must be made clear that the breaking of cartographic convention, as is the case with the project under study here, need not be viewed as resistances per se. It could equally represent thresholds for public versus private life, the city-as-text and the city-as-social space, or the zone where representations of space and representational spaces interface (Lefebvre 233), and culture flows between the mediated and ideated (Appadurai 33–36). I argue that a project like Bangalore: Subjective Cartographies demonstrates that maps as urban text form said “contact zones,” where not only are media forms such as image, text, sound, and video are juxtaposed in a singular spatial schematic, but narratives of individual and collective subjectivities (which challenge dominant orders of space and time, and city-rhythm) are contested. Such a “contact zone” in turn may not only act as a resource for citizens in the struggle of urban design reform and a democratisation of the facilities it produces, but may also serve as a heuristic device for researchers of new media spatiotemporalities and their social implications. Critical Cartography and Media Tactility Before presenting this brief illustrative study something needs to be said of the context from which Bangalore: Subjective Cartographies has arisen. Although a number of Web 2.0 applications have come into existence since the introduction of Google Maps and map application program interfaces, which generate a great deal of geo-tagged user generated content aimed at reconceptualising the mapped city-space (see historypin for example), few have exhibited great significance for researchers of media and communications from the perspective of building critical theories relating to political potential in mediated spaces. The expression of power through mapping can be understood from two perspectives. The first—attributed largely to the Frankfurt School—seeks to uncover the potential of a society that is repressed by capitalist co-opting of the cultural realm. This perspective sees maps as a potential challenge to, and means of providing emancipation from, existing power structures. The second, less concerned with dispelling false ideologies, deals with the politics of epistemology (Crampton and Krygier 14). According to Foucault, power was not applied from the top down but manifested laterally in a highly diffused manner (Foucault 117; Crampton and Krygier 14). Foucault’s privileging of the spatial and epistemological aspects of power and resistance complements the Frankfurt School’s resistance to oppression in the local. Together the two perspectives orient power relative to spatial and temporal subjectivities, and thus fit congruently into cartographic conventions. In order to make sense of these practices the post-oppositional character of tactical media maps should be located within an economy of power relations where resistance is never outside of the field of forces but rather is its indispensable element (Renzi 72). Such exercises in critical cartography are strongly informed by the critical politico-aesthetic praxis of political/art collective The Situationist International, whose maps of Paris were inherently political. The Situationist International incorporated appropriated texts into, and manipulated, existing maps to explicate city-rhythms and intensities to construct imaginative and alternate representations of the city. Bangalore: Subjective Cartographies adopts a similar approach. The artists’ statement reads: We build our subjective maps by combining different methods: photography, film, and sound recording; […] to explore the visible and invisible […] city; […] we adopt psycho-geographical approaches in exploring territory, defined as the study of the precise effects of the geographical environment, consciously developed or not, acting directly on the emotional behaviour of individuals. The project proposals put forth by workshop participants also draw heavily from the Situationists’s A New Theatre of Operations for Culture. A number of Situationist theories and practices feature in the rationale for the maps created in the Bangalore Subjective Cartographies workshop. For example, the Situationists took as their base a general notion of experimental behaviour and permanent play where rationality was approached on the basis of whether or not something interesting could be created out of it (Wark 12). The dérive is the rapid passage through various ambiences with a playful-constructive awareness of the psychographic contours of a specific section of space-time (Debord). The dérive can be thought of as an exploration of an environment without preconceptions about the contours of its geography, but rather a focus on the reality of inhabiting a place. Détournement involves the re-use of elements from recognised media to create a new work with meaning often opposed to the original. Psycho-geography is taken to be the subjective ambiences of particular spaces and times. The principles of détournement and psycho-geography imply a unitary urbanism, which hints at the potential of achieving in environments what may be achieved in media with détournement. Bangalore: Subjective Cartographies carries Situationist praxis forward by attempting to exploit certain properties of information digitalisation to formulate textual representations of unitary urbanism. Bangalore: Subjective Cartographies is demonstrative of a certain media tactility that exists more generally across digital-networked media ecologies and channels this to political ends. This tactility of media is best understood through textual properties awarded by the process and logic of digitalisation described in Lev Manovich’s Language of New Media. These properties are: numerical representation in the form of binary code, which allows for the reification of spatial data in a uniform format that can be stored and retrieved in-silico as opposed to in-situ; manipulation of this code by the use of algorithms, which renders the scales and lines of maps open to alteration; modularity that enables incorporation of other textual objects into the map whilst maintaining each incorporated item’s individual identity; the removal to some degree of human interaction in terms of the translation of environmental data into cartographic form (whilst other properties listed here enable human interaction with the cartographic text), and the nature of digital code allows for changes to accumulate incrementally creating infinite potential for refinements (Manovich 49–63). The Subjective Mapping of Bangalore Bangalore is an interesting site for such a project given the recent and rapid evolution of its media infrastructure. As a “media city,” the first television sets appeared in Bangalore at some point in the early 1980s. The first Internet Service Provider (ISP), which served corporate clients only, commenced operating a decade later and then offered dial-up services to domestic clients in the mid-1990s. At present, however, Bangalore has the largest number of broadband Internet connections in India. With the increasing convergence of computing and telecommunications with traditional forms of media such as film and photography, Bangalore demonstrates well what Scott McQuire terms a media-architecture complex, the core infrastructure for “contact zones” (vii). Bangalore: Subjective Cartographies was a workshop initiated by French artists Benjamin Cadon and Ewen Cardonnet. It was conducted with a number of students at the Srishti School of Art, Design and Technology in November and December 2009. Using Metamap.fr (an online cartographic tool that makes it possible to add multimedia content such as texts, video, photos, sounds, links, location points, and paths to digital maps) students were asked to, in groups of two or three, collect and consult data on ‘felt’ life in Bangalore using an ethnographic, transverse geographic, thematic, or temporal approach. The objective of the project was to model a citizen driven effort to subvert dominant cartographic representations of the city. In doing so, the project and this paper posits that there is potential for such methods to be adopted to form new literacies of cartographic media and to render the cartographic imaginary politically potent. The participants’ brief outlined two themes. The first was the visible and symbolic city where participants were asked to investigate the influence of the urban environment on the behaviours and sensations of its inhabitants, and to research and collect signifiers of traditional and modern worlds. The invisible city brief asked participants to consider the latent environment and link it to human behaviour—in this case electromagnetic radiation linked to the cities telecommunications and media infrastructure was to be specifically investigated. The Visible and Symbolic City During British rule many Indian cities functioned as dual entities where flow of people and commodities circulated between localised enclaves and the centralised British-built areas. Mirroring this was the dual mode of administration where power was shared between elected Indian legislators and appointed British officials (Hoselitz 432–33). Reflecting on this diarchy leads naturally to questions about the politics of civic services such as the water supply, modes of public communication and instruction, and the nature of the city’s administration, distribution, and manufacturing functions. Workshop participants approached these issues in a variety of ways. In the subjective maps entitled Microbial Streets and Water Use and Reuse, food and water sources of street vendors are traced with the aim to map water supply sources relative to the movements of street vendors operating in the city. Images of the microorganisms are captured using hacked webcams as makeshift microscopes. The data was then converted to audio using Pure Data—a real-time graphical programming environment for the processing audio, video and graphical data. The intention of Microbial Streets is to demonstrate how mapping technologies could be used to investigate the flows of food and water from source to consumer, and uncover some of the latencies involved in things consumed unhesitatingly everyday. Typographical Lens surveys Russell Market, an older part of the city through an exploration of the aesthetic and informational transformation of the city’s shop and street signage. In Ethni City, Avenue Road is mapped from the perspective of local goldsmiths who inhabit the area. Both these maps attempt to study the convergence of the city’s dual function and how the relationship between merchants and their customers has changed during the transition from localised enclaves, catering to the sale of particular types of goods, to the development of shopping precincts, where a variety of goods and services can be sought. Two of the project’s maps take a spatiotemporal-archivist approach to the city. Bangalore 8mm 1940s uses archival Super 8 footage and places digitised copies on the map at the corresponding locations of where they were originally filmed. The film sequences, when combined with satellite or street-view images, allow for the juxtaposition of present day visions of the city with those of the 1940s pre-partition era. Chronicles of Collection focuses on the relationship between people and their possessions from the point of view of the object and its pathways through the city in space and time. Collectors were chosen for this map as the value they placed on the object goes beyond the functional and the monetary, which allowed the resultant maps to access and express spatially the layers of meaning a particular object may take on in differing contexts of place and time in the city-space. The Invisible City In the expression of power through city-spaces, and by extension city-texts, certain circuits and flows are ossified and others rendered latent. Raymond Williams in Politics and Letters writes: however dominant a social system may be, the very meaning of its domination involves a limitation or selection of the activities it covers, so that by definition it cannot exhaust all social experience, which therefore always potentially contains space for alternative acts and alternative intentions which are not yet articulated as a social institution or even project. (252) The artists’ statement puts forward this possible response, an exploration of the latent aesthetics of the city-space: In this sense then, each device that enriches our perception for possible action on the real is worthy of attention. Even if it means the use of subjective methods, that may not be considered ‘evidence’. However, we must admit that any subjective investigation, when used systematically and in parallel with the results of technical measures, could lead to new possibilities of knowledge. Electromagnetic City maps the city’s sources of electromagnetic radiation, primarily from mobile phone towers, but also as a by-product of our everyday use of technologies, televisions, mobile phones, Internet Wi-Fi computer screens, and handheld devices. This map explores issues around how the city’s inhabitants hear, see, feel, and represent things that are a part of our environment but invisible, and asks: are there ways that the intangible can be oriented spatially? The intensity of electromagnetic radiation being emitted from these sources, which are thought to negatively influence the meditation of ancient sadhus (sages) also features in this map. This data was collected by taking electromagnetic flow meters into the suburb of Yelhanka (which is also of interest because it houses the largest milk dairy in the state of Karnataka) in a Situationist-like derive and then incorporated back into Metamap. Signal to Noise looks at the struggle between residents concerned with the placement of mobile phone towers around the city. It does so from the perspectives of people who seek information about their placement concerned about mobile phone signal quality, and others concerned about the proximity of this infrastructure to their homes due to to potential negative health effects. Interview footage was taken (using a mobile phone) and manipulated using Pure Data to distort the visual and audio quality of the footage in proportion to the fidelity of the mobile phone signal in the geographic area where the footage was taken. Conclusion The “contact zone” operating in Bangalore: Subjective Cartographies, and the underlying modes of social enquiry that make it valuable, creates potential for the contestation of new forms of polity that may in turn influence urban administration and result in more representative facilities of, and for, city-spaces and their citizenry. Robert Hassan argues that: This project would mean using tactical media to produce new spaces and temporalities that are explicitly concerned with working against the unsustainable “acceleration of just about everything” that our present neoliberal configuration of the network society has generated, showing that alternatives are possible and workable—in ones job, home life, family life, showing that digital [spaces and] temporality need not mean the unerring or unbending meter of real-time [and real city-space] but that an infinite number of temporalities [and subjectivities of space-time] can exist within the network society to correspond with a diversity of local and contextual cultures, societies and polities. (174) As maps and locative motifs begin to feature more prominently in media, analyses such as the one discussed in this paper may allow for researchers to develop theoretical approaches to studying newer forms of media. References Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalisation. Minneapolis: U of Minnesota P, 1996. “Bangalore: Subjective Cartographies.” 25 July 2011 ‹http://bengaluru.labomedia.org/page/2/›. Bergson, Henri. Creative Evolution. New York: Henry Holt and Company, 1911. Crampton, Jeremy W., and John Krygier. “An Introduction to Critical Cartography.” ACME: An International E-Journal for Critical Geography 4 (2006): 11–13. Chardonnet, Ewen, and Benjamin Cadon. “Semaphore.” 25 July 2011 ‹http://semaphore.blogs.com/semaphore/spectral_investigations_collective/›. Debord, Guy. “Theory of the Dérive.” 25 July 2011 ‹http://www.bopsecrets.org/SI/2.derive.htm›. Foucault, Michel. Remarks on Marx. New York: Semitotext[e], 1991.Hassan, Robert. The Chronoscopic Society: Globalization, Time and Knowledge in the Networked Economy. New York: Lang, 2003. “Historypin.” 4 Aug. 2011 ‹http://www.historypin.com/›. Hoselitz, Bert F. “A Survey of the Literature on Urbanization in India.” India’s Urban Future Ed. Roy Turner. Berkeley: U of California P, 1961. 425-43. Ibarra, Anna. “Cosmologies of the Self.” Elephant 7 (2011): 66–96. Lefebvre, Henri. The Production of Space. Oxford: Blackwell, 1991. Lovink, Geert. Dark Fibre. Cambridge: MIT Press, 2002. Manovich, Lev. The Language of New Media Cambridge: MIT Press, 2000. “Metamap.fr.” 3 Mar. 2011 ‹http://metamap.fr/›. McLuhan, Marshall, and Quentin Fiore. The Medium Is the Massage. London: Penguin, 1967. McQuire, Scott. The Media City: Media, Architecture and Urban Space. London: Sage, 2008. Pickles, John. A History of Spaces: Cartographic Reason, Mapping and the Geo-Coded World. London: Routledge, 2004. Pinder, David. “Subverting Cartography: The Situationists and Maps of the City.” Environment and Planning A 28 (1996): 405–27. “Pure Data.” 6 Aug. 2011 ‹http://puredata.info/›. Renzi, Alessandra. “The Space of Tactical Media” Digital Media and Democracy: Tactics in Hard Times. Ed. Megan Boler. Cambridge: MIT Press, 2008. 71–100. Situationist International. “A New Theatre of Operations for Culture.” 6 Aug. 2011 ‹http://www.blueprintmagazine.co.uk/index.php/urbanism/reading-the-situationist-city/›. Strom, Timothy Erik. “Space, Cyberspace and the Interface: The Trouble with Google Maps.” M/C Journal 4.3 (2011). 6 Aug. 2011 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/370›. Wark, McKenzie. 50 Years of Recuperation of the Situationist International, New York: Princeton Architectural Press, 2008. Williams, Raymond. Politics and Letters: Interviews with New Left Review. London: New Left, 1979.
APA, Harvard, Vancouver, ISO, and other styles
7

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:
Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.
APA, Harvard, Vancouver, ISO, and other styles
8

Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone." M/C Journal 10, no. 1 (March 1, 2007). http://dx.doi.org/10.5204/mcj.2602.

Full text
Abstract:
Introduction As the country with the fifth largest population in the world, Indonesia is a massive potential market for mobile technology adoption and development. Despite an annual per capita income of only $1,280 USD (World Bank), there are 63 million mobile phone users in Indonesia (Suhartono, sec. 1.7) and it is predicted to reach 80 million in 2007 (Jakarta Post 1). Mobile phones are not only a symbol of Indonesian modernity (Barendregt 5), but like other communication technology can become a platform through which to explore socio-political issues (Winner 28). In this article we explore the role mobile phone technology in contemporary forms of social, intimate, and sexual relationships in Indonesia. We argue that new forms of expression and relations are facilitated by the particular features of mobile technology. We discuss two cases from contemporary Indonesia: a mobile dating service (BEDD) and mobile phone pornography. For each case study, we first discuss the socio-political background in Indonesia, then describe the technological affordances of the mobile phone which facilitate dating and pornography, and finally give examples of how the mobile phone is effecting change in dating and pornographic practices. This study is placed at a time when social relations, intimacy, and sexuality in Indonesia have become central public issues. Since the end of the New Order whilst many people have embraced the new freedoms of reformasi and democratization, there is also a high degree of social anxiety, tension and uncertainty (Juliastuti 139-40). These social changes and desires have played out in the formations of new and exciting modes of creativity, solidarity, and sociality (Heryanto and Hadiz 262) and equally violence, terror and criminality (Heryanto and Hadiz 256). The diverse and plural nature of Indonesian society is alive with a myriad of people and activities, and it is into this diverse social body that the mobile phone has become a central and prominent feature of interaction. The focus of our study is dating and pornography as mediated by the mobile phone; however, we do not suggest that these are new experiences in Indonesia. Rather over the last decade social, intimate, and sexual relationships have all been undergoing change and their motivations can be traced to a variety of sources including the factors of globalization, democratization and modernization. Throughout Asia “new media have become a crucial site for constituting new Asian sexual identities and communities” (Berry, Martin, and Yue 13) as people are connecting through new communication technologies. In this article we suggest that mobile phone technology opens new possibilities and introduces new channels, dynamics, and intensities of social interaction. Mobile phones are particularly powerful communication tools because of their mobility, accessibility, and convergence (Ling 16-19; Ito 14-15; Katz and Aakhus 303). These characteristics of mobile phones do not in and of themselves bring about any particular changes in dating and pornography, but they may facilitate changes already underway (Barendegt 7-9; Barker 9). Mobile Dating Background The majority of Indonesians in the 1960s and 1970s had arranged marriages (Smith-Hefner 443). Education reform during the 70s and 80s encouraged more women to attain an education which in turn led to the delaying of marriage and the changing of courtship practices (Smith-Hefner 450). “Compared to previous generations, [younger Indonesians] are freer to mix with the opposite sex and to choose their own marriage,” (Utomo 225). Modern courtship in Java is characterized by “self-initiated romance” and dating (Smith-Hefner 451). Mobile technology is beginning to play a role in initiating romance between young Indonesians. Technology One mobile matching or dating service available in Indonesia is called BEDD (www.bedd.com). BEDD is a free software for mobile phones in which users fill out a profile about themselves and can meet BEDD members who are within 20-30 feet using a Bluetooth connection on their mobile devices. BEDD members’ phones automatically exchange profile information so that users can easily meet new people who match their profile requests. BEDD calls itself mobile social networking community; “BEDD is a new Bluetooth enabled mobile social medium that allows people to meet, interact and communicate in a new way by letting their mobile phones do all the work as they go throughout their day.” As part of a larger project on mobile social networking (Humphreys 6), a field study was conducted of BEDD users in Jakarta, Indonesia and Singapore (where BEDD is based) in early 2006. In-depth interviews and open-ended user surveys were conducted with users, BEDD’s CEO and strategic partners in order to understand the social uses and effects BEDD. The majority of BEDD members (which topped 100,000 in January 2006) are in Indonesia thanks to a partnership with Nokia where BEDD came pre-installed on several phone models. In management interviews, both BEDD and Nokia explained that they partnered because both companies want to help “build community”. They felt that Bluetooth technology such as BEDD could be used to help youth meet new people and keep in touch with old friends. Examples One of BEDD’s functions is to help lower barriers to social interaction in public spaces. By sharing profile information and allowing for free text messaging, BEDD can facilitate conversations between BEDD members. According to users, mediating the initial conversation also helps to alleviate social anxiety, which often accompanies meeting new people. While social mingling and hanging out between Jakarta teenagers is a relatively common practice, one user said that BEDD provides a new and fun way to meet and flirt. In a society that must balance between an “idealized morality” and an increasingly sexualized popular culture (Utomo 226), BEDD provides a modern mode of self-initiated matchmaking. While BEDD was originally intended to aid in the matchmaking process of dating, it has been appropriated into everyday life in Indonesia because of its interpretive flexibility (Pinch & Bjiker 27). Though BEDD is certainly used to meet “beautiful girls” (according to one Indonesian male user), it is also commonly used to text message old friends. One member said he uses BEDD to text his friends in class when the lecture gets boring. BEDD appears to be a helpful modern communication tool when people are physically proximate but cannot easily talk to one another. BEDD can become a covert way to exchange messages with people nearby for free. Another potential explanation for BEDD’s increasing popularity is its ability to allow users to have private conversations in public space. Bennett notes that courtship in private spaces is seen as dangerous because it may lead to sexual impropriety (154). Dating and courtship in public spaces are seen as safer, particularly for conserving the reputation young Indonesian women. Therefore Bluetooth connections via mobile technologies can be a tool to make private social connections between young men and women “safer”. Bluetooth communication via mobile phones has also become prevalent in more conservative Muslim societies (Sullivan, par. 7; Braude, par. 3). There are, however, safety concerns about meeting strangers in public spaces. When asked, “What advice would you give a first time BEDD user?” one respondent answered, “harus bisa mnilai seseorang krn itu sangat penting, kita mnilai seseorang bukan cuma dari luarnya” (translated: be careful in evaluating (new) people, and don’t ever judge the book by its cover”). Nevertheless, only one person participating in this study mentioned this concern. To some degree meeting someone in a public may be safer than meeting someone in an online environment. Not only are there other people around in public spaces to physically observe, but co-location means there may be some accountability for how BEDD members present themselves. The development and adoption of matchmaking services such as BEDD suggests that the role of the mobile phone in Indonesia is not just to communicate with friends and family but to act as a modern social networking tool as well. For young Indonesians BEDD can facilitate the transfer of social information so as to encourage the development of new social ties. That said, there is still debate about exactly whom BEDD is connecting and for what purposes. On one hand, BEDD could help build community in Indonesia. One the other hand, because of its privacy it could become a tool for more promiscuous activities (Bennett 154-5). There are user profiles to suggest that people are using BEDD for both purposes. For example, note what four young women in Jakarta wrote in the BEDD profiles: Personal Description Looking For I am a good prayer, recite the holy book, love saving (money), love cycling… and a bit narcist. Meaning of life Ordinary gurl, good student, single, Owen lover, and the rest is up to you to judge. Phrenz ?! Peace?! Wondeful life! I am talkative, have no patience but so sweet. I am so girly, narcist, shy and love cute guys. Check my fs (Friendster) account if you’re so curious. Well, I am just an ordinary girl tho. Anybody who wants to know me. A boy friend would be welcomed. Play Station addict—can’t live without it! I am a rebel, love rock, love hiphop, naughty, if you want proof dial 081********* phrenz n cute guyz As these profiles suggest, the technology can be used to send different kinds of messages. The mobile phone and the BEDD software merely facilitate the process of social exchange, but what Indonesians use it for is up to them. Thus BEDD and the mobile phone become tools through which Indonesians can explore their identities. BEDD can be used in a variety of social and communicative contexts to allow users to explore their modern, social freedoms. Mobile Pornography Background Mobile phone pornography builds on a long tradition of pornography and sexually explicit material in Indonesia through the use of a new technology for an old art and product. Indonesia has a rich sexual history with a documented and prevalent sex industry (Suryakusuma 115). Lesmana suggests that the country has a tenuous pornographic industry prone to censorship and nationalist politics intent on its destruction. Since the end of the New Order and opening of press freedoms there has been a proliferation in published material including a mushrooming of tabloids, men’s magazines such as FHM, Maxim and Playboy, which are often regarded as pornographic. This is attributed to the decline of the power of the bureaucracy and government and the new role of capital in the formation of culture (Chua 16). There is a parallel pornography industry, however, that is more amateur, local, and homemade (Barker 6). It is into this range of material that mobile phone pornography falls. Amongst the myriad forms of pornography and sexually explicit material available in Indonesia, the mobile phone in recent years has emerged as a new platform for production, distribution, and consumption. This section will not deal with the ethics of representation nor engage with the debate about definitions and the rights and wrongs of pornography. Instead what will be shown is how the mobile phone can be and has been used as an instrument/medium for the production and consumption of pornography within contemporary social relationships. Technology There are several technological features of the mobile phone that make pornography possible. As has already been noted the mobile phone has had a large adoption rate in Indonesia, and increasingly these phones come equipped with cameras and the ability to send data via MMS and Bluetooth. Coupled with the mobility of the phone, the convergence of technology in the mobile phone makes it possible for pornography to be produced and consumed in a different way than what has been possible before. It is only recently that the mobile phone has been marketed as a video camera with the release of the Nokia N90; however, quality and recording time are severely limited. Still, the mobile phone is a convenient and at-hand tool for the production and consumption of individually made, local, and non-professional pieces of porn, sex and sexuality. It is impossible to know how many such films are in circulation. A number of websites that offer these films for downloads host between 50 and 100 clips in .3gp file format, with probably more in actual circulation. At the very least, this is a tenfold increase in number compared to the recent emergence of non-professional VCD films (Barker 3). This must in part be attributed to the advantages that the mobile phone has over standard video cameras including cost, mobility, convergence, and the absence of intervening data processing and disc production. Examples There are various examples of mobile pornography in Indonesia. These range from the pornographic text message sent between lovers to the mobile phone video of explicit sexual acts (Barendregt 14-5). The mobile phone affords privacy for the production and exchange of pornographic messages and media. Because mobile devices are individually owned, however, pornographic material found on mobile phones can be directly tied to the individual owners. For example, police in Kotabaru inspected the phones of high school students in search of pornographic materials and arrested those individuals on whose phones it was found (Barendregt 18). Mobile phone pornography became a national political issue in 2006 when an explicit one-minute clip of a singer and an Indonesian politician became public. Videoed in 2004, the clip shows Maria Eva, a 27 year-old dangdut singer (see Browne, 25-6) and Yahya Zaini, a married 42 year-old who was head of religious affairs for the Golkar political party. Their three-year affair ended in 2005, but the film did not become public until 2006. It spread like wildfire between phones and across the internet, however, and put an otherwise secret relationship into the limelight. These types of affairs and relationships were common knowledge to people through gossip, exposes such as Jakarta Undercover (Emka 93-108) and stories in tabloids; yet this culture of adultery and prostitution continued and remained anonymous because of bureaucratic control of evidence and information (Suryakusuma 115). In this case, however, the filming of Maria Eva once public proves the identities of those involved and their infidelity. As a result of the scandal it was further revealed that Maria Eva had been forced by Yayha Zaini and his wife to have an abortion, deepening the moral crisis. Yahya Zaini later resigned as his party’s head of Religious Affairs (Asmarani, sec. 1-2), due to what was called the country’s “first real sex scandal” (Naughton, par. 2). As these examples show, there are definite risks and consequences involved in the production of mobile pornography. Even messages/media that are meant to be shared between two consenting individuals can eventually make their way into the public mobile realm and have serious consequences for those involved. Mobile video and photography does, however, represent a potential new check on the Indonesian bureaucratic elite which has not been previously available by other means such as a watchdog media. “The role of the press as a control mechanism is practically nonexistent [in Jakarta], which in effect protects corruption, nepotism, financial manipulation, social injustice, and repression, as well as the murky sexual life of the bureaucratic power elite,” (Suryakusuma 117). Thus while originally a mobile video may have been created for personal pleasure, through its mass dissemination via new media it can become a means of sousveillance (Mann, Nolan and Wellman 332-3) whereby the control of surveillance is flipped to reveal the often hidden abuses of power by officials. Whilst the debates over pornography in Indonesia tend to focus on the moral aspects of it, the broader social impacts of technology on relationships are often ignored. Issues related to power relations or even media as cultural expression are often disregarded as moral judgments cast a heavy shadow over discussions of locally produced Indonesian mobile pornography. It is possible to move beyond the moral critique of pornographic media to explore the social significance of its proliferation as a cultural product. Conclusion In these two case studies we have tried to show how the mobile phone in Indonesia has become a mode of interaction but also a platform through which to explore other current issues and debates related to dating, sexuality and media. Since 1998 and the fall of the New Order, Indonesia has been struggling with blending old and new, a desire of change and nostalgia for past, and popular desire for a “New Indonesia” (Heryanto, sec. Post-1998). Cultural products within Indonesia have played an important role in exploring these issues. The mobile phone in Indonesia is not just a technology, but also a product in and through which these desires are played out. Changes in dating and pornography practices have been occurring in Indonesia for some time. As people use mobile technology to produce, communicate, and consume, the device becomes intricately related to identity struggle and cultural production within Indonesia. It is important to keep in mind, however, that while mobile technology adoption within Indonesia is growing, it is still limited to a particular subset of the population. As has been previously observed (Barendregt 3), it is wealthier, young people in urban areas who are most intensely involved in mobile technology. As handset prices decrease and availability in rural areas increases, however, no longer will mobile technology be so demographically confined in Indonesia. The convergent technology of the mobile phone opens many possibilities for creative adoption and usage. As a communication device it allows for the creation, sharing, and viewing of messages. Therefore, the technology itself facilitates social connections and networking. As demonstrated in the cases of dating and pornography, the mobile phone is both a tool for meeting new people and disseminating sexual messages/media because it is a networked technology. The mobile phone is not fundamentally changing dating and pornography practices, but it is accelerating social and cultural trends already underway in Indonesia by facilitating the exchange and dissemination of messages and media. As these case studies show, what kinds of messages Indonesians choose to create and share are up to them. The same device can be used for relatively innocuous behavior as well as more controversial behavior. With increased adoption in Indonesia, the mobile will continue to be a lens through which to further explore modern socio-political issues. References Asmarani, Devi. “Indonesia: Top Golkar Official Quits over Sex Video.” The Straits Times 6 Dec. 2006. Barendregt, Bart. “Between M-Governance and Mobile Anarchies: Pornoaksi and the Fear of New Media in Present Day Indonesia.” European Association of Social Anthropologists Media Anthropology Network e-Seminar Series, 2006. Barker, Thomas. “VCD Pornography of Indonesia.” Asian Studies Association of Australia, Wollongong, 2006. BEDD Press Release. “World’s First Mobile Communities Software Is Bringing People Together in Singapore.” 8 June 2004. Bennett, Linda Rae. Women, Islam and Modernity: Single Women, Sexuality and Reproductive Health in Contemporary Indonesia. London: Routledge Curzon, 2005. Berry, Chris, Fran Martin, and Audrey Yue, eds. Mobile Cultures: New Media in Queer Asia. Durham, NC: Duke UP, 2003. Braude, Joseph. “How Bluetooth Helps Young Kuwaitis Get It On.” The New Republic Online 14 Sep. 2006. Browne, Susan. “The Gender Implications of Dangdut Kampungan: Indonesian ‘Low Class’ Popular Music.”* *Working Paper 109, Centre of Southeast Asian Studies, Monash University. 2000. Chua, Beng-Huat. “Consuming Asians: Ideas and Issues.” Consumption in Asia: Lifestyles and Identities. Ed. Beng-Huat Chua. London: Routledge, 2003. 1-34. Emka, Moammar. Jakarta Undercover: Sex n’ the City. Yogyakarta: Galang Press, 2002. Heryanto, Ariel. “New Media and Pop Cultures in(ter) Asia.” Soft Power and Spheres of Influence in South and Southeast Asia. National University of Singapore, 2006. Heryanto, Ariel, and Vedi Hadiz. “Post-Authoritarian Indonesia: A Comparative Southeast Asian Perspective.” Critical Asian Studies 37.2 (2005): 251-75. Humphreys, Lee. “Mobile Devices and Social Networking.” Mobile Pre-Conference at the International Communication Association. Erfurt, Germany, 2006. Ito, Mizuko. “Introduction: Personal, Portable, Pedestrian.” Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. Eds. Mizuko Ito, Diasuke Okabe, and Misa Matsuda. Cambridge, MA: MIT Press, 2005. 1-16. JakartaPost.com. “Cell-Phone Users May Reach 80m This Year.” 6 Jan. 2006. http://www.thejakartapost.com/detailheadlines.asp? fileid=20070106.@02&irec=1>. Juliastuti, Nuraini. “Whatever I Want: Media and Youth in Indonesia before and after 1998.” Inter-Asia Cultural Studies 7 (2006): 1. Katz, James E., and Mark Aakhus, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. New York: Cambridge UP, 2002. Lesmana, Tjipta. Pornografi dalam Media Massa. Jakarta: Puspa Swara, 1994. Ling, Richard. The Mobile Connection: The Cell Phone’s Impact on Society. San Francisco, CA: Morgan Kaufmann, 2004. Mann, Steve, Jason Nolan, and Barry Wellman. “Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.” Surveillance and Society 1.3 (2003): 331-55. Naughton, Philippe. “Video Sex Scandal Claims Indonesian MP.” The Times Online 8 Dec. 2006. Pinch, Trevor J., and Wiebe E. Bijker. “The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” The Social Construction of Technological Systems: New Direction in the Sociology and History of Technology. Eds. W. E. Bijker, T. P. Hughes and T.J. Pinch. Cambridge, MA: MIT Press, 1987. 17-51. Smith-Hefner, Nancy J. “The New Muslim Romance: Changing Patterns of Courtship and Marriage among Educated Javanese Youth.” Journal of Southeast Asian Studies 36.3 (2005): 441-59. Suhartono, Harry. “Mobile Penetration to Drive Market Leader’s Profit Gain.” Reuters News 27 Oct. 2006. Sullivan, Kevin. “Saudi Youth Use Cellphone Savvy to Outwit the Sentries of Romance.” The Washington Post 6 Aug. 2006: A01. Suryakusuma, Julia. “The State and Sexuality in New Order Indonesia.” Fantasizing the Feminine in Indonesia. Ed. Laurie J. Sears. Durham, NC: Duke UP, 1996. 92-119. Utomo, Iwu Dwisetyani. “Sexual Values and Early Experiences among Young People in Jakarta: Youth, Courtship and Sexuality.” Coming of Age in South and Southeast Asia. Eds. Lenore Manderson and Pranee Liamputtong. Surey: Curzon, 2002. 207-27. Winner, Langdon. “Do Artifacts Have Politics?” Social Shaping of Technology. 2nd ed. Eds. Donald MacKenzie and Judy Wajcman. Buckingham, UK: Open UP, 2002. 28-40. World Bank. 2004 Indonesia Data & Statistics. 4 Jan. 2006. http://web.worldbank.org/WBSITE/EXTERNAL/COUNTRIES/ EASTASIAPACIFICEXT/INDONESIAEXTN/0,,menuPK:287097~pagePK: 141132~piPK:141109~theSitePK:226309,00.html>. Citation reference for this article MLA Style Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>. APA Style Humphreys, L., and T. Barker. (Mar. 2007) "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>.
APA, Harvard, Vancouver, ISO, and other styles
9

Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2696.

Full text
Abstract:
Introduction It has frequently been noted that ICTs and social networking applications have blurred the once-clear boundary between work, leisure and entertainment, just as they have collapsed the distinction between public and private space. While each individual has a sense of what “home” means, both in terms of personal experience and more conceptually, the following three examples of online interaction (based on participants’ interest, or involvement, in activities traditionally associated with the home: pet care, craft and cooking) suggest that the utilisation of online communication technologies can lead to refined and extended definitions of what “home” is. These examples show how online communication can assist in meeting the basic human needs for love, companionship, shelter and food – needs traditionally supplied by the home environment. They also provide individuals with a considerably expanded range of opportunities for personal expression and emotional connection, as well as creative and commercial production, than that provided by the purely physical (and, no doubt, sometimes isolated and isolating) domestic environment. In this way, these case studies demonstrate the interplay and melding of physical and virtual “home” as domestic practices leach from the most private spaces of the physical home into the public space of the Internet (for discussion, see Gorman-Murray, Moss, and Rose). At the same time, online interaction can assert an influence on activity within the physical space of the home, through the sharing of advice about, and modeling of, domestic practices and processes. A Dog’s (Virtual) Life The first case study primarily explores the role of online communities in the formation and expression of affective values and personal identity – as traditionally happens in the domestic environment. Garber described the 1990s as “the decade of the dog” (20), citing a spate of “new anthropomorphic” (22) dog books, Internet “dog chat” sites, remakes of popular classics such as Lassie Come Home, dog friendly urban amenities, and the meteoric rise of services for pampered pets (28-9). Loving pets has become a lifestyle and culture, witnessed and commodified in Pet Superstores as well as in dog collectables and antiques boutiques, and in publications like The Bark (“the New Yorker of Dog Magazines”) and Clean Run, the international agility magazine, Website, online book store and information gateway for agility products and services. Available online resources for dog lovers have similarly increased rapidly during the decade since Garber’s book was published, with the virtual world now catering for serious hobby trainers, exhibitors and professionals as well as the home-based pet lover. At a recent survey, Yahoo Groups – a personal communication portal that facilitates social networking, in this case enabling users to set up electronic mailing lists and Internet forums – boasted just over 9,600 groups servicing dog fanciers and enthusiasts. The list Dogtalk is now an announcement only mailing list, but was a vigorous discussion forum until mid-2006. Members of Dogtalk were Australian-based “clicker-trainers”, serious hobbyist dog trainers, many of whom operated micro-businesses providing dog training or other pet-related services. They shared an online community, but could also engage in “flesh-meets” at seminars, conferences and competitive dog sport meets. An author of this paper (Rutherford) joined this group two years ago because of her interest in clicker training. Clicker training is based on an application of animal learning theory, particularly psychologist E. F. Skinner’s operant conditioning, so called because of the trademark use of a distinctive “click” sound to mark a desired behaviour that is then rewarded. Clicker trainers tend to dismiss anthropomorphic pack theory that positions the human animal as fundamentally opposed to non-human animals and, thus, foster a partnership (rather than a dominator) mode of social and learning relationships. Partnership and nurturance are common themes within the clicker community (as well as in more traditional “home” locations); as is recognising and valuing the specific otherness of other species. Typically, members regard their pets as affective equals or near-equals to the human animals that are recognised members of their kinship networks. A significant function of the episodic biographical narratives and responses posted to this list was thus to affirm and legitimate this intra-specific kinship as part of normative social relationship – a perspective that is not usually validated in the general population. One of the more interesting nexus that evolved within Dogtalk links the narrativisation of the pet in the domestic sphere with the pictorial genre of the family album. Emergent technologies, such as digital cameras together with Web-based image manipulation software and hosting (as provided by portals like Photobucket and Flickr ) democratise high quality image creation and facilitate the sharing of these images. Increasingly, the Dogtalk list linked to images uploaded to free online galleries, discussed digital image composition and aesthetics, and shared technical information about cameras and online image distribution. Much of this cultural production and circulation was concerned with digitally inscribing particular relationships with individual animals into cultural memory: a form of family group biography (for a discussion of the family photograph as a display of extended domestic space, see Rose). The other major non-training thread of the community involves the sharing and witnessing of the trauma suffered due to the illness and loss of pets. While mourning for human family members is supported in the off-line world – with social infrastructure, such as compassionate leave and/or bereavement counselling, part of professional entitlements – public mourning for pets is not similarly supported. Yet, both cultural studies (in its emphasis on cultural memory) and trauma theory have highlighted the importance of social witnessing, whereby traumatic memories must be narratively integrated into memory and legitimised by the presence of a witness in order to loosen their debilitating hold (Felman and Laub 57). Postings on the progress of a beloved animal’s illness or other misfortune and death were thus witnessed and affirmed by other Dogtalk list members – the sick or deceased pet becoming, in the process, a feature of community memory, not simply an individual loss. In terms of such biographical narratives, memory and history are not identical: “Any memories capable of being formed, retained or articulated by an individual are always a function of socially constituted forms, narratives and relations … Memory is always subject to active social manipulation and revision” (Halbwachs qtd. in Crewe 75). In this way, emergent technologies and social software provide sites, akin to that of physical homes, for family members to process individual memories into cultural memory. Dogzonline, the Australian Gateway site for purebred dog enthusiasts, has a forum entitled “Rainbow Bridge” devoted to textual and pictorial memorialisation of deceased pet dogs. Dogster hosts the For the Love of Dogs Weblog, in which images and tributes can be posted, and also provides links to other dog oriented Weblogs and Websites. An interesting combination of both therapeutic narrative and the commodification of affect is found in Lightning Strike Pet Loss Support which, while a memorial and support site, also provides links to the emerging profession of pet bereavement counselling and to suppliers of monuments and tributary urns for home or other use. loobylu and Narratives of Everyday Life The second case study focuses on online interactions between craft enthusiasts who are committed to the production of distinctive objects to decorate and provide comfort in the home, often using traditional methods. In the case of some popular craft Weblogs, online conversations about craft are interspersed with, or become secondary to, the narration of details of family life, the exploration of important life events or the recording of personal histories. As in the previous examples, the offering of advice and encouragement, and expressions of empathy and support, often characterise these interactions. The loobylu Weblog was launched in 2001 by illustrator and domestic crafts enthusiast Claire Robertson. Robertson is a toy maker and illustrator based in Melbourne, Australia, whose clients have included prominent publishing houses, magazines and the New York Public Library (Robertson “Recent Client List” online). She has achieved a measure of public recognition: her loobylu Weblog has won awards and been favourably commented upon in the Australian press (see Robertson “Press for loobylu” online). In 2005, an article in The Age placed Robertson in the context of a contemporary “craft revolution”, reporting her view that this “revolution” is in “reaction to mass consumerism” (Atkinson online). The hand-made craft objects featured in Robertson’s Weblogs certainly do suggest engagement with labour-intensive pursuits and the construction of unique objects that reject processes of mass production and consumption. In this context, loobylu is a vehicle for the display and promotion of Robertson’s work as an illustrator and as a craft practitioner. While skills-based, it also, however, promotes a family-centred lifestyle; it advocates the construction by hand of objects designed to enhance the appearance of the family home and the comfort of its inhabitants. Its specific subject matter extends to related aspects of home and family as, in addition to instructions, ideas and patterns for craft, the Weblog features information on commercially available products for home and family, recipes, child rearing advice and links to 27 other craft and other sites (including Nigella Lawson’s, discussed below). The primary member of its target community is clearly the traditional homemaker – the mother – as well as those who may aspire to this role. Robertson does not have the “celebrity” status of Lawson and Jamie Oliver (discussed below), nor has she achieved their market saturation. Indeed, Robertson’s online presence suggests a modest level of engagement that is placed firmly behind other commitments: in February 2007, she announced an indefinite suspension of her blog postings so that she could spend more time with her family (Robertson loobylu 17 February 2007). Yet, like Lawson and Oliver, Robertson has exploited forms of domestic competence traditionally associated with women and the home, and the non-traditional medium of the Internet has been central to her endeavours. The content of the loobylu blog is, unsurprisingly, embedded in, or an accessory to, a unifying running commentary on Robertson’s domestic life as a parent. Miles, who has described Weblogs as “distributed documentaries of the everyday” (66) sums this up neatly: “the weblogs’ governing discursive quality is the manner in which it is embodied within the life world of its author” (67). Landmark family events are narrated on loobylu and some attract deluges of responses: the 19 June 2006 posting announcing the birth of Robertson’s daughter Lily, for example, drew 478 responses; five days later, one describing the difficult circumstances of her birth drew 232 comments. All of these comments are pithy, with many being simple empathetic expressions or brief autobiographically based commentaries on these events. Robertson’s news of her temporary retirement from her blog elicited 176 comments that both supported her decision and also expressed a sense of loss. Frequent exclamation marks attest visually to the emotional intensity of the responses. By narrating aspects of major life events to which the target audience can relate, the postings represent a form of affective mass production and consumption: they are triggers for a collective outpouring of largely homogeneous emotional reaction (joy, in the case of Lily’s birth). As collections of texts, they can be read as auto/biographic records, arranged thematically, that operate at both the individual and the community levels. Readers of the family narratives and the affirming responses to them engage in a form of mass affirmation and consumerism of domestic experience that is easy, immediate, attractive and free of charge. These personal discourses blend fluidly with those of a commercial nature. Some three weeks after loobylu announced the birth of her daughter, Robertson shared on her Weblog news of her mastitis, Lily’s first smile and the family’s favourite television programs at the time, information that many of us would consider to be quite private details of family life. Three days later, she posted a photograph of a sleeping baby with a caption that skilfully (and negatively) links it to her daughter: “Firstly – I should mention that this is not a photo of Lily”. The accompanying text points out that it is a photo of a baby with the “Zaky Infant Sleeping Pillow” and provides a link to the online pregnancystore.com, from which it can be purchased. A quotation from the manufacturer describing the merits of the pillow follows. Robertson then makes a light-hearted comment on her experiences of baby-induced sleep-deprivation, and the possible consequences of possessing the pillow. Comments from readers also similarly alternate between the personal (sharing of experiences) to the commercial (comments on the product itself). One offshoot of loobylu suggests that the original community grew to an extent that it could support specialised groups within its boundaries. A Month of Softies began in November 2004, describing itself as “a group craft project which takes place every month” and an activity that “might give you a sense of community and kinship with other similar minded crafty types across the Internet and around the world” (Robertson A Month of Softies online). Robertson gave each month a particular theme, and readers were invited to upload a photograph of a craft object they had made that fitted the theme, with a caption. These were then included in the site’s gallery, in the order in which they were received. Added to the majority of captions was also a link to the site (often a business) of the creator of the object; another linking of the personal and the commercial in the home-based “cottage industry” sense. From July 2005, A Month of Softies operated through a Flickr site. Participants continued to submit photos of their craft objects (with captions), but also had access to a group photograph pool and public discussion board. This extension simulates (albeit in an entirely visual way) the often home-based physical meetings of craft enthusiasts that in contemporary Australia take the form of knitting, quilting, weaving or other groups. Chatting with, and about, Celebrity Chefs The previous studies have shown how the Internet has broken down many barriers between what could be understood as the separate spheres of emotional (that is, home-based private) and commercial (public) life. The online environment similarly enables the formation and development of fan communities by facilitating communication between those fans and, sometimes, between fans and the objects of their admiration. The term “fan” is used here in the broadest sense, referring to “a person with enduring involvement with some subject or object, often a celebrity, a sport, TV show, etc.” (Thorne and Bruner 52) rather than focusing on the more obsessive and, indeed, more “fanatical” aspects of such involvement, behaviour which is, increasingly understood as a subculture of more variously constituted fandoms (Jenson 9-29). Our specific interest in fandom in relation to this discussion is how, while marketers and consumer behaviourists study online fan communities for clues on how to more successfully market consumer goods and services to these groups (see, for example, Kozinets, “I Want to Believe” 470-5; “Utopian Enterprise” 67-88; Algesheimer et al. 19-34), fans regularly subvert the efforts of those urging consumer consumption to utilise even the most profit-driven Websites for non-commercial home-based and personal activities. While it is obvious that celebrities use the media to promote themselves, a number of contemporary celebrity chefs employ the media to construct and market widely recognisable personas based on their own, often domestically based, life stories. As examples, Jamie Oliver and Nigella Lawson’s printed books and mass periodical articles, television series and other performances across a range of media continuously draw on, elaborate upon, and ultimately construct their own lives as the major theme of these works. In this, these – as many other – celebrity chefs draw upon this revelation of their private lives to lend authenticity to their cooking, to the point where their work (whether cookbook, television show, advertisement or live chat room session with their fans) could be described as “memoir-illustrated-with-recipes” (Brien and Williamson). This generic tendency influences these celebrities’ communities, to the point where a number of Websites devoted to marketing celebrity chefs as product brands also enable their fans to share their own life stories with large readerships. Oliver and Lawson’s official Websites confirm the privileging of autobiographical and biographical information, but vary in tone and approach. Each is, for instance, deliberately gendered (see Hollows’ articles for a rich exploration of gender, Oliver and Lawson). Oliver’s hip, boyish, friendly, almost frantic site includes the what are purported-to-be self-revelatory “Diary” and “About me” sections, a selection of captioned photographs of the chef, his family, friends, co-workers and sponsors, and his Weblog as well as footage streamed “live from Jamie’s phone”. This self-revelation – which includes significant details about Oliver’s childhood and his domestic life with his “lovely girls, Jools [wife Juliette Norton], Poppy and Daisy” – completely blurs the line between private life and the “Jamie Oliver” brand. While such revelation has been normalised in contemporary culture, this practice stands in great contrast to that of renowned chefs and food writers such as Elizabeth David, Julia Child, James Beard and Margaret Fulton, whose work across various media has largely concentrated on food, cooking and writing about cooking. The difference here is because Oliver’s (supposedly private) life is the brand, used to sell “Jamie Oliver restaurant owner and chef”, “Jamie Oliver cookbook author and TV star”, “Jamie Oliver advertising spokesperson for Sainsbury’s supermarket” (from which he earns an estimated £1.2 million annually) (Meller online) and “Jamie Oliver social activist” (made MBE in 2003 after his first Fifteen restaurant initiative, Oliver was named “Most inspiring political figure” in the 2006 Channel 4 Political Awards for his intervention into the provision of nutritious British school lunches) (see biographies by Hildred and Ewbank, and Smith). Lawson’s site has a more refined, feminine appearance and layout and is more mature in presentation and tone, featuring updates on her (private and public) “News” and forthcoming public appearances, a glamorous selection of photographs of herself from the past 20 years, and a series of print and audio interviews. Although Lawson’s children have featured in some of her television programs and her personal misfortunes are well known and regularly commented upon by both herself and journalists (her mother, sister and husband died of cancer) discussions of these tragedies, and other widely known aspects of her private life such as her second marriage to advertising mogul Charles Saatchi, is not as overt as on Oliver’s site, and the user must delve to find it. The use of Lawson’s personal memoir, as sales tool, is thus both present and controlled. This is in keeping with Lawson’s professional experience prior to becoming the “domestic goddess” (Lawson 2000) as an Oxford graduated journalist on the Spectator and deputy literary editor of the Sunday Times. Both Lawson’s and Oliver’s Websites offer readers various ways to interact with them “personally”. Visitors to Oliver’s site can ask him questions and can access a frequently asked question area, while Lawson holds (once monthly, now irregularly) a question and answer forum. In contrast to this information about, and access to, Oliver and Lawson’s lives, neither of their Websites includes many recipes or other food and cooking focussed information – although there is detailed information profiling their significant number of bestselling cookbooks (Oliver has published 8 cookbooks since 1998, Lawson 5 since 1999), DVDs and videos of their television series and one-off programs, and their name branded product lines of domestic kitchenware (Oliver and Lawson) and foodstuffs (Oliver). Instruction on how to purchase these items is also featured. Both these sites, like Robertson’s, provide various online discussion fora, allowing members to comment upon these chefs’ lives and work, and also to connect with each other through posted texts and images. Oliver’s discussion forum section notes “this is the place for you all to chat to each other, exchange recipe ideas and maybe even help each other out with any problems you might have in the kitchen area”. Lawson’s front page listing states: “You will also find a moderated discussion forum, called Your Page, where our registered members can swap ideas and interact with each other”. The community participants around these celebrity chefs can be, as is the case with loobylu, divided into two groups. The first is “foodie (in Robertson’s case, craft) fans” who appear to largely engage with these Websites to gain, and to share, food, cooking and craft-related information. Such fans on Oliver and Lawson’s discussion lists most frequently discuss these chefs’ television programs and books and the recipes presented therein. They test recipes at home and discuss the results achieved, any problems encountered and possible changes. They also post queries and share information about other recipes, ingredients, utensils, techniques, menus and a wide range of food and cookery-related matters. The second group consists of “celebrity fans” who are attracted to the chefs (as to Robertson as craft maker) as personalities. These fans seek and share biographical information about Oliver and Lawson, their activities and their families. These two areas of fan interest (food/cooking/craft and the personal) are not necessarily or always separated, and individuals can be active members of both types of fandoms. Less foodie-orientated users, however (like users of Dogtalk and loobylu), also frequently post their own auto/biographical narratives to these lists. These narratives, albeit often fragmented, may begin with recipes and cooking queries or issues, but veer off into personal stories that possess only minimal or no relationship to culinary matters. These members also return to the boards to discuss their own revealed life stories with others who have commented on these narratives. Although research into this aspect is in its early stages, it appears that the amount of public personal revelation either encouraged, or allowed, is in direct proportion to the “open” friendliness of these sites. More thus are located in Oliver’s and less in Lawson’s, and – as a kind of “control” in this case study, but not otherwise discussed – none in that of Australian chef Neil Perry, whose coolly sophisticated Website perfectly complements Perry’s professional persona as the epitome of the refined, sophisticated and, importantly in this case, unapproachable, high-end restaurant chef. Moreover, non-cuisine related postings are made despite clear directions to the contrary – Lawson’s site stating: “We ask that postings are restricted to topics relating to food, cooking, the kitchen and, of course, Nigella!” and Oliver making the plea, noted above, for participants to keep their discussions “in the kitchen area”. Of course, all such contemporary celebrity chefs are supported by teams of media specialists who selectively construct the lives that these celebrities share with the public and the postings about others’ lives that are allowed to remain on their discussion lists. The intersection of the findings reported above with the earlier case studies suggests, however, that even these most commercially-oriented sites can provide a fruitful data regarding their function as home-like spaces where domestic practices and processes can be refined, and emotional relationships formed and fostered. In Summary As convergence results in what Turow and Kavanaugh call “the wired homestead”, our case studies show that physically home-based domestic interests and practices – what could be called “home truths” – are also contributing to a refiguration of the private/public interplay of domestic activities through online dialogue. In the case of Dogtalk, domestic space is reconstituted through virtual spaces to include new definitions of family and memory. In the case of loobylu, the virtual interaction facilitates a development of craft-based domestic practices within the physical space of the home, thus transforming domestic routines. Jamie Oliver’s and Nigella Lawson’s sites facilitate development of both skills and gendered identities by means of a bi-directional nexus between domestic practices, sites of home labour/identity production and public media spaces. As participants modify and redefine these online communities to best suit their own needs and desires, even if this is contrary to the stated purposes for which the community was instituted, online communities can be seen to be domesticated, but, equally, these modifications demonstrate that the activities and relationships that have traditionally defined the home are not limited to the physical space of the house. While virtual communities are “passage points for collections of common beliefs and practices that united people who were physically separated” (Stone qtd in Jones 19), these interactions can lead to shared beliefs, for example, through advice about pet-keeping, craft and cooking, that can significantly modify practices and routines in the physical home. Acknowledgments An earlier version of this paper was presented at the Association of Internet Researchers’ International Conference, Brisbane, 27-30 September 2006. The authors would like to thank the referees of this article for their comments and input. Any errors are, of course, our own. References Algesheimer, R., U. Dholake, and A. Herrmann. “The Social Influence of Brand Community: Evidence from European Car Clubs”. Journal of Marketing 69 (2005): 19-34. Atkinson, Frances. “A New World of Craft”. The Age (11 July 2005). 28 May 2007 http://www.theage.com.au/articles/2005/07/10/1120934123262.html>. Brien, Donna Lee, and Rosemary Williamson. “‘Angels of the Home’ in Cyberspace: New Technologies and Biographies of Domestic Production”. Paper. Biography and New Technologies conference. Humanities Research Centre, Australian National University, Canberra, ACT. 12-14 Sep. 2006. Crewe, Jonathan. “Recalling Adamastor: Literature as Cultural Memory in ‘White’ South Africa”. In Acts of Memory: Cultural Recall in the Present, eds. Mieke Bal, Jonathan Crewe, and Leo Spitzer. Hanover, NH: Dartmouth College, 1999. 75-86. Felman, Shoshana, and Dori Laub. Testimony: Crises of Witnessing in Literature, Psychoanalysis, and History. New York: Routledge, 1992. Garber, Marjorie. Dog Love. New York: Touchstone/Simon and Schuster, 1996. Gorman-Murray, Andrew. “Homeboys: Uses of Home by Gay Australian Men”. Social and Cultural Geography 7.1 (2006): 53-69. Halbwachs, Maurice. On Collective Memory. Trans. Lewis A. Closer. Chicago: U of Chicago P, 1992. Hildred, Stafford, and Tim Ewbank. Jamie Oliver: The Biography. London: Blake, 2001. Hollows, Joanne. “Feeling like a Domestic Goddess: Post-Feminism and Cooking.” European Journal of Cultural Studies 6.2 (2003): 179-202. ———. “Oliver’s Twist: Leisure, Labour and Domestic Masculinity in The Naked Chef.” International Journal of Cultural Studies 6.2 (2003): 229-248. Jenson, J. “Fandom as Pathology: The Consequences of Characterization”. The Adoring Audience; Fan Culture and Popular Media. Ed. L. A. Lewis. New York, NY: Routledge, 1992. 9-29. Jones, Steven G., ed. Cybersociety, Computer-Mediated Communication and Community. Thousand Oaks, CA: Sage, 1995. Kozinets, R.V. “‘I Want to Believe’: A Netnography of the X’Philes’ Subculture of Consumption”. Advances in Consumer Research 34 (1997): 470-5. ———. “Utopian Enterprise: Articulating the Meanings of Star Trek’s Culture of Consumption.” Journal of Consumer Research 28 (2001): 67-88. Lawson, Nigella. How to Be a Domestic Goddess: Baking and the Art of Comfort Cooking. London: Chatto and Windus, 2000. Meller, Henry. “Jamie’s Tips Spark Asparagus Shortages”. Daily Mail (17 June 2005). 21 Aug. 2007 http://www.dailymail.co.uk/pages/live/articles/health/dietfitness.html? in_article_id=352584&in_page_id=1798>. Miles, Adrian. “Weblogs: Distributed Documentaries of the Everyday.” Metro 143: 66-70. Moss, Pamela. “Negotiating Space in Home Environments: Older Women Living with Arthritis.” Social Science and Medicine 45.1 (1997): 23-33. Robertson, Claire. Claire Robertson Illustration. 2000-2004. 28 May 2007 . Robertson, Claire. loobylu. 16 Feb. 2007. 28 May 2007 http://www.loobylu.com>. Robertson, Claire. “Press for loobylu.” Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/press.html>. Robertson, Claire. A Month of Softies. 28 May 2007. 21 Aug. 2007 . Robertson, Claire. “Recent Client List”. Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/clients.html>. Rose, Gillian. “Family Photographs and Domestic Spacings: A Case Study.” Transactions of the Institute of British Geographers NS 28.1 (2003): 5-18. Smith, Gilly. Jamie Oliver: Turning Up the Heat. Sydney: Macmillian, 2006. Thorne, Scott, and Gordon C. Bruner. “An Exploratory Investigation of the Characteristics of Consumer Fanaticism.” Qualitative Market Research: An International Journal 9.1 (2006): 51-72. Turow, Joseph, and Andrea Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, MA: MIT Press, 2003. Citation reference for this article MLA Style Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/10-brien.php>. APA Style Brien, D., L. Rutherford, and R. Williamson. (Aug. 2007) "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/10-brien.php>.
APA, Harvard, Vancouver, ISO, and other styles
10

Hackett, Lisa J. "Addressing Rage: The Fast Fashion Revolt." M/C Journal 22, no. 1 (March 13, 2019). http://dx.doi.org/10.5204/mcj.1496.

Full text
Abstract:
Wearing clothing from the past is all the rage now. Different styles and aesthetics of vintage and historical clothing, original or appropriated, are popular with fashion wearers and home sewers. Social media is rich with images of anachronistic clothing and the major pattern companies have a large range of historical sewing patterns available. Butterick McCall, for example, have a Making History range of patterns for sewers of clothing from a range of historical periods up to the 1950s. The 1950s styled fashion is particularly popular with pattern producers. Yet little research exists that explains why anachronistic clothing is all the rage. Drawing on 28 interviews conducted by the author with women who wear/make 1950s styles clothing and a survey of 229 people who wear/make historical clothing, this article outlines four key reasons that help explain the popularity of wearing/making anachronistic clothing: It argues that there exists rage against four ‘fast fashion’ practices: environmental disregard, labour breaches, poor quality, and poor fit. Ethical consumption practices such as home sewing quality clothes that fit, seeks to ameliorate this rage. That much of what is being made is anachronistic speaks to past sewing techniques that were ethical and produced quality fitting garments rather than fashion today that doesn’t fit, is of poor quality, and it unethical in its production. Fig. 1: Craftivist Collective Rage: Protesting Fast FashionRage against Fast Fashion Rage against fast fashion is not new. Controversies over Disney and Nike’s use of child labour in the 1990s, the anti-fur campaigns of the 1980s, the widespread condemnation of factory conditions in Bangladesh in the wake of the 2016 Rana Plaza collapse and Tess Holiday’s Eff Your Beauty Standards campaign, are evidence of this. Fast fashion is “cheap, trendy clothing, that samples ideas from the catwalk or celebrity culture and turns them into garments … at breakneck speed” (Rauturier). It is produced cheaply in short turnarounds, manufactured offshore by slave labour, with the industry hiding these exploitative practices behind, and in, complex supply chains. The clothing is made from poor quality material, meaning it doesn’t last, and the material is not environmentally sustainable. Because of this fast fashion is generally not recycled and ends up as waste in landfills. This for Rauturier is what fast fashion is: “cheap, low quality materials, where clothes degrade after just a few wears and get thrown away”. The fast fashion industry engages in two discrete forms of obsolescence; planned and perceived. Planned obsolescence is where clothes are designed to have a short life-span, thus coercing the consumer into buying a replacement item sooner than intended. Claims that clothes now last only a few washes before falling apart are common in the media (Dunbar). This is due to conscious manufacturing techniques that reduce the lifespan of the clothes including using mixed fibres, poor-quality interfacing, and using polyester threads, to name a few. Perceived obsolescence is where the consumer believes an otherwise functioning item of clothing to no longer to be valued. This is borne out in the idea that an item is deemed to be “in vogue” or “in fashion” and its value to the consumer is thus embedded in that quality. Once it falls out of fashion is deemed worthless. Laver’s “fashion cycle” elucidated this idea over eighty years ago. Since the 1980s the fashion industry has sped up, moving from the traditional twice annual fashion seasons to the fast fashion system of constantly manufacturing new styles, sometimes weekly. The technologies that have allowed the rapid manufacturing of fast fashion mean that the clothes are cheaper and more readily available. The average price of clothing has dropped accordingly. An item that cost US$100 in 1993 only cost US$59.10 in 2013, a drop of 41 per cent (Perry, Chart). The average person in 2014 bought 60 per cent more clothing that they did in 2000. Fast fashion is generally unsaleable in the second-hand market, due to its volume and poor design and manufacture. Green notes that many charity clothing stores bin a large percentage of the fast fashion items they receive. Environmental Rage Consumers are increasingly expressing rage about the environmental impact of fast fashion. The production of different textiles places different stresses on the environment. Cotton, for example, accounts for one third of the fibres found in all textiles, yet it requires high levels of water. A single cotton shirt needs 2,700 litres of water alone, the equivalent to “what one person drinks in two-and-a-half years” (Drew & Yehounme). Synthetics don’t represent an environmentally friendly alternative. While they may need less water, they are more carbon-intensive and polyester has twice the carbon footprint of cotton (Drew & Yehounme). Criticisms of fast fashion also include “water pollution, the use of toxic chemicals and increasing levels of textile waste”. Textile dyeing is the “second largest polluter of clean water globally.” The inclusion of chemical in the manufacturing of textiles is “disruptive to hormones and carcinogenic” (Perry, Cost). Naomi Klein’s exposure of the past problems of fast fashion, and revelations such as these, inform why consumers are enraged by the fast fashion system. The State of Fashion 2019 Report found many of the issues Klein interrogated remain of concern to consumers. Consumers continue to feel enraged at the industry’s disregard for the environment (Shaw et al.) any many are seeking alternative sources of sustainable fashion. For some consumers, the ethical dilemmas are overcome by purchasing second-hand or recycled clothing, or participate in Clothing Exchanges. Another alternative to ameliorating the rage is to stop buying new clothes and to make and wear their own clothes. A recent article in The Guardian, “’Don’t Feed the Monster!’ The People Who Have Stopped Buying New Clothes” highlights the “growing movement” of people seeking to make a “personal change” in response to the ethical dilemmas fast fashion poses to the environment. While political groups like Fashion of Tomorrow argue for collective legislative changes to ensure environmental sustainability in the industry, consumers are also finding their own individual ways of ameliorating their rage against fast fashion. Over recent decades Australians have consistently shown concern over environmental issues. A 2016 national survey found that 63 per cent of Australians considered themselves to be environmentalists and this is echoed in the ABC’s War on Waste programme which examined attitudes to and effects of clothing waste in Australia. In my interviews with women wearing 1950s style clothing, almost 65 per cent indicated a distinct dissatisfaction with mainstream fashion and frustration particularly with pernicious ‘fast fashion’. One participant offered, “seeing the War on Waste and all the fast fashion … I really like if I can get it second hand … you know I feel like I am helping a little bit” [Gabrielle]. Traid, a network of UK charity clothes shops diverts 3 000 tonnes of clothes from landfill to the second-hand market annually, reported for 2017-18 a 30 per cent increase in its second-hand clothes sales (Coccoza). The Internet has helped expand the second-hand clothing market. Two participants offered these insights: “I am completely addicted to the Review Buy Swap and Sell Page” [Anna] and “Instagram is huge for girls like us to communicate and get ideas” [Ashleigh]. Slave Rage The history of fashion is replete with examples of exploitation of workers. From the seamstresses of France in the eighteenth century who had to turn to prostitution to supplement their meagre wages (Jones 16) to the twenty-first century sweatshop workers earning less than a living wage in developing nations, poor work conditions have plagued the industry. For Karl Marx fashion represented a contradiction within capitalism where labour was exploited to create a mass-produced item. He lambasted the fashion industry and its “murderous caprices”, and despite his dream that the invention of the sewing machine would alleviate the stress placed on garment workers, technology has only served to intensify its demands on its poor workers (Sullivan 36-37). The 2013 Rena Plaza factory disaster shows just how far some sections of the industry are willing to go in their race to the bottom.In the absence of enforceable, global fair-trade initiatives, it is hard for consumers to purchase goods that reflect their ethos (Shaw et al. 428). While there is much more focus on better labour practices in the fashion industry, as the Baptist World Aid Australia’s annual Ethical Fashion Report shows, consumers are still critical of the industry and its labour practices.A significant number of participants in my research indicated that they actively sought to purchase products that were produced free from worker exploitation. For some participants, the purchasing of second-hand clothing allowed them to circumnavigate the fast fashion system. For others, mid-century reproduction fashion was sourced from markets with strong labour laws and “ethically made” without the use of sweat shop labour” [Emma]. Alternatively, another participant rejected buying new vintage fashion and instead purchased originally made fashion, in this case clothing made 50 to 60 years ago. This was one was of ensuring “some poor … person has [not] had to work really hard for very little money … [while the] shop is gaining all the profits” [Melissa]. Quality Rage Planned obsolescence in fashion has existed at least since the 1940s when Dupont ensured their nylon stockings were thin enough to ladder to ensure repeat custom (Meynen). Since then manufacturers have deliberately used poor techniques and poor material – blended fabrics, unfinished seams, unfixed dyes, for example – to ensure that clothes fail quickly. A 2015 UK Barnardo’s survey found clothes were worn an average of just seven times, which is not surprising given that clothes can last as little as two washes before being worn out (Dunbar). Extreme planned obsolescence in concert with perceived obsolescence can lead to clothes being discarded before their short lifespan had expired. The War on Waste interviewed young women who wore clothes sometimes only once before discarding them.Not all women are concerned with keeping up to date with fashion, instead wanting to create their own identify though clothes and are therefore looking for durability in their clothes. Many of the women interviewed for this research were aware of the declining quality of clothes, often referring to those made before the fast fashion era as evidence of quality clothing. For many in this study, manufacturing of classically styled clothing was of higher concern than mimicking the latest fashion trend. Some indicated their “disgust” at the poor quality of fast fashion [Gabrielle]. Others has specific outrage at the cost of poorly made fast fashion: “I don’t like spending a lot of money on clothing that I know may not necessarily be well made” [Skye] and “I got sick of dresses just being see through … you know, seeing my bras under things” [Becky]. For another: “I don’t like the whole mass-produced thing. I don’t think that they are particularly well made … Sometimes they are made with a tiny waist but big boobs, there’s no seams on them, they’re just overlocked together …” [Vicky]. For other participants in this research fast fashion produced items were considered inferior to original items. One put it is this way: “[On using vintage wares] If something broke, you fixed it. You didn’t throw it away and go down to [the shop] and buy a new one ... You look at stuff from these days … you could buy a handbag today and you are like “is this going to be here in two years? Or is it going to fall apart in my hands?” … there’s that strength and durability that I do like” [Ashleigh]. For another, “vintage reproduction stuff is so well made, it’s not like fast fashion, like Vivien of Holloway and Pin Up Girl Clothing, their pieces last forever, they don’t fall apart after five washes like fast fashion” [Emma]. The following encapsulates the rage felt in response to fast fashion. I think a lot of people are wearing true vintage clothing more often as a kind of backlash to the whole fast fashion scene … you could walk into any shop and you could see a lot of clothing that is very, very cheap, but it’s also very cheaply made. You are going to wear it and it’s going to fall apart in six months and that is not something that I want to invest in. [Melissa]Fit RageFit is a multi-faceted issue that affects consumers in several ways: body size; body shape; and height. Body size refers to the actual physical size of the body, whether one is underweight, slim, average, muscular or fat. Fast fashion body size labelling reflects what the industry considers to be of ‘normal sizes’, ranging from a size 8 through to a size 16 (Hackett & Rall). Body shape is a separate, if not entirely discrete issue. Women differ widely in the ratios between their hips, bust and waist. Body shape distribution varies widely within populations, for example, the ‘Size USA’ study identified 11 different female body shapes with wide variations between populations (Lee et al.). Even this doesn’t consider bodies with physical disabilities. Clothing is designed to fit women of ‘average’ height, thus bodies that are taller or shorter are often excluded from fast fashion (Valtonen). Even though Australian sizing practices are based on erroneous historical data (Hackett and Rall; Kennedy), the fast fashion system continues to manufacture for average body shapes and average body heights, to the exclusion of others. Discrimination through clothing sizes represents one way in which social norms are reinforced. Garments for larger women are generally regarded as less fashionable (Peters 48). Enraged consumers label some of the offerings ‘fat sacks’, ‘tents’ and ‘camouflage wear’ (Colls 591-592). Further, plus size is often more expensive and having been ‘sized up’ from smaller sizes, the result is poor fit. Larger body’s therefore have less autonomy in fashioning their identity (Peters 45). Size restrictions can lead to consumers having to choose between going without a desired item or wearing a size too small for them as no larger alternative is available (Laitala et al. 33-34).The ideology behind the thin aesthetic is that it is framed as aspirational (Barry) and thus consumers are motivated to purchase clothes based upon a desire to fit in with this beauty ideal. This is a false dichotomy (Halliwell and Dittmar 105; Bian and Wang). For participants in this research rage at fashion fashions persistance in producing for ‘average’ sized women was clearly evident. For a plus-size participant: “I don’t suit modern stuff. I’m a bigger girl and that’s not what style is these days. And so, I find it just doesn’t work for me” [Ashleigh]. For non-plus participants, sizing rage was also evident: I’m just like a praying mantis, a long string bean. I’m slim, tall … I do have the body shape … that fast fashion catered for, and I can still dress in fast fashion, but I think the idea that so many women feel excluded by that kind of fashion, I just want to distance myself from it. So, so many women have struggles in the change rooms in shopping centres because things don’t fit them nicely. [Emma] For this participant reproduction fashion wasn’t vanity sized. That is, a dress from the 1950s had the body measurements on the label rather than a number reflecting an arbitrary and erroneous sizing system. Some noted their disregard for standardised sizing systems used exclusively for fast fashion: “I have very non-standard measurements … I don’t buy dresses for that reason … My bust and my waist and my hips don’t fit a standard. You know I can’t go “ooh that’s a 12, that’s an 18”. You know, I don’t believe in standard sizing basically” [Skye]. Variations of sizing by brands adds to the frustration of fashion consumers: “if someone says 'I’m a size 16' that means absolutely nothing. If you go between brands … [shop A] XXL to a [shop B] to a [shop C] XXL to a [shop D] XXL, you know … they’re not the same. They won’t fit the same, they don’t have the same fit” [Skye]. These women recognise that their body shape, size and/or height is not catered for by fast fashion. This frees them to look for alternatives beyond the product offerings of the mainstream fashion industry. Although the rage against aspects of fast fashion discussed here – environmental, labour, quality and fit – is not seeing people in the streets protesting, people are actively choosing to find alternatives to the problem of sourcing clothes that fit their ethos. ReferencesABC Television. "Coffee Cups and Fast Fashion." War on Waste. 30 May 2017. Barnardo's. "Once Worn, Thrice Shy – British Women’s Wardrobe Habits Exposed!" 11 June 2015. 1 Mar. 2019 <http://www.barnardos.org.uk/news/press_releases.htm?ref=105244http://www.barnardos.org.uk/news/press_releases.htm?ref=105244>.Barry, Ben. "Selling Whose Dream? A Taxonomy of Aspiration in Fashion Imagery." Fashion, Style & Popular Culture 1.2 (2014): 175-92.Cocozza, Paula. “‘Don’t Feed The Monster!’ The People Who Have Stopped Buying New Clothes”. The Guardian 19 Feb. 2019. 20 Feb. 2019 <http://www.theguardian.com/fashion/2019/feb/19/dont-feed-monster-the-people-who-have-stopped-buying-new-clothes#comment-126048716>.Colls, Rachel. "‘Looking Alright, Feeling Alright’: Emotions, Sizing and the Geographies of Women's Experiences of Clothing Consumption." Social & Cultural Geography 5.4 (2004): 583-96.Drew, Deborah, and Genevieve Yehounme. "The Apparel Industry’s Environmental Impact in 6 Graphics." World Resources Institute July 2005. 24 Feb. 2018 <http://www.wri.org/blog/2017/07/apparel-industrys-environmental-impact-6-graphics>.Dunbar, Polly. "How Your Clothes Are Designed to Fall Apart: From Dodgy Stitching to Cheap Fabrics, Today's Fashions Are Made Not to Last – So You Have to Buy More." Daily Mail 18 Aug. 2016. 25 Feb. 2018 <http://www.dailymail.co.uk/femail/article-3746186/Are-clothes-fall-apart-dodgy-stitching-cheap-fabrics-today-s-fashions-designed-not-buy-more.htmlhttp://www.dailymail.co.uk/femail/article-3746186/Are-clothes-fall-apart-dodgy-stitching-cheap-fabrics-today-s-fashions-designed-not-buy-more.html>.Hackett, Lisa J., and Denise N. Rall. "The Size of the Problem with the Problem of Sizing: How Clothing Measurement Systems Have Misrepresented Women’s Bodies from the 1920s – Today." Clothing Cultures 5.2 (2018): 263-83.Kennedy, Kate. "What Size Am I? Decoding Women's Clothing Standards." Fashion Theory 13.4 (2009): 511-30.Klein, Naomi. No Logo, No Space, No Choice, No Jobs: Taking Aim at the Brand Bullies. London: Flamingo, 2000.Laitala, Kirsi, Ingun Grimstad Klepp, and Benedict Hauge. "Materialised Ideals Sizes and Beauty." Culture Unbound: Journal of Current Cultural Research 3 (2011): 19-41.Laver, James. Taste and Fashion. London: George G. Harrap, 1937.Lee, Jeong Yim, Cynthia L. Istook, Yun Ja Nam, Sun Mi Pak. "Comparison of Body Shape between USA and Korean Women." International Journal of Clothing Science and Technology 19.5 (2007): 374-91.Perry, Mark J. "Chart of the Day: The CPI for Clothing Has Fallen by 3.3% over the Last 20 Years, while Overall Prices Increased by 63.5%." AEIdeas 12 Oct. 2013. 4 Jan. 2019 <http://www.aei.org/publication/chart-of-the-day-the-cpi-for-clothing-has-fallen-by-3-3-over-the-last-20-years-while-overall-prices-increased-by-63-5/http://www.aei.org/publication/chart-of-the-day-the-cpi-for-clothing-has-fallen-by-3-3-over-the-last-20-years-while-overall-prices-increased-by-63-5/>. Perry, Patsy. “The Environmental Cost of Fast Fashion.” Independent 8 Jan. 2018. 1 Mar. 2019 <https://www.independent.co.uk/life-style/fashion/environment-costs-fast-fashion-pollution-waste-sustainability-a8139386.html>.Peters, Lauren Downing. "You Are What You Wear: How Plus-Size Fashion Figures in Fat Identity Formation." Fashion Theory 18.1 (2014): 45-71.Rauturier, Solene. “What Is Fast Fashion?” 1 Aug. 2010. 1 Mar. 2019 <https://goodonyou.eco/what-is-fast-fashion/>.Shaw, Deirdre, Gillian Hogg, Edward Shui, and Elaine Wilson. "Fashion Victim: The Impact of Fair Trade Concerns on Clothing Choice." Journal of Strategic Marketing 14.4 (2006): 427-40.Sullivan, Anthony. "Karl Marx: Fashion and Capitalism." Thinking through Fashion. Eds. Agnès Rocamora and Anneke Smelik. London: I.B. Tauris, 2016. 28-45. Valtonen, Anu. "Height Matters: Practicing Consumer Agency, Gender, and Body Politics." Consumption Markets & Culture 16.2 (2013): 196-221.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Physical distribution of goods Australia Data processing"

1

容勁 and King Stanley Yung. "Application of multi-agent technology to supply chain management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31223886.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Physical distribution of goods Australia Data processing"

1

L, Lewis Robert, Unicom Seminars Ltd, Institute of Data Processing Management., and British Computer Society, eds. Information technology in physical distribution management. Aldershot, Hants, England: Technical Press in association with Unicom Seminars Ltd., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Taylor, Keith. Computer systems in logistics and distribution: A guide to implementation and applications. London: Kogan Page, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Savelsbergh, Mathieu Willem Paul. Computer aided routing. Amsterdam: Centrum voor Wiskunde en Informatica, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The practical handbook of computerization for distribution managers. Washington: Traffic Service Corp., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

(Firm), Ai Bī Ti. Chōsa hōkokusho, Heisei 20-nendo ryūtsū butsuryū kōritsuka shisutemu kaihatsu chōsa: Chūgoku Kan Bokkaiwan Tōhokubu o chūshin to shita hokutō Ajia Yūrashia butsuryū kōritsuka ni kansuru chōsa. [Tokyo]: Ai Bī Ti, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roche, David J. The impact of information technology on outbound logistics for medium value consumer goods. Dublin: University College Dublin, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Outsourcing in der Distributionslogistik: Entwicklung eines methodischen, problemorientierten Ansatzes zur optimalen Entscheidungsfindung. Frankfurt am Main: P. Lang, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hanʾguk kiŏp kwa e-logistics. Kyŏnggi-do Pʻaju-si: Hanʾguk Haksul Chŏngbo, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1974-, Mutsaddi Ashutosh, ed. Configuring SAP ERP sales and distribution. Hoboken, N.J: Wiley Technology Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Infopartnering: The ultimate strategy for achieving efficient consumer response. Essex Junction, VT: OMNEO, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography