Journal articles on the topic 'Pseudo-contact shift'

To see the other types of publications on this topic, follow the link: Pseudo-contact shift.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 journal articles for your research on the topic 'Pseudo-contact shift.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chaudhary, Nabin Kumar, Jamal Giri, and Prabhat Ranjan Pokharel. "Orthodontic Management of Pseudo Class III Malocclusion: A Case Report." Journal of BP Koirala Institute of Health Sciences 5, no. 1 (November 3, 2022): 48–52. http://dx.doi.org/10.3126/jbpkihs.v5i1.44256.

Full text
Abstract:
Pseudo class III malocclusion is due to immature contact of incisors resulting in a forward shift of mandible. A 13-year-old male patient presented with the complaint of inability to bite properly with pseudo skeletal class III malocclusion, functional shift, and reverse overjet which was treated with fixed orthodontic treatment. The total treatment duration was 21 months in which correction of the discrepancy between centric occlusion and centric relation and improvement of the smile of the patient was achieved. Early and timely diagnosis of pseudo class III malocclusion will lead to a successful outcome with fixed orthodontic therapy.
APA, Harvard, Vancouver, ISO, and other styles
2

Saitoh, T., H. Hori, E. Harada, Y. Tachibana, and H. Akutu. "Magnetical analysis by pseudo contact shifts in fully oxidized cytochrome c_3." Seibutsu Butsuri 40, supplement (2000): S48. http://dx.doi.org/10.2142/biophys.40.s48_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saitoh, T., h. Hori, E. Harada, Y. Tachibana, T. Ohmura, and H. Akutsu. "2R1400 Structure refinement of fully oxidised cytochrome c_3 using of pseudo contact shift." Seibutsu Butsuri 42, supplement2 (2002): S148. http://dx.doi.org/10.2142/biophys.42.s148_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Babailov, Sergey P., Eugeny N. Zapolotsky, Eduard S. Fomin, Marina A. Polovkova, Gayane A. Kirakosyan, Alexander G. Martynov, and Yulia G. Gorbunova. "Structure Determination of Binuclear Triple-Decker Phthalocyaninato Complexes by NMR via Paramagnetic Shifts Analysis Using Symmetry Peculiarities." Molecules 27, no. 22 (November 14, 2022): 7836. http://dx.doi.org/10.3390/molecules27227836.

Full text
Abstract:
The detailed knowledge about the structure of multinuclear paramagnetic lanthanide complexes for the targeted design of these compounds with special magnetic, sensory, optical and electronic properties is a very important task. At the same time, establishing the structure of such multinuclear paramagnetic lanthanide complexes in solution, using NMR is a difficult task, since several paramagnetic centers act simultaneously on the resulting chemical shift of a particular nucleus. In this paper, we have demonstrated the possibility of molecular structure determination in solution on the example of binuclear triple-decker lanthanide(III) complexes with tetra-15-crown-5-phthalocyanine Ln2[(15C5)4Pc]3 {where Ln = Tb (1) and Dy (2)} by quantitative analysis of the pseudo-contact lanthanide-induced shifts (LIS). The symmetry of complexes was used for the simplification of the calculation of pseudo-contact shifts on the base of the expression for the magnetic susceptibility tensor in the arbitrary oriented magnetic axis system. Good agreement between the calculated and experimental shifts in the 1H NMR spectra indicates the similarity of the structure for the complexes 1 and 2 in solution of CDCl3 and the structure in the crystalline phase, found from the data of the X-ray structural study of the similar complex Lu2[(15C5)4Pc]3. The described approach can be useful for LIS analysis of other polynuclear symmetric lanthanide complexes.
APA, Harvard, Vancouver, ISO, and other styles
5

Heraldy, Eddy, Novia Purnamawati, Yuniawan Hidayat, Khoirina Dwi Noegrahaningtyas, and Idul Fitri Nurcahyo. "Preparation of Biosorbent from Kapok Fruit Peel (Ceiba pentandra) for Adsorption of Lead Waste." Jurnal Kimia Sains dan Aplikasi 25, no. 9 (November 11, 2022): 329–37. http://dx.doi.org/10.14710/jksa.25.9.329-337.

Full text
Abstract:
The preparation of biosorbent from kapok fruit peel (KBK) for lead (Pb(II)) removal was conducted mechanically by expanding the surface of the biosorbent and activating KBK with the addition of 1 M HCl for 20 minutes. The effect of activation on increasing the number of active groups and the number of pores in the biosorbent was proven by Fourier Transform Infrared Spectroscopy (FTIR) and Scanning Electron Microscopy (SEM). The FTIR data showed a shift and an increase in wavenumber intensities of active adsorbent groups such as -OH and -C=O. The SEM data revealed that the morphology of the adsorbent increased in the number of pores that appeared rough and irregular. The Pb(II) adsorption treatment used a batch method at pH 2–5, contact time of 0–120 minutes, and adsorbate concentration of 10–50 ppm. The adsorption of Pb(II) ions reached optimum conditions at pH 4 and a contact time of 60 minutes, with an adsorption capacity of 6.9522 mg/g and an adsorption rate of 98.71%. Adsorption data showed that Pb(II) ions uptake to KBK biosorbent followed the Langmuir isotherm model equation and pseudo-second-order kinetic model. The adsorption capacity of activated KBK is greater than that of non-activated KBK.
APA, Harvard, Vancouver, ISO, and other styles
6

Kobashigawa, Yoshihiro, Tomohide Saio, Masahiro Ushio, Mitsuhiro Sekiguchi, Masashi Yokochi, Kenji Ogura, and Fuyuhiko Inagaki. "Convenient method for resolving degeneracies due to symmetry of the magnetic susceptibility tensor and its application to pseudo contact shift-based protein–protein complex structure determination." Journal of Biomolecular NMR 53, no. 1 (April 10, 2012): 53–63. http://dx.doi.org/10.1007/s10858-012-9623-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Riaz, Adeel, Amna Ashraf, Hymna Taimoor, Sofia Javed, Muhammad Aftab Akram, Mohammad Islam, Mohammad Mujahid, Iftikhar Ahmad, and Khalid Saeed. "Photocatalytic and Photostability Behavior of Ag- and/or Al-Doped ZnO Films in Methylene Blue and Rhodamine B Under UV-C Irradiation." Coatings 9, no. 3 (March 20, 2019): 202. http://dx.doi.org/10.3390/coatings9030202.

Full text
Abstract:
Silver (Ag) and/or aluminum (Al)-doped zinc oxide (ZnO:Ag, ZnO:Al) films with different concentrations were produced using sol-gel process and investigated for wettability and photocatalysis. Water contact angle (CA) measurements indicated the films to be hydrophilic with reduced solid/liquid interfacial surface energy upon metal doping. The films were highly transparent (>94%) with red or blue shift in the absorption edge depending on the dopant type (Ag or Al) owing to the Burstein–Moss effect. The ZnO:Ag and ZnO:Al films with 0.5 and 1.0 wt.% metal dopant showed high degradation efficiency in methylene blue (MB) solution under UV irradiation, mainly due to an increase in the photogenerated electron–hole pair recombination time and hydroxyl radicals (·OH) generation. The MB degradation followed pseudo-first-order reaction with maximum apparent reaction rate constant of 2.40 h−1 for the 0.5 wt.% ZnO:Al film. ZnO films with 1.0 wt.% dopant demonstrated excellent photostability and recyclability even after several runs presumably due to reduced Zn2+ dissolution as well as blocking of the active surface area. ZnO:(Ag + Al) film containing 0.5 wt.% Al and Ag showed excellent UV photodegradation of MB and rhodamine blue (RhB) with high levels of photostability over five cycles.
APA, Harvard, Vancouver, ISO, and other styles
8

Rahmalia, Winda, Jean-François Fabre, Thamrin Usman, and Zéphirin Mouloungui. "Adsorption Characteristics of Bixin on Acid- and Alkali-Treated Kaolinite in Aprotic Solvents." Bioinorganic Chemistry and Applications 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/3805654.

Full text
Abstract:
The adsorption of bixin in aprotic solvents onto acid- and alkali-treated kaolinite was investigated. Kaolinite was treated three times, for 6 h each, with 8 M HCl or 5 M KOH. The adsorbents were characterized by XRD, FT-IR, EDS, and BET-N2. The effects of contact time and dye concentration on adsorption capacity and kinetics, electronic transition of bixin before and after adsorption, and also mechanism of bixin-kaolinite adsorption were investigated. Dye adsorption followed pseudo-second order kinetics and was faster in acetone than in dimethyl carbonate. The best adsorption results were obtained for KOH-treated kaolinite. In both of the solvents, the adsorption isotherm followed the Langmuir model and adsorption capacity was higher in dimethyl carbonate (qm = 0.43 mg/g) than in acetone (0.29 mg/g). The adsorption capacity and kinetics of KOH-treated kaolinite (qm = 0.43 mg/g,k2 = 3.27 g/mg·min) were better than those of HCl-treated kaolinite (qm = 0.21 mg/g,k2 = 0.25 g/mg·min) and natural kaolinite (qm = 0.18 mg/g,k2 = 0.32 g/mg·min). There are shift in the band position of maximum intensity of bixin after adsorption on this adsorbent. Adsorption in this system seemed to be based essentially on chemisorption due to the electrostatic interaction of bixin with the strong basic and reducing sites of kaolinite.
APA, Harvard, Vancouver, ISO, and other styles
9

Naceur, Benhadria, Elaziouti Abdelkader, Laouedj Nadjia, and Sari Esmahene. "NZF Nanoscale Particles: Synthesis, Characterization and its Effective Adsorption of Bromophenol Blue." Bulletin of Chemical Reaction Engineering & Catalysis 15, no. 3 (September 11, 2020): 726–42. http://dx.doi.org/10.9767/bcrec.15.3.8558.726-742.

Full text
Abstract:
The ferrospinels NixZn1_xFe2O4 (x = 0.0 and 0.6) nanoparticles (NPs) were successfully prepared by a sol-gel method and analyzed by TGA/DTA, XRD, SEM-EDS, UV-Vis-DRS, and pHIEP. The adsorption potential of NZF NPs towards the Bromophenol blue (BPB) dye was investigated. The batch adsorption efficiency parameters were studied including contact time, pH, initial dye concentrations and catalyst dosage. Results indicated that NZF crystallized in single-phase and exhibited smaller crystallite size (49 nm vs. 59.24 nm) than that of the pristine (ZF). The SEM analysis showed that the materials are elongated-like shape. NZF catalyst showed a red-shift of absorption bands and a more narrowed band gap (2.30 eV vs. 1.65 eV) as compared to ZF. The adsorption process was found to be highly dependent to the pH of the solution, dye concentration and adsorbent dose. Under optimum conditions of 5 mg.L–1 BPB, 0.5 g.L–1 NZF catalyst, pH = 6, and 25 °C, up to ≈ 86.30% removal efficiency could be achieved after 60 min. Pseudo-second-order kinetic model gave the best fit with highest correlation coefficients (R2 ≥ 0.99). A high specific surface area, a stabilized dispersion state of NZF NPs and the electrostatic interaction between the BPB-2 anions and the NZF-H3O+ active sites on NZF surface were believed to be the main factors that can be responsible for the high adsorption efficiency. Copyright © 2020 BCREC Group. All rights reserved
APA, Harvard, Vancouver, ISO, and other styles
10

Sanusi, Kabir A., Yakubu Yahaya, Murtala M. Ambrusa, Yakubu Yahaya, and Abdulazeez M. Hammed. "OPTIMIZATION OF ADSORPTION OF Pb (II) AND Cr (VI) FROM AQUEOUS SOLUTION USING MODIFIED FELDSPAR COMPOSITE: ISOTHERM AND KINETIC STUDIES." International Journal of Engineering Science Technologies 5, no. 4 (July 14, 2021): 18–53. http://dx.doi.org/10.29121/ijoest.v5.i4.2021.200.

Full text
Abstract:
In this study modified feldspar composite (MFC) adsorbent based on feldspar and Theobroma cacao podas (TCP) was prepared, characterized and utilized for adsorption of Pb (II) and Cr (VI) in aqueous solution. The results showed that the cation exchange capacity of the modified feldspar composite (30.66 ± 0.21 meq/100 g) was 5 times higher than that of raw feldspar (6.42 ± 0.45 meq/100g). More so, the novel biohybrid material, MFC has a surface area of 53.60 ± 0.3 m2/g and particle size of 105.4 ± 0.18. X-ray diffraction peaks revealed that after the modification process, there is only slight shift in the position of some diffraction peaks of feldspar and the composite material suggestive of the retention of the crystalline properties of the feldspar in the novel composite (MFC). Infrared spectroscopy (FTIR) spectra showed that some functional groups present in the two starting materials were also available on the surface of the composite (MFC) indicating that the intercalation of TCP biomass into feldspar surface was successful. Response surface methodology (RSM) via a five-levels central composite design (CCD) was applied for optimization of metal adsorption onto the adsorbent in 32 experiment runs considering the effect of pH, adsorbent dose, adsorbate concentration and contact time. Optimization results showed that the predicted and experimental values of Pb (14.021, 14.148 mg/g) and Cr (3.428, 3.504 mg/g) were close at the optimum condition of (pH 2, 5, 6; 0.5 g; 100 mg/L; 60-120 min and 3000K). Results of ANOVA analysis revealed the adequacy of the model with the good correlation between R2 values (0.9916-0.9998) and adjusted R2 (0.9919-0.9986) and F value of (≥ 147). Results showed that Pb (II) ions adsorption onto the adsorbents was well fitted to the Langmuir isotherm model while the Cr (VI) ions uptake onto FS and MFC adsorbents followed Freundlich isotherm model. The results of the kinetic studies showed that rate of Pb (II) removal followed pseudo second order model while the rate of adsorption of Cr (VI) onto the FS and MFC adsorbents best fitted pseudo first order model. Owing to its improved cation exchange capacity and eco-friendliness, the modified feldspar composite have a good potential application in wastewater treatment besides other industrial explorations.
APA, Harvard, Vancouver, ISO, and other styles
11

Srb, Pavel, Michal Svoboda, Ladislav Benda, Martin Lepšík, Ján Tarábek, Václav Šícha, Bohumír Grüner, et al. "Capturing a dynamically interacting inhibitor by paramagnetic NMR spectroscopy." Physical Chemistry Chemical Physics 21, no. 10 (2019): 5661–73. http://dx.doi.org/10.1039/c9cp00416e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Canales, Angeles, Alvaro Mallagaray, Javier Pérez-Castells, Irene Boos, Carlo Unverzagt, Sadine André, Hans-Joachim Gabius, Francisco Javier Cañada, and Jesús Jiménez-Barbero. "Breaking Pseudo-Symmetry in Multiantennary Complex N-Glycans Using Lanthanide-Binding Tags and NMR Pseudo-Contact Shifts." Angewandte Chemie 125, no. 51 (November 4, 2013): 14034–38. http://dx.doi.org/10.1002/ange.201307845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Canales, Angeles, Alvaro Mallagaray, Javier Pérez-Castells, Irene Boos, Carlo Unverzagt, Sadine André, Hans-Joachim Gabius, Francisco Javier Cañada, and Jesús Jiménez-Barbero. "Breaking Pseudo-Symmetry in Multiantennary Complex N-Glycans Using Lanthanide-Binding Tags and NMR Pseudo-Contact Shifts." Angewandte Chemie International Edition 52, no. 51 (November 4, 2013): 13789–93. http://dx.doi.org/10.1002/anie.201307845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Benda, Ladislav, Jiří Mareš, Enrico Ravera, Giacomo Parigi, Claudio Luchinat, Martin Kaupp, and Juha Vaara. "Pseudo-Contact NMR Shifts over the Paramagnetic Metalloprotein CoMMP-12 from First Principles." Angewandte Chemie International Edition 55, no. 47 (October 26, 2016): 14713–17. http://dx.doi.org/10.1002/anie.201608829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Benda, Ladislav, Jiří Mareš, Enrico Ravera, Giacomo Parigi, Claudio Luchinat, Martin Kaupp, and Juha Vaara. "Pseudo-Contact NMR Shifts over the Paramagnetic Metalloprotein CoMMP-12 from First Principles." Angewandte Chemie 128, no. 47 (October 26, 2016): 14933–37. http://dx.doi.org/10.1002/ange.201608829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ganguli, P. "Solute-Solvent Interactions and High Spin ⇌ Low Spin Transitions in Ferric Dithiocarbamates." Zeitschrift für Naturforschung A 40, no. 1 (January 1, 1985): 79–83. http://dx.doi.org/10.1515/zna-1985-0114.

Full text
Abstract:
The HS ⇌ LS transition in ferric dithiocarbamates in a number of solvents has been investigated using NMR and is interpreted in terms of preferential solvation or second co-ordination sphere reorganisation effects. These studies clearly demonstrate that neglect of pseudo contact shifts can lead to erroneous conclusions about the spin delocalisation mechanisms. The spin derealization in these systems is by direct σ-delocalization along the alkyl chain. The As values of 2T2 and 6A1 states have the same sign.
APA, Harvard, Vancouver, ISO, and other styles
17

Xia, Qin Xiang, Zhe Lin Li, Wei Qi Zong, and He Qing Xie. "Contour Extraction for Images of High Temperature Long Shaft Heavy Forgings." Advanced Materials Research 562-564 (August 2012): 1655–59. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1655.

Full text
Abstract:
Non-contact measuring method based on CCD camera is desirable for product quality of high temperature long-shaft heavy forgings. In the light of the characteristics of RGB primary color and halation in forging image, the mean red gray value in the high temperature area is proposed as the dynamic threshold to acquire external contours. Internal edges in the image of the hot forging are blurry and discontinuous. For these characteristics, a method based on quadratic B-spline curve is employed to extract and fit the internal contours. Experiments show that this method can effectively remove pseudo features and extract accurate internal and external contours for images of high temperature squaring and chamfering forgings of 900 0C to 1050 0C.
APA, Harvard, Vancouver, ISO, and other styles
18

Nguyen, Thi Thuong, Thi Ngoc Thu Nguyen, Long Giang Bach, Duy Trinh Nguyen, and Thi Phuong Quynh Bui. "Adsorptive removal of Pb (II) using exfoliated graphite adsorbent:influence of experimental conditions and magnetic CoFe2O4 decoration." IIUM Engineering Journal 20, no. 1 (June 1, 2019): 202–15. http://dx.doi.org/10.31436/iiumej.v20i1.965.

Full text
Abstract:
The worm-like exfoliated graphite (EG) based adsorbents prepared from low-cost natural graphite flakes via facile synthesis processes have been found to be efficient adsorbents when it comes to removing Pb (II) from aqueous solution. EG was fabricated by chemical intercalation and microwave assisted exfoliation. Furthermore, the magnetic exfoliated graphite (MEG) was developed by incorporating CoFe2O4 particles into the EG layers using the citric acid based sol-gel technique. Adsorption behaviour of Pb (II) on the as-prepared adsorbents was investigated by taking several experimental conditions into consideration such as contact time, initial concentration, adsorbent dosage, and pH value. The results with initial neutral pH indicated that the adsorption isotherms for Pb (II) on the EG and MEG were well consistent with the Langmuir isotherm model revealing the maximum adsorption capacity of 106 mg/g and 68 mg/g for EG and MEG, respectively. The adsorption kinetics of Pb (II) was found to adhere to the pseudo-second-order kinetic model. The chemical interaction between ? electrons on graphite sheets and Pb (II) ions was suggested to play an essential role in the adsorption mechanism. The introduction of magnetic CoFe2O4 to the EG was found to induce the shift of optimal pH value to a more basic condition. The characterization of the adsorbents was performed using relevant analysis techniques such as Scanning electron microscope (SEM), X–ray powder diffraction (XRD), vibrating-sample magnetometer (VSM), and Fourier-transform infrared (FTIR). The results of this work suggest a high possibility for application of the as-prepared modified graphite to remove hazardous substances in practical wastewater treatment systems. ABSTRAK: Penyerap Pengelupas Grafit (EG) yang berupa seperti cacing dihasilkan dari grafit semulajadi yang murah melalui proses sintesis serpihan, ia juga merupakan penyerap yang bagus dalam mengasingkan Pb (II) daripada larutan akues. EG direka dengan tindak balas interkalasi kimia dan pengelupasan melalui gelombang mikro. Tambahan, pengelupas grafit magnet (MEG) telah dihasilkan dengan memasukkan zarah CoFe2O4 ke dalam lapisan EG menggunakan teknik sol-gel yang berasaskan asid sitrik. Tindak balas penyerapan Pb (II) pada penyerap yang disiapkan ini, dikaji dengan mengambil kira beberapa keadaan eksperimen seperti waktu disentuh, konsentrasi awal, dos penyerap dan nilai pH. Hasil keputusan pH neutral awal menunjukkan bahawa isoterm penyerapan bagi Pb (II) pada EG dan MEG adalah konsisten dengan model isoterm Langmuir. Ini menunjukkan kapasiti penyerapan maksimum 106 mg/g dan 68 mg/g bagi EG dan MEG, masing-masing. Penyerapan kinetik Pb (II) didapati mematuhi model kinetik pesudo-order-kedua. Interaksi kimia antara elektron ? pada helaian grafit dan ion Pb (II) memainkan peranan penting dalam mekanisme penyerapan. Pengenalan magnet CoFe2O4 kepada EG didapati telah mengubah nilai pH optimum kepada keadaan asal. Pengelasan penyerapan dilakukan menggunakan teknik analisis yang relevan seperti Mikroskop Elektron Pengimbasan (SEM), Difraksi Serbuk sinar-X (XRD), Magnetometer Sampel-Getaran (VSM) dan Inframerah Perubahan-Fourier (FTIR). Hasil kerja ini mencadangkan kemungkinan besar bagi penggunaan grafit ubah suai yang disediakan bagi membuang bahan berbahaya dalam sistem rawatan air sisa praktikal.
APA, Harvard, Vancouver, ISO, and other styles
19

Kitaigorodskii, A. N., and A. N. Belyaev. "Solvation of Coordinatively Saturated Metal Complexes of Nitrogen Ligands." Zeitschrift für Naturforschung A 40, no. 12 (December 1, 1985): 1271–77. http://dx.doi.org/10.1515/zna-1985-1214.

Full text
Abstract:
1H NMR shifts were measured for ten organic compounds L in solutions containing paramagnetic bis[hydrotris(l-pyrazolyl)borato]cobalt(II), Co(HBpz3)2. The observed paramagnetic shifts were accounted for by pseudo-contact interactions in the outer-sphere adducts of Co(HBpz3)2 · L. From the concentration dependence of the induced shifts, the thermodynamic parameters of the outer-sphere complexation were determined. It is shown that a simple electrostatic model of Co(HBpz3)2 solvation is not consistent with the experimental results. Comparison of the data for pyrazolylborate and β-diketonate transition metal complexes showed that the specificity of the outer-sphere solvation depends to a large extent on the nature of the first coordination sphere ligands. Co(HBpz3)2 induces anomalous shifts of the signals of NMR standards. It is necessary to assume a specific interaction between the standards and Co(HBpz3)2.
APA, Harvard, Vancouver, ISO, and other styles
20

Bettaïeb, M. N., P. Velex, and M. Ajmi. "A Static and Dynamic Model of Geared Transmissions by Combining Substructures and Elastic Foundations—Applications to Thin-Rimmed Gears." Journal of Mechanical Design 129, no. 2 (February 6, 2006): 184–94. http://dx.doi.org/10.1115/1.2406088.

Full text
Abstract:
The present work is aimed at predicting the static and dynamic behavior of geared transmissions comprising flexible components. The proposed model adopts a hybrid approach, combining classical beam elements, elastic foundations for the simulation of tooth contacts, and substructures derived from three-dimensional (3D) finite element grids for thin-rimmed gears and their supporting shafts. The pinion shaft and body are modeled via beam elements which simulate bending, torsion and traction. Tooth contact deflections are described using time-varying elastic foundations (Pasternak foundations) connected by independent contact stiffness. In order to account for thin-rimmed gears, a 3D finite element model of the gear (excluding teeth) is set up and a pseudo-modal reduction technique is used prior to solving the equations of motion. Depending on the gear structure, the results reveal a potentially significant influence of thin rims on both quasi-static and dynamic tooth loading.
APA, Harvard, Vancouver, ISO, and other styles
21

Baron, Daniel, and Nicole Lumbroso-Bader. "Structure et conformation du complexe du N-acétyl-aspartate avec un cation lanthanide. Étude par résonance magnétique nucléaire du 1H et du 13C." Canadian Journal of Chemistry 64, no. 7 (July 1, 1986): 1267–77. http://dx.doi.org/10.1139/v86-219.

Full text
Abstract:
Lanthanide induced shifts by Lu3+, Yb3+, Tm3+, Er3+, Ho3+, and Dy3+ in NAcAsp (0.14 M in D2O, pH 5) are observed for ten magnetic sites (1H and 13C). The averaged binding constant for 1:1 complexes is 72 M−1 (for chloride solutions of ca. 0.05 M). Determination of the pseudo-contact geometrical factors (under axial symmetry approximation) requires taking into account a contact term and discarding the Tm3+ results. Data from the Asp residue are in agreement with 6 structures of this residue such that chelation occurs through the two carboxylates. Oβ−… Cα′ length seems to be the main factor while COOα− orientation is a minor one. The entire set of results is consistent with only three structures where the nitrogen atom is far from the carboxylates, and the Cα—N rotamers have extended conformations. Three oxygen atoms (two from the COOβ− group) appear to be involved in the chelation. However, the data do not exclude another minor conformational species.
APA, Harvard, Vancouver, ISO, and other styles
22

Eveillard, Marion, Myriam Chevalier, Thomas Besnard, Benjamin Cogne, Alice Kuster, Stephane Bezieau, Marie C. Bene, and Claire Beneteau. "Polymorphonuclears Display a New Type of Abnormal Cytologic Granules (Chediak Higashi-Like) in a Very Rare Syndrome Linked to a Biallelic Defect of WDR81." Blood 128, no. 22 (December 2, 2016): 1331. http://dx.doi.org/10.1182/blood.v128.22.1331.1331.

Full text
Abstract:
Abstract A twelve years-old girl was admitted at the pediatric emergency unit for a severe pleuro-pneumopathy. She had a long history of recurrent infections in a complex neurological context. Since birth, she had suffered from an epileptic encephalopathy with West syndrome, severe microcephaly and spastic tetraplegia. Her neurological development was extremely impaired: she was not able to neither hold her head nor develop any voluntary hand use. Moreover, she had a precocious puberty and a progressive worsening of her neurological status. She is bedridden, has very poor visual contact and does not speak. Brain magnetic resonance imaging (MRI) examination has evidenced a severe microcephaly, without gyral anomalies, cerebral atrophy predominating in the frontal lobes, hypoplasia of the corpus callosum and dysmyelination. Her older sister and parents are healthy and there is no history of consanguinity in the family. During the infection mentioned above, the only anomaly at complete blood count (CBC) was an excess of monocytes. Yet, and although the CBC instrument had not indicated any alarm for neutrophils, abnormal granules were observed microscopically in polymorphonuclears on the blood smear (fig. 1). The coarse and purplish granules were toluidine-negative, myeloperoxidase-positive and only present in the polymorphonuclear lineage. The large vacuoles in these cells, also seen in monocytes, are related to the infectious condition of the patient in this context of pleuro-pneumopathy. There was no anomaly of the lymphocytes, and specifically no image recalling storage disease. Although previous CBC had not led to the identification of these granules, they were systematically investigated for, at high magnification, afterwards, always observed but seemed to increase during each infectious episode. Their appearance suggests a coalescence of smaller granules during infection. A bone marrow aspiration was performed as the patient underwent surgery for severe scoliosis, at distance from any infectious episode. Abnormal granules were present at all stages of neutrophil maturation (fig. 2). Nobody in the family presents these abnormal granules. Yet, investigations were performed in search of a congenital syndrome or storage disease: metabolic balance, amino acids chromatography in blood and urine, functional analyses of polymorphonuclears, karyotype, CGH array. No anomaly was disclosed. A skin biopsy looking for inclusions allowed to exclude lipofuscinose. Several other investigations were performed which excluded a lysosomal storage disease. A whole exome analysis was then decided for the child, parents and sister after obtaining informed consent from the parents. This allowed to discover mutations on both alleles ofthe WDR81 gene in the propositus: a deletion leading to a frame shift in exon 3 and a substitution generating a missense in exon 9 (c.3820_3835del p.Pro1274Thrfs*56 and c.5453G>T p.Gly1818Val respectively). The c.3820_3835del deletion was inherited by the father and the c.5453G>T mutation was inherited by the mother. The mutations were confirmed by Sanger sequencing and segregated with the expected pattern of autosomal-recessive inheritance in all available family members. This gene has previously been shown to be associated with cerebral ataxia, intellectual disability and quadrupedal locomotion in patients with homozygous mutations in consanguineous families. Moreover, a murine model with mutation of this gene showed tremor and ataxic gait. Expression of WDR81 was found in neuron of central nervous system included Purkinje cells, photoreceptor cells. All these aspects are consistent with the clinical features of the patient, the severity of her disease being possibly related to the fact that both alleles of the WDR81 gene carry a different mutation. This also suggests that the double genetic defect observed in the WDR81 in this child is responsible for the peculiar granules appearing early during myeloid maturation. Interestingly, the WDR81 gene contains a BEACH domain on its N terminal portion. This domain was described in the BEIGE protein and the highly homologous CHS protein which are involved in Chediak-Higashi syndromes. Although the patient has none of the phenotypic nor immune characteristics of a Chediak-Higashi syndrome, it is highly likely that involvement of the WDR81 gene is responsible for the formation of such pseudo Chediak abnormal granules. Disclosures No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
23

Lang, Lucas, Enrico Ravera, Giacomo Parigi, Claudio Luchinat, and Frank Neese. "Theoretical analysis of the long-distance limit of NMR chemical shieldings." Journal of Chemical Physics 156, no. 15 (April 21, 2022): 154115. http://dx.doi.org/10.1063/5.0088162.

Full text
Abstract:
After some years of controversy, it was recently demonstrated how to obtain the correct long-distance limit [point-dipole approximation (PDA)] of pseudo-contact nuclear magnetic resonance chemical shifts from rigorous first-principles quantum mechanics [Lang et al., J. Phys. Chem. Lett. 11, 8735 (2020)]. This result confirmed the classical Kurland–McGarvey theory. In the present contribution, we elaborate on these results. In particular, we provide a detailed derivation of the PDA both from the Van den Heuvel–Soncini equation for the chemical shielding tensor and from a spin Hamiltonian approximation. Furthermore, we discuss in detail the PDA within the approximate density functional theory and Hartree–Fock theories. In our previous work, we assumed a relatively crude effective nuclear charge approximation for the spin–orbit coupling operator. Here, we overcome this assumption by demonstrating that the derivation is also possible within the fully relativistic Dirac equation and even without the assumption of a specific form for the Hamiltonian. Crucial ingredients for the general derivation are a Hamiltonian that respects gauge invariance, the multipolar gauge, and functional derivatives of the Hamiltonian, where it is possible to identify the first functional derivative with the electron number current density operator. The present work forms an important foundation for future extensions of the Kurland–McGarvey theory beyond the PDA, including induced magnetic quadrupole and higher moments to describe the magnetic hyperfine field.
APA, Harvard, Vancouver, ISO, and other styles
24

Sarra, Aga, Djama Chaker, Bouguettoucha Abdallah, Chebli Derradji, and Amrane Abdeltif. "Adsorption of a Cationic Dye Crystal Violet onto a Binary Mixture of Forest Waste Biopolymer: Advanced Statistical Physics Studies." Advanced Materials Research 1168 (January 21, 2022): 93–113. http://dx.doi.org/10.4028/www.scientific.net/amr.1168.93.

Full text
Abstract:
An eco-friendly and low cost modified mixture of both Wild Carob and Cupressus sempervirens with H3PO4 (Cupcar-H3PO4) was prepared to extract a cationic dye (Crystal Violet) from an aqueous solution in a batch reactor at the laboratory of chemical engineering, Department of Process Engineering, Faculty of Technology, Farhat Abbas Setif University-1. The pH effect, contact time, initial concentration of dye, ionic strength and temperature were investigated in this study. The Maximum adsorption capacity was found to be 117.26 mg/g at 25°C for a natural pH (ph =6.22). The active functional groups of Cupcar-H3PO4. These peak shifts indicated that especially the bonded –OH groups, C–O stretching of ether groups, and C=C group played a major role in CV adsorption onto Cupcar-H3PO4. The new bands of low intensity which appeared at 890 cm−1 and 813 cm-1 after CV adsorption and which could be attributed to a υ (CV-biosorbent) constituted the most striking result. Kinetics of biosorption of crystal violet (CV) was analyzed and the results showed that both pseudo order (PSO) and the pseud nth-order model (PNO) models gave most accurate fit than the pseudo-first-order model (PFO). Isotherm data were analyzed by four classical models, Langmuir and Freundlich with two parameters, Sips and Redlich-Peterson with three parameters. And for more information on the mechanism of CV uptake on the Cupcar-H3PO4 material, three advanced models are applied to isothermal data, Monolayer with one energy (M1), Monolayer with two energies (M2), and Double layer with one energy (M3). For the classical models and in the case of the two parameters models the Langmuir one gives a better fit for the data isotherm according to the R2. In the case of three parameters models, both Sips and Redlich-Peterson accurately described experimental data. Monolayer with two energy sites model (M2) was shown to be the most appropriate advanced statistical physics model for fitting CV biosorption onto the Cupcar-H3PO4 biosorbent, this model suggested that the CV pollutant was adsorbed at two different Cupcar-H3PO4 biosorbent sites, and that a variable number of CV molecules could be adsorbed at each site; from this, the CV dye was adsorbed with 2 different adsorption energies. The changes in the enthalpy, the standard free energy and the entropy were also evaluated and the reaction was found to be spontaneous, endothermic and physical in nature.
APA, Harvard, Vancouver, ISO, and other styles
25

Kenis, V., A. Kozhevnikov, E. Melchenko, and D. Petrova. "AB0990 SECONDARY SUBACUTE ARTHRITIS IN CHILDREN WITH DIASTROPHIC DYSPLASIA AND RMED." Annals of the Rheumatic Diseases 79, Suppl 1 (June 2020): 1789.1–1789. http://dx.doi.org/10.1136/annrheumdis-2020-eular.3484.

Full text
Abstract:
Background:Progressive osteoarthritis is common in skeletal dysplasias. In the most of these disorders progress is relatively slow and acute pain with severe disability secondary to osteoarthritis is rare during childhood. Diastrophic dysplasia and rMED are quite unique among other skeletal dysplasias for secondary subacute arthritis (SSA). Protracted course of SSA can mimic JIA.Objectives:To analyse incidence and features of SSA in group of patients with DD/rMED.Methods:We retrospectively analysed for SSA our series of 39 patients with DD/rMED. Clinical, radiological and laboratory data were collected. Clinical assessment included pain (VAS), ROM (range of motion) and postural/walking disturbances. Radiological type by Yasunaga classification, neck-shaft angle (NSA) and articulo-trochanteric distance (AT distance) were estimated. MRI data regarding cartilage damage, joint effusion and bone marrow condition were noticed. Biomarkers of inflammation and immune response (ANA, RF, vimentin antibodies) were assessed in blood samples.Results:We identified 17 patients with hip joint SSA among 39 patients with DD/rMED (43%). Bilateral involvement was identified in 13 children with asynchronous appearance in all cases (from 2 to 18 months before the symptoms on the other side). Trauma (including iatrogenic damage during physiotherapy) preceded SSA in 9 cases. Pain, limited range of motion, limping and antalgic posture throughout the day were noticed in all the cases. Duration of these symptoms was from 4 weeks to 9 months. Progressive phase (increasing symptoms) took from 2 weeks to 4 months. General laboratory data were normal or indicated moderate inflammatory response without any specific changes. Radiolodgical data shows predictive sighs like NSA<110o, AT distance <10mm, fair or poor congruency by Yasunaga classification. Also radiological data demonstrated progressive subluxation with narrowing of articular space, osteoporosis, subchondral cysts.MRI revealed pseudo-erosive damaged cartilage in contact area with joint effusion and bone marrow oedema. Total cartilage matrix also visualized like intermittent and multi-layered = erosive-like chondrolysis (defective articular hyaline cartilage) in 11 patients (65%).Management included bed rest or partial weight bearing. NSAID were prescribed for 2-4 weeks with following usage according to the symptoms. Physical therapy to maintain range of motion was provided. One patient was operated (containment surgery for subluxation). In follow-up (2-7 years) 12 patients were painless at the daily life. 4 patients had intermittent pain and one patient (operated) - daily moderate pain. Range of motion was restored in 11 patients. Those patients who underwent in-hospital rehabilitation immediately after appearing of the symptoms demonstrated better outcome.Conclusion:SSA is typical for DD/rMED and leads to remarkable disability. Early recognition and non-surgical management are important for recovery. The quick reversibility of the clinical picture arthritis against the background of a short course of NSAIDs and rehabilitation is a characterized of non-autoimmune secondary inflammatory process (SSA). SSA not requiresanti-rheumatic treatment in childrenwith DD/rMED.References:[1]Al Kaissi, A., Kenis, V., Melchenko, E., Chehida, F. B., Ganger, R., Klaushofer, K., & Grill, F. (2014). Corrections of lower limb deformities in patients with diastrophic dysplasia.Orthopaedic surgery,6(4), 274-279.[2]Baindurashvili A.G., Kenis V.M., Melchenko E.V., Grill F., Al-Kaissi A. Complex orthopaedic management of patients with skeletal dysplasias.Traumatology and Orthopedics of Russia. 2014;(1):44-50. doi.org/10.21823/2311-2905-2014-0-1-44-50Disclosure of Interests:None declared
APA, Harvard, Vancouver, ISO, and other styles
26

"Pseudo-Contact Shift in Periodic Paramagnetic Solids Via Density Functional Theory." ECS Meeting Abstracts, 2016. http://dx.doi.org/10.1149/ma2016-03/2/838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Alansari, Dalia. "Saudi Medical Research Articles Published in Pseudo Journals: An Urgent Call for Action." Applied Medical Research, June 30, 2021, 1–8. http://dx.doi.org/10.47363/amr/2021(8)204.

Full text
Abstract:
Research is needed if we want to carry out the demands of a rapidly changing world. In fact, research and education are closely linked to deliver the functions of a university. In recent decades, almost all universities expect their faculty members to maintain scholarly activities, including conducting research and publishing scholarly works. This pressure continues today with a paradigm shift among institutions from their previous emphasis on effective faculty contact with students as a criterion for success, to developing cultures of research and increase faculty research production. the researchers deemed it necessary to determine the frequency of medical research articles in Saudi Arabia published in pseudo journals. Likewise, researchers must be knowledgeable enough to discriminate between legitimate and predatory open access journal. It is in this context that this study is being undertaken.
APA, Harvard, Vancouver, ISO, and other styles
28

Zeman, Otto E. O., Jennifer Steinadler, Rupert Hochleitner, and Thomas Bräuniger. "Characterisation of contact twinning for cerussite, $$\hbox {PbCO}_3$$, by single-crystal NMR spectroscopy." Physics and Chemistry of Minerals 48, no. 11 (October 7, 2021). http://dx.doi.org/10.1007/s00269-021-01162-6.

Full text
Abstract:
AbstractCerussite, $$\hbox {PbCO}_3$$ PbCO 3 , like all members of the aragonite group, shows a tendency to form twins, due to high pseudo-symmetry within the crystal structure. We here demonstrate that the twin law of a cerussite contact twin may be established using only $$^{207}$$ 207 Pb-NMR spectroscopy. This is achieved by a global fit of several sets of orientation-dependent spectra acquired from the twin specimen, allowing to determine the relative orientation of the twin domains. Also, the full $$^{207}$$ 207 Pb chemical shift tensor in cerussite at room temperature is determined from these data, with the eigenvalues being $$\delta _{11} = (-2315\pm 1)$$ δ 11 = ( - 2315 ± 1 ) ppm, $$\delta _{22} = (-2492 \pm 3)$$ δ 22 = ( - 2492 ± 3 ) ppm, and $$\delta _{33} = (-3071 \pm 3)$$ δ 33 = ( - 3071 ± 3 ) ppm.
APA, Harvard, Vancouver, ISO, and other styles
29

Thalmann, E., and S. Henein. "Triple Crossed Flexure Pivot Based on a Zero Parasitic Center Shift Kinematic Design." Journal of Mechanisms and Robotics 14, no. 4 (February 18, 2022). http://dx.doi.org/10.1115/1.4053471.

Full text
Abstract:
Abstract Thanks to their absence of play, absence of contact friction and possible monolithic fabrication, flexure pivots offer advantages over traditional bearings in small-scale, high accuracy applications and environments where lubrication and wear debris are proscribed. However, they typically present a parasitic center shift that deteriorates their rotational guidance accuracy. Existing solutions addressing this issue have the drawbacks of reducing angular stroke, prohibiting planar design, or introducing overconstraints or underconstraints. This article presents a new triple crossed flexure pivot we have named TRIVOT whose kinematics theoretically nullify its parasitic center shift without overconstraints nor internal mobility. In the physical implementation, the center shift is non-zero but we show using the finite element method (FEM) that it is reduced by one order of magnitude in comparison to the widely used crossed flexure pivot (CFP). This allows to choose a crossing ratio of the flexures that either maximizes the angular stroke limit for given flexures or results in a compact planar design with the possibility of a remote center of compliance (RCC). Based on a pseudo-rigid-body model (PRBM), formulas for the rotational stiffness and angular stroke limit of the TRIVOT are derived, which are then validated by FEM. Finally, we show that a high support stiffness can be achieved based on a preliminary study for a mechanical watch time base application. We expect this new pivot to become a competitive alternative to the standard CFP for applications where high accuracy and compactness are required.
APA, Harvard, Vancouver, ISO, and other styles
30

Goren, Elad, Liat Avram, and Amnon Bar-Shir. "Versatile non-luminescent color palette based on guest exchange dynamics in paramagnetic cavitands." Nature Communications 12, no. 1 (May 24, 2021). http://dx.doi.org/10.1038/s41467-021-23179-9.

Full text
Abstract:
AbstractMulticolor luminescent portrayal of complexed arrays is indispensable for many aspects of science and technology. Nevertheless, challenges such as inaccessible readouts from opaque objects, a limited visible-light spectrum and restricted spectral resolution call for alternative approaches for multicolor representation. Here, we present a strategy for spatial COlor Display by Exploiting Host-guest Dynamics (CODE-HD), comprising a paramagnetic cavitand library and various guests. First, a set of lanthanide-cradled α-cyclodextrins (Ln-CDs) is designed to induce pseudo-contact shifts in the 19F-NMR spectrum of Ln-CD-bound guest. Then, capitalizing on reversible host-guest binding dynamics and using magnetization-transfer 19F-MRI, pseudo-colored maps of complexed arrays are acquired and applied in molecular-steganography scenarios, showing CODE-HD’s ability to generate versatile outputs for information encoding. By exploiting the widely shifted resonances induced by Ln-CDs, the guest versatility and supramolecular systems' reversibility, CODE-HD provides a switchable, polychromatic palette, as an advanced strategy for light-free, multicolor-mapping.
APA, Harvard, Vancouver, ISO, and other styles
31

Maass, Thorben, Leon Torben Westermann, Robert Creutznacher, Alvaro Mallagaray, Jasmin Dülfer, Charlotte Uetrecht, and Thomas Peters. "Assignment of Ala, Ile, LeuproS, Met, and ValproS methyl groups of the protruding domain of murine norovirus capsid protein VP1 using methyl–methyl NOEs, site directed mutagenesis, and pseudocontact shifts." Biomolecular NMR Assignments, January 20, 2022. http://dx.doi.org/10.1007/s12104-022-10066-7.

Full text
Abstract:
AbstractThe protruding domain (P-domain) of the murine norovirus (MNV) capsid protein VP1 is essential for infection. It mediates receptor binding and attachment of neutralizing antibodies. Protein NMR studies into interactions of the P-domain with ligands will yield insights not easily available from other biophysical techniques and will extend our understanding of MNV attachment to host cells. Such studies require at least partial NMR assignments. Here, we describe the assignment of about 70% of the Ala, Ile, LeuproS, Met, and ValproS methyl groups. An unfavorable distribution of methyl group resonance signals prevents complete assignment based exclusively on 4D HMQC-NOESY-HMQC experiments, yielding assignment of only 55 out of 100 methyl groups. Therefore, we created point mutants and measured pseudo contact shifts, extending and validating assignments based on methyl-methyl NOEs. Of note, the P-domains are present in two different forms caused by an approximate equal distribution of trans- and cis-configured proline residues in position 361.
APA, Harvard, Vancouver, ISO, and other styles
32

d'Auvergne, Edward James, and Christian Griesinger. "The theory of frame ordering: observing motions in calmodulin complexes." Quarterly Reviews of Biophysics 52 (2019). http://dx.doi.org/10.1017/s0033583519000015.

Full text
Abstract:
AbstractLarge scale functional motions of molecules are studied experimentally using numerous molecular and biophysics techniques, the data from which are subsequently interpreted using diverse models of Brownian molecular dynamics. To unify all rotational physics techniques and motional models, the frame order tensor – a universal statistical mechanics theory based on the rotational ordering of rigid body frames – is herein formulated. The frame ordering is the fundamental physics that governs how motions modulate rotational molecular physics and it defines the properties and maximum information content encoded in the observable physics. Using the tensor to link residual dipolar couplings and pseudo-contact shifts, two distinct information-rich and atomic-level biophysical measurements from the field of nuclear magnetic resonance spectroscopy, to a number of basic mechanical joint models, a highly dynamic state of calmodulin (CaM) bound to a target peptide in a tightly closed conformation was observed. Intra- and inter-domain motions reveal the CaM complex to be entropically primed for peptide release.
APA, Harvard, Vancouver, ISO, and other styles
33

Sargeant, Jack. "Filth and Sexual Excess." M/C Journal 9, no. 5 (November 1, 2006). http://dx.doi.org/10.5204/mcj.2661.

Full text
Abstract:
Pornography can appear as a staid genre with a rigid series of rules and representations, each video consisting of a specified number of liaisons and pre-designated sexual acts, but it is also a genre that has developed and focused its numerous activities. What was considered to be an arousing taboo in the 1970s would not, for example, be considered as such today. Anal sex, while once comparatively rare in pornographic films, is now commonplace, and, while once utterly unspoken in mainstream heterosexual culture it is now acknowledged and celebrated, even by female targeted films such as Brigit Jones’ Diary (Sharon Maguire, 2001). Pornography, however, has raised the stakes again. Hardcore is dependent on so called ‘nasty girls’ and most interviews with starlets focus on their ability to enjoy being ‘nasty’, to enjoy what are considered or labelled as ‘perverse’ manifestations of sexuality by the normalising discourses of dominant culture and society. While once a porn star merely had to enjoy – or pretend to enjoy – sucking cock, now it is expected her repertoire will include a wider range of activities. With anal sex, an event that transpires in most modern pornography, the site of penises – either singularly or in pairs – pushed into swollen sore assholes is a visual commonplace. In the 1980s and 1990s (when the representation of heterosexual anal sex became truly dominant in pornography) there was a recognizable process of sexual acts, between penetration of mouth, vagina, and asshole. Each penetration would be edited and between each take the male star would wipe down his penis. Until somebody in hardcore pornography developed the A-to-M, a.k.a ass-to-mouth aka A2M. In this move the male pulls his cock from the asshole of the female and then sticks it straight into her open mouth and down her throat without wiping it clean first. All of this is presented unmediated to the viewer, in one singular shot that follows the penis as it moves from one willing hole to the other (and the body must be understood as fragmented, it is a collection of zones and areas, in this instance orifices each with their own signifying practices, not a singular organic whole). Even assuming that the nubile starlet has had an enema to blast clean her rectum prior to filming there will still be microscopic traces of her shit and rectal mucus on his penis. Indeed the pleasure for the viewers is in the knowledge of the authenticity of the movement between ass and mouth, in the knowledge that there will be small flakes of shit stuck to her lips and teeth (a variant of the ass-to-mouth sees the penis being pulled from one starlet’s anus and inserted into another starlet’s gaping mouth, again in one unedited shot). Shit escapes simple ontology it is opposed to all manner of being, all manner of knowledge and of existence yet it is also intimately linked to self-presence and continuity. From earliest infancy we are encouraged not to engage with it, rather it is that which is to be flushed away immediately, it is everything about being human that is repulsive, rejected and denied. Shit escapes simple symbolism; it exists in its own discursive zone. While death may be similarly horrific to us, it is so because it is utterly unknown shit, however, horrifies precisely because it is known to us. Like death, shit makes us all equal, but shit is familiar, we know its fragrance, we know its texture, we know its colour, and – yes – deep down, repressed in our animal brain we know its taste. Its familiarity results because it is a part of us, yet it is no longer of us. In death the cadaver can be theorized as the body without a soul, without spirit, or without personality, but with shit humanity does not have this luxury, shit is the part of us that both defies and defines humanity. Shit is that which was us but is no longer, yet it never fully stops being part of us, it contains traces of our genetic material, pieces of our diet, even as it is flushed more is already being pushed down our intestine. Shit is substance and process. If the act of fucking is that which affirms vital existence against death, then introducing shit into the equation becomes utterly transgressive. Defecation and copulation are antithetical St Augustine’s recognition that we are born between piss and shit – inter faeces et urinam – understands the animistic nature of existence and sex as contaminated by sin, but he does not conflate the act of shitting and fucking as the same, his description is powerful precisely because they are not understood as the same. Introducing shit into sexual activity is culturally forbidden, genuine scatologists, coprophiles and shit fetishists are rare, and most keep their desires secret even from their closest companions. Even the few that confess to enjoying ‘brown showers’ do not admit to eating raw shit, either their own or that of somebody else. The practice is considered to be too dangerous, too unhealthy, and too disgusting. Even amongst the radical sexual communities many find that it stinks of excess, as if desires and fantasies had limits. In Pier Paolo Pasolini’s cinematic masterpiece Salo (1975) the quartet of libertines and their fellow explorers in unleashed lust – both the willing and the coerced – indulge in a vast coprophilic feast, but in this film the shit that is slathered over the bodies of the young charges and greedily scoffed down is not real. However there are a handful of directly scatological pornographic videos, often they depict people crouching down and shitting, the shit being rubbed on to nude bodies and eventually consumed. In some videos hungry mouths open directly under the puckering asshole, allowing the brown turd to plop directly onto the enthusiastic tongue and into the mouth. Cameras zoom in to show the shit-smeared lips and teeth. Like the image of ejaculation manifested in the cum-shot of mainstream hardcore pornography this sight is a vindication of the authenticity of the action. Such videos are watched by both fetishists and the curious – commonly teenage males trying to out shock each other. Unlike ‘traditional’ heterosexual hardcore pornography, which depicts explicit penetrative sex, scatology films rarely appear on the shelves of video stores and enthusiasts are compelled to search the dark bowels of pornography to find them. Yet the popularity of the ass-to-mouth sequence in hardcore suggests that there is an interest with such faecal taboo acts that may be more common that previously imagined. This is not to suggest that the audience who witness an ass-to-mouth scene want to go and eat shit, or want their partners to, but it does suggest that there is an interest in the transgressive potential of shit or the idea of shit on an erect penis. Watching these scenes the audience’s attention is drawn to the movement from the locus of defecation to that of consumption. Perhaps the visual pleasure lies in the degradation of the ‘nasty’ girl, in the knowledge that she can taste her own mucus and faecal matter. But if the pleasures are purely sadistic then these films fail, they do not (just) depict the starlets ‘suffering’ as they engage in these activities, in contrast, they are ‘normalised’ into the sexual conventions of the form. Hardcore pornography is about the depiction of literal excess; about multiple penis plunging into one asshole or one vagina (or even both) about orgies about the world’s biggest gang bangs and facials in which a dozen or more men shoot their genetic material onto the grinning faces of starlets as cum slathers their forehead, cheeks, chin, lips, and teeth. The sheer unremitting quantity becomes an object in itself. Nothing can ever be enough. This excess is also philosophical; all non-reproductive sexual activity belongs to the category of excess expenditure, where the unrestrained pursuit of pleasure becomes in itself both object choice and subject. Some would see such pornographic activities as anti-humanist, as cold, and as nihilistic, but such an interpretation fails. In watching these films, in seeing the penis move from asshole to mouth the audience are compelled by the authenticity of the gesture to read the starlet as human the ‘pleasure’ is in knowing that she can taste her own shit on some anonymous cock. Finally, she is smiling through its musky taste so we do not have to. Appendix / Sources / Notes / Parallel Text Throughout this paper I am referring only to pornographic material marketed to an audience who are identified or identify as heterosexual. These films may contain scenes with multiple males and females having sex at one time, however while there may be what the industry refers to as girl-on-girl action there will be no direct male-on-male contact (although often all that seperates two male penises is the paper thin wall of fleshy tissue between the vagina and anus). The socio-cultural history of heterosexual anal sex is a complex one, made more so because of its illicit and, in some jurisdictions, illegal status. It is safe to assume that many people have engaged in it even if they have not subsequently undertaken an active interest in it (statistics published in Exploring the Dimensions of Human Sexuality 2nd Edition suggest that 28% of male and 24% of female American college graduates and 21% of male and 13% of female high school graduates have experienced anal sex [377]). In hardcore pornography it is the male who penetrates the female, who presents her asshole for the viewer’s delectation. In personal sexual behaviour heterosexual males may also enjoy anal penetration from a female partner both in order to stimulate the sensitive tissue around the anus and to stilulate the prostate, but the representation of such activities is very rare in the mainstream of American hardcore porn. As inventer of gonzo porn John Stagliano commented when interviewed about his sexual proclivities in The Other Hollywood , “…you know, admitting that I really wanted to get fucked in the ass, and might really like it, is not necessarily a socially acceptable thing for a straight man” (587). Anal sex was most coherently radicalised by the Marquis de Sade, the master of sodomaniacal literature, who understood penetrating male / penetrated female anal sex as a way in which erotic pleasure/s could be divorced from any reproductive metanarrative. The scene in Brigit Jones’ Diary is made all the more strange because there is no mention of safe sex. There are, however, repeated references and representations of the size and shape of the heroine’s buttocks and her willingness to acquiesce to the evidentially dominant will of her ‘bad’ boyfriend the aptly named Daniel Cleaver. For more on heterosexual anal sex in cinema see my ‘Hot, Hard Cocks and Tight, Tight Unlubricated Assholes.Transgression, Sexual Ambiguity and ‘Perverse’ Pleasures in Serge Gainsbourg’s Je T’Aime Moi Non Plus’, in Senses of Cinema 30 (Jan.-March 2004). Hardcore pornography commonly means that which features a depiction of penetrative intercourse and the visual presentation of male ejaculation as a climax to a sequence. For more on the contemporary porn scene and the ‘nasty girl’ see Anthony Petkovich, The X Factory: Inside The American Hardcore Film Industry, which contains numerous interviews with porn starlets and industry insiders. While pornography is remembered for a number of key texts such as Deep Throat (Gerard Damiano, 1972) or Behind the Green Door (Jim & Artie Mitchell, 1972), these were shot and marketed as erotic narrative film and released theatrically (albeit to grindhouse and specialist cinemas). However since 1982 and the widespread availability of video – and more recently DVD – pornography has been produced almost exclusively for home consumption. The increasing demands of the consumer, combined with the accessablity of technology and cheap production costs of video when compared to film have led to a glut of available material. Now videos/DVDs are often released in series with absurdly self descriptive titles such as Anal Pounding, Lesbian Bukkake, and Pussy Party, most of which provide examples of the mise-en-scene of contemporary hardcore, specific ass to mouth series include Ass to Mouth (vol 1 – 15), Ass to Mouth CumShots (vol 1 – 5), Her First Ass to Mouth, From Her Ass to Her Mouth, From My Ass to My Mouth, A2M (vol 1 – 9), and no doubt many others. For more on hardcore pornography and its common themes and visual styles see Linda Williams, Hardcore. Wikipedia suggests that the director Max Hardcore was responsible for introducing the form in the early 1990s in his series Cherry Poppers. The act is now a staple of the form. (Note that while Wikipedia can not normally be considered an academic source the vagaries of the subject matter necessitate that research takes place where necessary). All pornographic positions and gestures have a nickname, industry shorthand, thus there are terms such as the DP (double penetration) or the reverse cowgirl. These names are no more or less shocking than the translations for sexual positions offered in ‘classic’ erotic guidebooks such as the Kama Sutra. This fragmented body is a result of the cinematic gaze of pornography. Lenses are able to zoom in and focus on the body, and especially the genitals, in minute detail and present the flesh enlarged to proportions that are impossible to see in actual sexual encounters. The body viewed under such scrutiny but devoid of singular organic plenitude echoes the body without organs of Deleuze and Guattari (in contrast some radical feminist writers such as Andrea Dworkin would merely interpret such images as reflecting the misogyny of male dominated discourse). For more on the psychological development of the infant and the construction of the clean and unclean see Julia Kristeva Powers of Horror. It should be noted that commonly those who enjoy enema play – klismaphiliacs – are not related to scatologists, and often draw a distinction between their play, which is seen as a process of cleansing, and scatologists’ play, which is understood to be a celebration of the physical shit itself. Salo has undergone numerous sanctions, been banned, scorned, and even been interpreted by some as a metaphor / allegory for the director’s subsequent murder. Such understandings and pseudo-explanations do not do justice to either the director or to his film and its radical engagement with de Sade’s literature. These videos always come from ‘elsewhere’ of course, never close to home, thus in Different Loving the authors note “the Germans seem to specialize in scat” (518). Correspondence concerning the infamous bestiality film Animal Farm (197?) in the journal Headpress (issues 15 and 16, 1998) suggested that the audience was made up from teenage males watching it as a rite of passage, rather than by true zoophiles. Those I have seen were on shock and ‘gross out’ Internet sites rather than pornographic sites. Disclaimer – I have no interest per se in scatology, but an ongoing interest with the vagaries of human thought, and desire in particular, necessarily involves exploring areas others turn their noses up at. References Brame, Gloria G., William D. Brame, and Jon Jacobs. Different Loving: The World of Dominance and Submission. London: Arrow, 1998. Greenberg, Jerrold S., Clint E. Bruess, and Debra W. Haffner. Exploring the Dimensions of Human Sexuality. 2nd Edition. London: James & Bartlett, 2004. Russ Kick, ed. Everything You Know about Sex Is Wrong. New York: Disinformation, 2006. Julia Kristeva. Powers of Horror: An Essay on Abjection. New York: Columbia UP, 1982. McNeil, Legs, and Jennifer Osborne, with Peter Pavia. The Other Hollywood: The Uncensored Oral History of the Porn Film Industry. New York: Regan Books, HarperCollins, 2006. Petkovich, Anthony. The X Factory: Inside the American Hardcore Film Industry. Stockport: Critical Vision, 2001. Marquis de Sade. Justine, Philosophy in the Bedroom, and Other Writings. London: Arrow, 1991. Sargeant, Jack. “Hot, Hard Cocks and Tight, Tight Unlubricated Assholes: Transgression, Sexual Ambiguity and ‘Perverse’ Pleasures in Serge Gainsbourg’s Je T’Aime Moi Non Plus.“ Senses of Cinema 30 (Jan.-March 2004). Wikipedia. “Ass to Mouth.” 15 Sep. 2006 http://en.wikipedia.org.wk/Ass_to_mouth>. Williams, Linda. Hardcore. London: Pandora Press, 1990. Citation reference for this article MLA Style Sargeant, Jack. "Filth and Sexual Excess: Some Brief Reflections on Popular Scatology." M/C Journal 9.5 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0610/03-sargeant.php>. APA Style Sargeant, J. (Nov. 2006) "Filth and Sexual Excess: Some Brief Reflections on Popular Scatology," M/C Journal, 9(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0610/03-sargeant.php>.
APA, Harvard, Vancouver, ISO, and other styles
34

West, Patrick Leslie, and Cher Coad. "Drawing the Line: Chinese Calligraphy, Cultural Materialisms and the "Remixing of Remix"." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.675.

Full text
Abstract:
Western notions of authors’ Intellectual Property Rights (IPRs), as expressed within copyright law, maintain a potentially fraught relationship with a range of philosophical and theoretical positions on writing and authorship that have developed within contemporary Western thinking. For Roland Barthes, authorship is compromised, de-identified and multiplied by the very nature of writing: ‘Writing is that neutral, composite, oblique space where our subject slips away, the negative where all identity is lost, starting with the very identity of the body writing’ (142). Gilles Deleuze and Félix Guattari follow a related line of thought in A Thousand Plateaus: ‘Write, form a rhizome, increase your territory by deterritorialization, extend the line of flight to the point where it becomes an abstract machine covering the entire plane of consistency’ (11). Similarly, in Of Grammatology, Jacques Derrida suggests that ‘Writing is that forgetting of the self, that exteriorization, the contrary of the interiorizing memory’ (24). To the extent that these philosophical and theoretical positions emerge within the practices of creative writers as remixes of appropriation, homage and/or pastiche, prima facie they problematize the commercial rights of writers as outlined in law. The case of Kathy Acker often comes up in such discussions. Acker’s 1984 novel Blood and Guts in High School, for example, incorporates techniques that have attracted the charge of plagiarism as this term is commonly defined. (Peter Wollen notes this in his aptly named essay ‘Death [and Life] of the Author.’) For texts like Acker’s, the comeback against charges of plagiarism usually involves underscoring the quotient of creativity involved in the re-combination or ‘remixing’ of the parts of the original texts. (Pure repetition would, it would seem, be much harder to defend.) ‘Plagiarism’, so-called, was simply one element of Acker’s writing technique; Robert Lort nuances plagiarism as it applies to Acker as ‘pseudo-plagiarism’. According to Wollen, ‘as she always argued, it wasn’t really plagiarism because she was quite open about what she did.’ As we shall demonstrate in more detail later on, however, there is another and, we suggest, more convincing reason why Acker’s work ‘wasn’t really plagiarism.’ This relates to her conscious interest in calligraphy and to her (perhaps unconscious) appropriation of a certain strand of Chinese philosophy. All the same, within the Western context, the consistent enforcement of copyright law guarantees the rights of authors to control the distribution of their own work and thus its monetised value. The author may be ‘dead’ in writing—just the faintest trace of remixed textuality—but he/she is very much ‘alive’ as in recognised at law. The model of the author as free-standing citizen (as a defined legal entity) that copyright law employs is unlikely to be significantly eroded by the textual practices of authors who tarry artistically in the ‘de-authored territories’ mapped by figures like Barthes, Deleuze and Guattari, and Derrida. Crucially, disputes concerning copyright law and the ethics of remix are resolved, within the Western context, at the intersection of relatively autonomous creative and legal domains. In the West, it is seen that these two domains are related within the one social fabric; each nuances the other (as Acker’s example shows in the simultaneity of her legal/commercial status as an author and her artistic practice as a ‘remixer’ of the original works of other authors). Legal and writing issues co-exist even as they fray each other’s boundaries. And in Western countries there is force to the law’s operations. However, the same cannot be said of the situation with respect to copyright law in China. Chinese artists are traditionally regarded as being aloof from mundane legal and commercial matters, with the consequence that the creative and the legal domains tend to ‘miss each other’ within the fabric of Chinese society. To this extent, the efficacy of the law is muted in China when it comes into contact with circumstances of authorship, writing, originality and creativity. (In saying this though, we do not wish to fall into the trap of cultural essentialism: in this article, ‘China’ and ‘The West’ are placeholders for variant cultural tendencies—clustered, perhaps, around China and its disputed territories such as Taiwan on the one hand, and around America on the other—rather than homogeneous national/cultural blocs.) Since China opened its system to Western capitalist economic activity in the 1980s, an ongoing criticism, sourced mainly out of the West, has been that the country lacks proper respect for notions of authorship and, more directly, for authorship’s derivative: copyright law. Tellingly, it took almost ten years of fierce negotiations between elements of the capitalist lobby in China and the Legislative Bureau to make the Seventh National People’s Congress pass the first Copyright Law of the People’s Republic of China on 7 September 1990. A law is one thing though, and adherence to the law is another. Jayanthi Iyengar of Asia Times Online reports that ‘the US government estimates that piracy within China [of all types of products] costs American companies $20-24 billion a year in damages…. If one includes European and Japanese firms, the losses on account of Chinese piracy is in excess of $50 billion annually.’ In 2008, the International Federation of the Phonographic Industry (IFPI) reported that more than 99% of all music files in China are pirated. In the same year, Cara Anna wrote in The Seattle Times that, in desperation at the extent of Chinese infringement of its Intellectual Property Rights (IPRs), Microsoft has deployed an anti-piracy tactic that blacks out the screens of computers detected running a fake copy of Windows. The World Trade Organisation (WTO) has filed complaints from many countries against China over IPRs. Iyengar also reports that, under such pressure, the State Intellectual Property Office in Beijing has vowed it will continue to reinforce awareness of IPRs in order to better ensure their protection. Still, from the Western perspective at least, progress on this extremely contentious issue has been excruciatingly slow. Such a situation in respect of Chinese IPRs, however, should not lead to the conclusion that China simply needs to catch up with the more ‘morally advanced’ West. Rather, the problematic relations of the law and of creativity in China allow one to discern, and to trace through ancient Chinese history and philosophy, a different approach to remix that does not come into view so easily within Western countries. Different materialisms of writing and authorship come into play across global space, with different effects. The resistance to both the introduction and the policing of copyright law in China is, we think, the sign of a culture that retains something related to authorship and creativity that Western culture only loosely holds onto. It provides a different way of looking at remix, in the guise of what the West would tend to label plagiarism, as a practice, especially, of creativity. The ‘death’ of the author in China at law (the failure to legislate and/or police his/her rights) brings the author, as we will argue, ‘alive’ in the writing. Remix as anonymous composition (citing Barthes) becomes, in the Chinese example, remix as creative expression of singular feelings—albeit remix set adrift from the law. More concretely, our example of the Chinese writer/writing takes remix to its limit as a practice of repetition without variation—what the West would be likely to call plagiarism. Calligraphy is key to this. Of course, calligraphy is not the full extent of Chinese writing practice—not all writing is calligraphic strictly speaking. But all calligraphy is writing, and in this it influences the ethics of Chinese writing, whether character-based or otherwise, more generally. We will have more to say about the ‘pictorial’ material aspect of Chinese writing later on. In traditional Chinese culture, writing is regarded as a technical practice perfected through reproduction. Chinese calligraphy (visual writing) is learnt through exhaustively tracing and copying the style of the master calligrapher. We are tempted to say that what is at stake in Chinese remix/calligraphy is ‘the difference that cannot be helped:’ that is, the more one tries, as it were, to repeat, the more repetition becomes impossible. In part, this is explained by the interplay of Qing 情 (‘feelings’) and Yun 韵 (‘composed body movements’). Now, the order of the characters—Qing 情 (‘feelings’) before Yun 韵 (‘composed body movements’)—suggests that Qing creates and supports Yun. To this extent, what we have here is something akin to a Western understanding of creative writing (of the creativity of writing) in which individual and singular feelings are given expression in the very movement of the writing itself (through the bodily actions of the writer). In fact though, the Chinese case is more complicated than this, for the apprenticeship model of Chinese calligraphy cultivates a two-way interplay of Qing 情 (‘feelings’) and Yun 韵 (‘composed body movements’). More directly, the ‘composed body movements’ that one learns from the master calligrapher help compose one’s own ‘feelings’. The very repetition of the master’s work (its remixing, as it were…) enables the creativity of the apprentice. If this model of creativity is found somewhat distasteful from a Western perspective (that is, if it is seen to be too restrictive of originality) then that is because such a view, we think, depends upon a cultural misunderstanding that we will try to clear up here. To wit, the so-called Confucian model of rote learning that is more-or-less frowned upon in the West is not, at least not in the debased form that it adopts in Western stereotypes, the philosophy active in the case of Chinese calligraphy. That philosophy is Taoism. As Wing-Tsit Chan elucidates, ‘by opposing Confucian conformity with non-conformity and Confucian worldliness with a transcendental spirit, Taoism is a severe critic of Confucianism’ (136). As we will show in a moment, Chinese calligraphy exemplifies this special kind of Taoist non-conformity (in which, as Philip J. Ivanhoe limns it, ‘one must unweave the social fabric’). Chan again: ‘As the way of life, [Taoism] denotes simplicity, spontaneity, tranquility, weakness, and most important of all, non-action (wu-wei). By the latter is not meant literally “inactivity” but rather “taking no action that is contrary to Nature”—in other words, letting Nature take its own course’ (136). Thus, this is a philosophy of ‘weakness’ that is neither ‘negativism’ nor ‘absolute quietism’ (137). Taoism’s supposed weakness is rather a certain form of strength, of (in the fullest sense) creative possibilities, which comes about through deference to the way of Nature. ‘Hold fast to the great form (Tao), / And all the world will come’ illustrates this aspect of Taoism in its major philosophical tract, The Lao Tzu (Tao-Te Ching) or The Classic of the Way and its Virtue (section 35, Chan 157). The guiding principle is one of deference to the original (way, Nature or Tao) as a strategy of an expression (of self) that goes beyond the original. The Lao Tzu is full of cryptic, metaphoric expressions of this idea: ‘The pursuit of learning is to increase day after day. / The pursuit of Tao is to decrease day after day. / It is to decrease and further decrease until one reaches the point of taking no action. / No action is undertaken, and yet nothing is left undone’ (section 48, Chan 162). Similarly, The female always overcomes the male by tranquility, / And by tranquility she is underneath. / A big state can take over a small state if it places itself below the small state; / And the small state can take over a big state if it places itself below the big state. / Thus some, by placing themselves below, take over (others), / And some, by being (naturally) low, take over (other states) (section 61, Chan 168). In Taoism, it is only by (apparent) weakness and (apparent) in-action that ‘nothing is left undone’ and ‘states’ are taken over. The two-way interplay of Qing 情 (‘feelings’) and Yun 韵 (‘composed body movements’), whereby the apprentice copies the master, aligns with this key element of Taoism. Here is the linkage between calligraphy and Taoism. The master’s work is Tao, Nature or the way: ‘Hold fast to the great form (Tao), / And all the world will come’ (section 35, Chan 157). The apprentice’s calligraphy is ‘all the world’ (‘all the world’ being, ultimately in this context, Qing 情 [‘feelings’]). Indeed, Taoism itself is a subtle philosophy of learning (of apprenticeship to a master), unlike Confucianism, which Chan characterises as a doctrine of ‘social order’ (of servitude to a master) (136). ‘“Learn not learn”’ is how Wang Pi, as quoted by Chan (note 121, 170), understands what he himself (Chan) translates as ‘He learns to be unlearned’ (section 64, 170). In unlearning one learns what cannot be taught: this is, we suggest, a remarkable definition of creativity, which also avoids falling into the trap of asserting a one-to-one equivalence between (unlearnt) originality and creativity, for there is both learning and creativity in this Taoist paradox of pedagogy. On this, Michael Meehan points out that ‘originality is an over-rated and misguided concept in many ways.’ (There is even a sense in which, through its deliberate repetition, The Lao Tzu teaches itself, traces over itself in ‘self-plagiarising’ fashion, as if it were reflecting on the re-tracings of calligraphic pedagogy. Chan notes just how deliberate this is: ‘Since in ancient times books consisted of bamboo or wooden slabs containing some twenty characters each, it was not easy for these sentences… to be added by mistake…. Repetitions are found in more than one place’ [note 102, 166].) Thinking of Kathy Acker too as a learner, Peter Wollen’s observation that she ‘incorporated calligraphy… in her books’ and ‘was deeply committed to [the] avant-garde tradition, a tradition which was much stronger in the visual arts’ creates a highly suggestive connection between Acker’s work and Taoism. The Taoist model for learning calligraphy as, precisely, visual art—in which copying subtends creativity—serves to shift Acker away from a Barthesian or Derridean framework and into a Taoist context in which adherence to another’s form (as ‘un-learnt learning’) creatively unravels so-called plagiarism from the inside. Acker’s conscious interest in calligraphy is shown by its prevalence in Blood and Guts in High School. Edward S. Robinson identifies this text as part of her ‘middle phase’, which ‘saw the introduction of illustrations and diagrams to create multimedia texts with a collage-like feel’ (154). To our knowledge, Acker never critically reflected upon her own calligraphic practices; perhaps if she had, she would have troubled what we see as a blindspot in critics’ interpretations of her work. To wit, whenever calligraphy is mentioned in criticism on Acker, it tends to be deployed merely as an example of her cut-up technique and never analysed for its effects in its own cultural, philosophical and material specificity. (Interestingly, if the words of Chinese photographer Liu Zheng are any guide, the Taoism we’re identifying in calligraphy has also worked its way into other forms of Chinese visual art: she refers to ‘loving photographic details and cameras’ with the very Taoist term, ‘lowly’ 低级 [Three Shadows Photography Art Centre 187].) Being ‘lowly’, ‘feminine’ or ‘underneath’ has power as a radical way of learning. We mentioned above that Taoism is very metaphoric. As the co-writer of this paper Cher Coad recalls from her calligraphy classes, students in China grow up with a metaphoric proverb clearly inspired by Lao Tzu’s Taoist philosophy of learning: ‘Learning shall never stop. Black comes from blue, but is more than the blue.’ ‘Black comes from blue, but is more than the blue.’ What could this mean? Before answering this question with recourse to two Western notions that, we hope, will further effect (building on Acker’s example) a rapprochement between Chinese and Western ways of thinking (be they nationally based or not), we reiterate that the infringement of Intellectual Property Rights (IPRs) in China should not be viewed only as an egregious denial of universally accepted law. Rather, whatever else it may be, we see it as the shadow in the commercial realm—mixed through with all the complexities of Chinese tradition, history and cultural difference, and most particularly of the Taoist strand within Confucianism—of the never-quite-perfect copying of calligraphic writing/remixing. More generally, the re-examination of stereotypical assumptions about Chinese culture cues a re-examination of the meaning behind the copying of products and technology in contemporary, industrialised China. So, ‘Black comes from blue, but is more than the blue.’ What is this ‘more than the blue of black’? Or put differently, why is calligraphic writing, as learnt from the master, always infused with the singular feelings of the (apprentice) writer? The work of Deleuze, Guattari and Claire Parnet provides two possible responses. In On the Line, Deleuze and Guattari (and Deleuze in co-authorship with Parnet) author a number of comments that support the conception we are attempting to develop concerning the lines of Chinese calligraphy. A line, Deleuze and Guattari suggest, is always a line of lines (‘Line of chance, line of hips, line of flight’ [57]). In the section of On the Line entitled ‘Politics’, Deleuze and Parnet outline the impossibility of any line being just one line. If life is a line (as it is said, you throw someone a life line), then ‘We have as many entangled lines in our lives as there are in the palm of a hand’ (71). Of any (hypothetical) single line it can be said that other lines emerge: ‘Black comes from blue, but is more than the blue.’ The feelings of the apprentice calligrapher (his/her multiple lines) emerge through the repeated copying of the lines and composed body movements of the master. The Deleuzean notion of repetition takes this idea further. Repetitive Chinese calligraphy clearly indexes what Claire Colebrook refers to as ‘Deleuze’s concept of eternal return. The only thing that is repeated or returns is difference; no two moments of life can be the same. By virtue of the flow of time, any repeated event is necessarily different (even if different only to the extent that it has a predecessor)’ (121). Now, it might be objected that Chinese calligraphic practices, because of the substantially ideographic nature of Chinese writing (see Kristeva 72-81), allow for material mutations that can find no purchase in Western, alphabetical systems of writing. But the materiality of time that Colebrook refers to as part of her engagement with Deleuzean non-repetitious (untimely) repetition guarantees the materiality of all modes of writing. Furthermore, Julia Kristeva notes that, with any form of language, one cannot leave ‘the realm of materialism’ (6) and Adrian Miles, in his article ‘Virtual Actual: Hypertext as Material Writing,’ sees the apparently very ‘unmaterial’ writing of hypertext ‘as an embodied activity that has its own particular affordances and possibilities—its own constraints and local actualisations’ (1-2). Calligraphic repetition of the master’s model creates the apprentice’s feelings as (inevitable) difference. In this then, the learning by the Chinese apprentice of the lines of the master’s calligraphy challenges international (both Western and non-Western) artists of writing to ‘remix remix’ as a matter—as a materialisation—of the line. Not the line as a self-identical entity of writing that only goes to make up writing more generally; rather, lines as a materialisation of lines within lines within lines. More self-reflexively, even the collaborative enterprise of this article, co-authored as it is by a woman of Chinese ethnicity and a white Australian man, suggests a remixing of writing through, beneath and over each other’s lines. Yun 韵 (‘composed body movements’) expresses and maximises Qing 情 (‘feelings’). Taoist ‘un-learnt learning’ generates remix as the singular creativity of the writer. Writers get into a blue with the line—paint it, black. Of course, these ideas won’t and shouldn’t make copyright infringement (or associated legalities) redundant notions. But in exposing the cultural relativisms often buried within the deployment of this and related terms, the idea of lines of lines far exceeds a merely formalistic practice (one cut off from the materialities of culture) and rather suggests a mode of non-repetitious repetition in contact with all of the elements of culture (of history, of society, of politics, of bodies…) wherever these may be found, and whatever their state of becoming. In this way, remix re-creates the depths of culture even as it stirs up its surfaces of writing. References Acker, Kathy. Blood and Guts in High School: A Novel. New York: Grove Press, 1978. Anna, Cara. ‘Microsoft Anti-Piracy Technology Upsets Users in China.’ The Seattle Times. 28 Oct. 2008 ‹http://seattletimes.com/html/businesstechnology/2008321919_webmsftchina28.html›. Barthes, Roland. ‘The Death of the Author.’ Barthes, Roland. Image-Music-Text. London: Fontana Press, 1977. 142-148. Chan, Wing-Tsit. A Source Book in Chinese Philosophy. Princeton, New Jersey: Princeton University Press, 1969. Colebrook, Claire. Gilles Deleuze. London: Routledge, 2002. Deleuze, Gilles, and Félix Guattari. On the Line. New York: Semiotext(e), 1983. Deleuze, Gilles, and Félix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Minneapolis: University of Minnesota Press, 1987. Derrida, Jacques. Of Grammatology. Baltimore: Johns Hopkins University Press, 1976. International Federation of the Phonographic Industry. ‘Recording Industry Steps Up Campaign against Internet Piracy in China.’ ifpi. 4 Feb. 2008 ‹http://www.ifpi.org/content/section_news/20080204.html›. Ivanhoe, Philip J. ‘Taoism’. The Cambridge Dictionary of Philosophy. Ed. Robert Audi. Cambridge: Cambridge University Press, 1995. 787. Iyengar, Jayanthi. ‘Intellectual Property Piracy Rocks China Boat.’ Asia Times Online. 16 Sept. 2004 ‹http://www.atimes.com/atimes/China/FI16Ad07.html›. Kristeva, Julia. Language: The Unknown: An Initiation into Linguistics. New York: Columbia University Press, 1989. Lort, Robert. ‘Kathy Acker (1944-1997).’ Jahsonic: A Vocabulary of Culture. 2003 ‹http://www.jahsonic.com/KathyAcker.html›. Meehan, Michael. ‘Week 5a: Playing with Genres.’ Lecture notes. Unit ALL705. Short Stories: Writers and Readers. Trimester 2. Melbourne: Deakin University, 2013. Miles, Adrian. ‘Virtual Actual: Hypertext as Material Writing.’ Studies in Material Thinking 1.2 (April 2008) ‹http://www.materialthinking.org/papers/29›. Robinson, Edward S. Shift Linguals: Cut-up Narratives from William S. Burroughs to the Present. New York: Editions Rodopi, 2011. Three Shadows Photography Art Centre. ‘Photography and Intimate Space Symposium.’ Conversations: Three Shadows Photography Art Centre’s 2007 Symposium Series. Ed. RongRong, inri, et al. Beijing: Three Shadows Press Limited, 2008. 179-191. Wollen, Peter. ‘Death (and Life) of the Author.’ London Review of Books 20.3 (5 Feb. 1998). ‹http://www.lrb.co.uk/v20/n03/peter-wollen/death-and-life-of-the-author›.
APA, Harvard, Vancouver, ISO, and other styles
35

Ruch, Adam, and Steve Collins. "Zoning Laws: Facebook and Google+." M/C Journal 14, no. 5 (October 18, 2011). http://dx.doi.org/10.5204/mcj.411.

Full text
Abstract:
As the single most successful social-networking Website to date, Facebook has caused a shift in both practice and perception of online socialisation, and its relationship to the offline world. While not the first online social networking service, Facebook’s user base dwarfs its nearest competitors. Mark Zuckerberg’s creation boasts more than 750 million users (Facebook). The currently ailing MySpace claimed a ceiling of 100 million users in 2006 (Cashmore). Further, the accuracy of this number has been contested due to a high proportion of fake or inactive accounts. Facebook by contrast, claims 50% of its user base logs in at least once a day (Facebook). The popular and mainstream uptake of Facebook has shifted social use of the Internet from various and fragmented niche groups towards a common hub or portal around which much everyday Internet use is centred. The implications are many, but this paper will focus on the progress what Mimi Marinucci terms the “Facebook effect” (70) and the evolution of lists as a filtering mechanism representing one’s social zones within Facebook. This is in part inspired by the launch of Google’s new social networking service Google+ which includes “circles” as a fundamental design feature for sorting contacts. Circles are an acknowledgement of the shortcomings of a single, unified friends list that defines the Facebook experience. These lists and circles are both manifestations of the same essential concept: our social lives are, in fact, divided into various zones not defined by an online/offline dichotomy, by fantasy role-play, deviant sexual practices, or other marginal or minority interests. What the lists and circles demonstrate is that even very common, mainstream people occupy different roles in everyday life, and that to be effective social tools, social networking sites must grant users control over their various identities and over who knows what about them. Even so, the very nature of computer-based social tools lead to problematic definitions of identities and relationships using discreet terms, in contrast to more fluid, performative constructions of an individual and their relations to others. Building the Monolith In 1995, Sherry Turkle wrote that “the Internet has become a significant social laboratory for experimenting with the constructions and reconstructions of self that characterize postmodern life” (180). Turkle describes the various deliberate acts of personnae creation possible online in contrast to earlier constraints placed upon the “cycling through different identities” (179). In the past, Turkle argues, “lifelong involvement with families and communities kept such cycling through under fairly stringent control” (180). In effect, Turkle was documenting the proliferation of identity games early adopters of Internet technologies played through various means. Much of what Turkle focused on were MUDs (Multi-User Dungeons) and MOOs (MUD Object Oriented), explicit play-spaces that encouraged identity-play of various kinds. Her contemporary Howard Rheingold focused on what may be described as the more “true to life” communities of the WELL (Whole Earth ‘Lectronic Link) (1–38). In particular, Rheingold explored a community established around the shared experience of parenting, especially of young children. While that community was not explicitly built on the notion of role-play, the parental identity was an important quality of community members. Unlike contemporary social media networks, these early communities were built on discreet platforms. MUDs, MOOs, Bulletin Board Systems, UseNet Groups and other early Internet communication platforms were generally hosted independently of one another, and even had to be dialled into via modem separately in some cases (such as the WELL). The Internet was a truly disparate entity in 1995. The discreetness of each community supported the cordoning off of individual roles or identities between them. Thus, an individual could quite easily be “Pete” a member of the parental WELL group and “Gorak the Destroyer,” a role-player on a fantasy MUD without the two roles ever being associated with each other. As Turkle points out, even within each MUD ample opportunity existed to play multiple characters (183–192). With only a screen name and associated description to identify an individual within the MUD environment, nothing technical existed to connect one player’s multiple identities, even within the same community. As the Internet has matured, however, the tendency has been shifting towards monolithic hubs, a notion of collecting all of “the Internet” together. From a purely technical and operational perspective, this has led to the emergence of the ISP (Internet service provider). Users can make a connection to one point, and then be connected to everything “on the Net” instead of individually dialling into servers and services one at a time as was the case in the early 1980s with companies such as Prodigy, the Source, CompuServe, and America On-Line (AOL). The early information service providers were largely walled gardens. A CompuServe user could only access information on the CompuServe network. Eventually the Internet became the network of choice and services migrated to it. Standards such as HTTP for Web page delivery and SMTP for email became established and dominate the Internet today. Technically, this has made the Internet much easier to use. The services that have developed on this more rationalised and unified platform have also tended toward monolithic, centralised architectures, despite the Internet’s apparent fundamental lack of a hierarchy. As the Internet replaced the closed networks, the wider Web of HTTP pages, forums, mailing lists and other forms of Internet communication and community thrived. Perhaps they required slightly more technological savvy than the carefully designed experience of walled-garden ISPs such as AOL, but these fora and IRC (Internet Relay Chat) rooms still provided the discreet environments within which to role-play. An individual could hold dozens of login names to as many different communities. These various niches could be simply hobby sites and forums where a user would deploy their identity as model train enthusiast, musician, or pet owner. They could also be explicitly about role-play, continuing the tradition of MUDs and MOOs into the new millennium. Pseudo- and polynymity were still very much part of the Internet experience. Even into the early parts of the so-called Web 2.0 explosion of more interactive Websites which allowed for easier dialog between site owner and viewer, a given identity would be very much tied to a single site, blog or even individual comments. There was no “single sign on” to link my thread from a music forum to the comments I made on a videogame blog to my aquarium photos at an image gallery site. Today, Facebook and Google, among others, seek to change all that. The Facebook Effect Working from a psychological background Turkle explored the multiplicity of online identities as a valuable learning, even therapeutic, experience. She assessed the experiences of individuals who were coming to terms with aspects of their own personalities, from simple shyness to exploring their sexuality. In “You Can’t Front on Facebook,” Mimi Marinucci summarizes an analysis of online behaviour by another psychologist, John Suler (67–70). Suler observed an “online disinhibition effect” characterised by users’ tendency to express themselves more openly online than offline (321). Awareness of this effect was drawn (no pun intended) into popular culture by cartoonist Mike Krahulik’s protagonist John Gabriel. Although Krahulik’s summation is straight to the point, Suler offers a more considered explanation. There are six general reasons for the online disinhibition effect: being anonymous, being invisible, the communications being out of sync, the strange sensation that a virtual interlocutor is all in the mind of the user, the general sense that the online world simply is not real and the minimisation of status and authority (321–325). Of the six, the notion of anonymity is most problematic, as briefly explored above in the case of AOL. The role of pseudonymity has been explored in more detail in Ruch, and will be considered with regard to Facebook and Google+ below. The Facebook effect, Marinucci argues, mitigates all six of these issues. Though Marinucci explains the mitigation of each factor individually, her final conclusion is the most compelling reason: “Facebook often facilitates what is best described as an integration of identities, and this integration of identities in turn functions as something of an inhibiting factor” (73). Ruch identifies this phenomenon as the “aggregation of identities” (219). Similarly, Brady Robards observes that “social network sites such as MySpace and Facebook collapse the entire array of social relationships into just one category, that of ‘Friend’” (20). Unlike earlier community sites, Ruch notes “Facebook rejects both the mythical anonymity of the Internet, but also the actual pseudo- or polynonymous potential of the technologies” (219). Essentially, Facebook works to bring the offline social world online, along with all the conventional baggage that accompanies the individual’s real-world social life. Facebook, and now Google+, present a hard, dichotomous approach to online identity: anonymous and authentic. Their socially networked individual is the “real” one, using a person’s given name, and bringing all (or as many as the sites can capture) their contacts from the offline world into the online one, regardless of context. The Facebook experience is one of “friending” everyone one has any social contact with into one homogeneous group. Not only is Facebook avoiding the multiple online identities that interested Turkle, but it is disregarding any multiplicity of identity anywhere, including any online/offline split. David Kirkpatrick reports Mark Zuckerberg’s rejection of this construction of identity is explained by his belief that “You have one identity … having two identities for yourself is an example of a lack of integrity” (199). Arguably, Zuckerberg’s calls for accountability through identity continue a perennial concern for anonymity online fuelled by “on the Internet no one knows you’re a dog” style moral panics. Over two decades ago Lindsy Van Gelder recounted the now infamous case of “Joan and Alex” (533) and Julian Dibbell recounted “a rape in cyberspace” (11). More recent anxieties concern the hacking escapades of Anonymous and LulzSec. Zuckerberg’s approach has been criticised by Christopher Poole, the founder of 4Chan—a bastion of Internet anonymity. During his keynote presentation at South by SouthWest 2011 Poole argued that Zuckerberg “equates anonymity with a lack of authenticity, almost a cowardice.” Yet in spite of these objections, Facebook has mainstream appeal. From a social constructivist perspective, this approach to identity would be satisfying the (perceived?) need for a mainstream, context-free, general social space online to cater for the hundreds of millions of people who now use the Internet. There is no specific, pre-defined reason to join Facebook in the way there is a particular reason to join a heavy metal music message board. Facebook is catering to the need to bring “real” social life online generally, with “real” in this case meaning “offline and pre-existing.” Very real risks of missing “real life” social events (engagements, new babies, party invitations etc) that were shared primarily via Facebook became salient to large groups of individuals not consciously concerned with some particular facet of identity performance. The commercial imperatives towards monolithic Internet and identity are obvious. Given that both Facebook and Google+ are in the business of facilitating the sale of advertising, their core business value is the demographic information they can sell to various companies for target advertising. Knowing a user’s individual identity and tastes is extremely important to those in the business of selling consumers what they currently want as well as predicting their future desires. The problem with this is the dawning realisation that even for the average person, role-playing is part of everyday life. We simply aren’t the same person in all contexts. None of the roles we play need to be particularly scandalous for this to be true, but we have different comfort zones with people that are fuelled by context. Suler proposes and Marinucci confirms that inhibition may be just as much part of our authentic self as the uninhibited expression experienced in more anonymous circumstances. Further, different contexts will inform what we inhibit and what we express. It is not as though there is a simple binary between two different groups and two different personal characteristics to oscillate between. The inhibited personnae one occupies at one’s grandmother’s home is a different inhibited self one plays at a job interview or in a heated discussion with faculty members at a university. One is politeness, the second professionalism, the third scholarly—yet they all restrain the individual in different ways. The Importance of Control over Circles Google+ is Google’s latest foray into the social networking arena. Its previous ventures Orkut and Google Buzz did not fare well, both were variously marred by legal issues concerning privacy, security, SPAM and hate groups. Buzz in particular fell afoul of associating Google accounts with users” real life identities, and (as noted earlier), all the baggage that comes with it. “One user blogged about how Buzz automatically added her abusive ex-boyfriend as a follower and exposed her communications with a current partner to him. Other bloggers commented that repressive governments in countries such as China or Iran could use Buzz to expose dissidents” (Novak). Google+ takes a different approach to its predecessors and its main rival, Facebook. Facebook allows for the organisation of “friends” into lists. Individuals can span more than one list. This is an exercise analogous to what Erving Goffman refers to as “audience segregation” (139). According to the site’s own statistics the average Facebook user has 130 friends, we anticipate it would be time-consuming to organise one’s friends according to real life social contexts. Yet without such organisation, Facebook overlooks the social structures and concomitant behaviours inherent in everyday life. Even broad groups offer little assistance. For example, an academic’s “Work People” list may include the Head of Department as well as numerous other lecturers with whom a workspace is shared. There are things one might share with immediate colleagues that should not be shared with the Head of Department. As Goffman states, “when audience segregation fails and an outsider happens upon a performance that was not meant for him, difficult problems in impression management arise” (139). By homogenising “friends” and social contexts users are either inhibited or run the risk of some future awkward encounters. Google+ utilises “circles” as its method for organising contacts. The graphical user interface is intuitive, facilitated by an easy drag and drop function. Use of “circles” already exists in the vocabulary used to describe our social structures. “List” by contrast reduces the subject matter to simple data. The utility of Facebook’s friends lists is hindered by usability issues—an unintuitive and convoluted process that was added to Facebook well after its launch, perhaps a reaction to privacy concerns rather than a genuine attempt to emulate social organisation. For a cogent breakdown of these technical and design problems see Augusto Sellhorn. Organising friends into lists is a function offered by Facebook, but Google+ takes a different approach: organising friends in circles is a central feature; the whole experience is centred around attempting to mirror the social relations of real life. Google’s promotional video explains the centrality of emulating “real life relationships” (Google). Effectively, Facebook and Google+ have adopted two different systemic approaches to dealing with the same issue. Facebook places the burden of organising a homogeneous mass of “friends” into lists on the user as an afterthought of connecting with another user. In contrast, Google+ builds organisation into the act of connecting. Whilst Google+’s approach is more intuitive and designed to facilitate social networking that more accurately reflects how real life social relationships are structured, it suffers from forcing direct correlation between an account and the account holder. That is, use of Google+ mandates bringing online the offline. Google+ operates a real names policy and on the weekend of 23 July 2011 suspended a number of accounts for violation of Google’s Community Standards. A suspension notice posted by Violet Blue reads: “After reviewing your profile, we determined the name you provided violates our Community Standards.” Open Source technologist Kirrily Robert polled 119 Google+ users about their experiences with the real names policy. The results posted to her on blog reveal that users desire pseudonymity, many for reasons of privacy and/or safety rather than the lack of integrity thought by Zuckerberg. boyd argues that Google’s real names policy is an abuse of power and poses danger to those users employing “nicks” for reasons including being a government employment or the victim of stalking, rape or domestic abuse. A comprehensive list of those at risk has been posted to the Geek Feminism Wiki (ironically, the Wiki utilises “Connect”, Facebook’s attempt at a single sign on solution for the Web that connects users’ movements with their Facebook profile). Facebook has a culture of real names stemming from its early adopters drawn from trusted communities, and this culture became a norm for that service (boyd). But as boyd also points out, “[r]eal names are by no means universal on Facebook.” Google+ demands real names, a demand justified by rhetoric of designing a social networking system that is more like real life. “Real”, in this case, is represented by one’s given name—irrespective of the authenticity of one’s pseudonym or the complications and dangers of using one’s given name. Conclusion There is a multiplicity of issues concerning social networks and identities, privacy and safety. This paper has outlined the challenges involved in moving real life to the online environment and the contests in trying to designate zones of social context. Where some earlier research into the social Internet has had a positive (even utopian) feel, the contemporary Internet is increasingly influenced by powerful and competing corporations. As a result, the experience of the Internet is not necessarily as flexible as Turkle or Rheingold might have envisioned. Rather than conducting identity experimentation or exercising multiple personnae, we are increasingly obligated to perform identity as it is defined by the monolithic service providers such as Facebook and Google+. This is not purely an indictment of Facebook or Google’s corporate drive, though they are obviously implicated, but has as much to do with the new social practice of “being online.” So, while there are myriad benefits to participating in this new social context, as Poole noted, the “cost of failure is really high when you’re contributing as yourself.” Areas for further exploration include the implications of Facebook positioning itself as a general-purpose user authentication tool whereby users can log into a wide array of Websites using their Facebook credentials. If Google were to take a similar action the implications would be even more convoluted, given the range of other services Google offers, from GMail to the Google Checkout payment service. While the monolithic centralisation of these services will have obvious benefits, there will be many more subtle problems which must be addressed. References Blue, Violet. “Google Plus Deleting Accounts en Masse: No Clear Answers.” zdnet.com (2011). 10 Aug. 2011 ‹http://www.zdnet.com/blog/violetblue/google-plus-deleting-accounts-en-masse-no-clear-answers/56›. boyd, danah. “Real Names Policies Are an Abuse of Power.” zephoria.org (2011). 10 Aug. 2011 ‹http://www.zephoria.org/thoughts/archives/2011/08/04/real-names.html›. Cashmore, Pete. “MySpace Hits 100 Million Accounts.” mashable.com (2006). 10 Aug. 2011 ‹http://mashable.com/2006/08/09/myspace-hits-100-million-accounts›. Dibble, Julian. My Tiny Life: Crime and Passion in a Virtual World. New York: Henry Holt & Company, 1998. Facebook. “Fact Sheet.” Facebook (2011). 10 Aug. 2011 ‹http://www.facebook.com/press/info.php?statistic›. Geek Feminism Wiki. “Who Is Harmed by a Real Names Policy?” 2011. 10 Aug. 2011 ‹http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy› Goffman, Erving. The Presentation of Self in Everyday Life. London: Penguin, 1959. Google. “The Google+ Project: Explore Circles.” Youtube.com (2011). 10 Aug. 2011 ‹http://www.youtube.com/watch?v=ocPeAdpe_A8›. Kirkpatrick, David. The Facebook Effect. New York: Simon & Schuster, 2010. Marinucci, Mimi. “You Can’t Front on Facebook.” Facebook and Philosophy. Ed. Dylan Wittkower. Chicago & La Salle, Illinois: Open Court, 2010. 65–74. Novak, Peter. “Privacy Commissioner Reviewing Google Buzz.” CBC News: Technology and Science (2010). 10 Aug. 2011 ‹http://www.cbc.ca/news/technology/story/2010/02/16/google-buzz-privacy.html›. Poole, Christopher. Keynote presentation. South by SouthWest. Texas, Austin, 2011. Robards, Brady. “Negotiating Identity and Integrity on Social Network Sites for Educators.” International Journal for Educational Integrity 6.2 (2010): 19–23. Robert, Kirrily. “Preliminary Results of My Survey of Suspended Google Accounts.” 2011. 10 Aug. 2011 ‹http://infotrope.net/2011/07/25/preliminary-results-of-my-survey-of-suspended-google-accounts/›. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper Perennial, 1993. Ruch, Adam. “The Decline of Pseudonymity.” Posthumanity. Eds. Adam Ruch and Ewan Kirkland. Oxford: Inter-Disciplinary.net Press, 2010: 211–220. Sellhorn, Augusto. “Facebook Friend Lists Suck When Compared to Google+ Circles.” sellmic.com (2011). 10 Aug. 2011 ‹http://sellmic.com/blog/2011/07/01/facebook-friend-lists-suck-when-compared-to-googleplus-circles›. Suler, John. “The Online Disinhibition Effect.” CyberPsychology and Behavior 7 (2004): 321–326. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon & Schuster, 1995. Van Gelder, Lindsy. “The Strange Case of the Electronic Lover.” Computerization and Controversy: Value Conflicts and Social Choices Ed. Rob Kling. New York: Academic Press, 1996: 533–46.
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Jin, Tommaso Barbetta, and Crystal Abidin. "Influencers, Brands, and Pivots in the Time of COVID-19." M/C Journal 23, no. 6 (November 28, 2020). http://dx.doi.org/10.5204/mcj.2729.

Full text
Abstract:
In light of the COVID-19 pandemic, where income has become precarious and Internet use has soared, the influencer industry has to strategise over new ways to sustain viewer attention, maintain income flows, and innovate around formats and messaging, to avoid being excluded from continued commercial possibilities. In this article, we review the press coverage of the influencer markets in Australia, Japan, and Korea, and consider how the industry has been attempting to navigate their way through the pandemic through deviations and detours. We consider the narratives and groups of influencers who have been included and excluded in shaping the discourse about influencer strategies in the time of COVID-19. The distinction between inclusion and exclusion has been a crucial mechanism to maintain the social normativity, constructed with gender, sexuality, wealth, able-ness, education, age, and so on (Stäheli and Stichweh, par. 3; Hall and Du Gay 5; Bourdieu 162). The influencer industry is the epitome of where the inclusion-exclusion binary is noticeable. It has been criticised for serving as a locus where social norms, such as femininity and middle-class identities, are crystallised and endorsed in the form of visibility and attention (Duffy 234; Abidin 122). Many are concerned about the global expansion of the influencer industry, in which young generations are led to clickbait and sensational content and normative ways of living, in order to be “included” by their peer groups and communities and to avoid being “excluded” (Cavanagh). However, COVID-19 has changed our understanding of the “normal”: people staying home, eschewing social communications, and turning more to the online where they can feel “virtually” connected (Lu et al. 15). The influencer industry also has been affected by COVID-19, since the images of normativity cannot be curated and presented as they used to be. In this situation, it is questionable how the influencer industry that pivots on the inclusion-exclusion binary is adjusting to the “new normal” brought by COVID-19, and how the binary is challenged or maintained, especially by exploring the continuities and discontinuities in industry. Methodology This cross-cultural study draws from a corpus of articles from Australia, Japan, and Korea published between January and May 2020, to investigate how local news outlets portrayed the contingencies undergone by the influencer industry, and what narratives or groups of influencers were excluded in the process. An extended discussion of our methodology has been published in an earlier article (Abidin et al. 5-7). Using the top ranked search engine of each country (Google for Australia and Japan, Naver for Korea), we compiled search results of news articles from the first ten pages (ten results per page) of each search, prioritising reputable news sites over infotainment sites, and by using targeted keyword searches: for Australia: ‘influencer’ and ‘Australia’ and ‘COVID-19’, ‘coronavirus’, ‘pandemic’; for Japan: ‘インフルエンサー’ (influensā) and ‘コロナ’ (korona), ‘新型コロ ナ’ (shin-gata korona), ‘コロナ禍’ (korona-ka); for Korea: ‘인플루언서’ (Influencer) and ‘코로나’ (corona) and ‘팬데믹’ (pandemic). 111 articles were collected (42 for Australia, 31 for Japan, 38 for Korea). In this article, we focus on a subset of 60 articles and adopt a grounded theory approach (Glaser and Strauss 5) to manually conduct open, axial, and close coding of their headline and body text. Each headline was translated by the authors and coded for a primary and secondary ‘open code’ across seven categories: Income loss, Backlash, COVID-19 campaign, Misinformation, Influencer strategy, Industry shifts, and Brand leverage. The body text was coded in a similar manner to indicate all the relevant open codes covered in the article. In this article, we focus on the last two open codes that illustrate how brands have been working with influencers to tide through COVID-19, and what the overall industry shifts were on the three Asia-Pacific country markets. Table 1 (see Appendix) indicates a full list of our coding schema. Inclusion of the Normal in Shifting Brand Preferences In this section, we consider two main shifts in brand preferences: an increased demand for influencers, and a reliance on influencers to boost viewer/consumer traffic. We found that by expanding digital marketing through Influencers, companies attempted to secure a so-called “new normal” during the pandemic. However, their marketing strategies tended to reiterate the existing inclusion-exclusion binary and exacerbated the lack of diversity and inequality in the industry. Increased Demand for Influencers Across the three country markets, brokers and clients in the influencer industry increased their demand for influencers’ services and expertise to sustain businesses via advertising in the “aftermath of COVID-19”, as they were deemed to be more cost-efficient “viral marketing on social media” (Yoo). By outsourcing content production to influencers who could still produce content independently from their homes (Cheik-Hussein) and who engage with audiences with their “interactive communication ability” (S. Kim and Cho), many companies attempted to continue their business and maintain their relationships with prospective consumers (Forlani). As the newly enforced social distancing measures have also interrupted face-to-face contact opportunities, the mass pivot towards influencers for digital marketing is perceived to further professionalise the industry via competition and quality control in all three countries (Wilkinson; S. Kim and Cho; Yadorigi). By integrating these online personae of influencers into their marketing, the business side of each country is moving towards the new normal in different manners. In Australia, businesses launched campaigns showcasing athlete influencers engaging in meaningful activities at home (e.g. yoga, cooking), and brands and companies reorganised their marketing strategies to highlight social responsibilities (Moore). On the other hand, for some companies in the Japanese market, the disruption from the pandemic was a rare opportunity to build connections and work with “famous” and “prominent” influencers (Yadorigi), otherwise unavailable and unwilling to work for smaller campaigns during regular periods of an intensely competitive market. In Korea, by emphasising their creative ability, influencers progressed from being “mere PR tools” to becoming “active economic subjects of production” who now can play a key role in product planning for clients, mediating companies and consumers (S. Kim and Cho). The underpinning premise here is that influencers are tech-savvy and therefore competent in creating media content, forging relationships with people, and communicating with them “virtually” through social media. Reliance on Influencers to Boost Viewer/Consumer Traffic Across several industry verticals, brands relied on influencers to boost viewership and consumer traffic on their digital estates and portals, on the premise that influencers work in line with the attention economy (Duffy 234). The fashion industry’s expansion of influencer marketing was noticeable in this manner. For instance, Korean department store chains (e.g. Lotte) invited influencers to “no-audience live fashion shows” to attract viewership and advertise fashion goods through the influencers’ social media (Y. Kim), and Australian swimwear brand Vitamin A partnered with influencers to launch online contests to invite engagement and purchases on their online stores (Moore). Like most industries where aspirational middle-class lifestyles are emphasised, the travel industry also extended partnerships with their current repertoire of influencers or international influencers in order to plan for the post-COVID-19 market recovery and post-border reopening tourism boom (Moore; Yamatogokoro; J. Lee). By extension, brands without any prior relationships with influencers, whcih did not have such histories to draw on, were likely to have struggled to produce new influencer content. Such brands could thus only rely on hiring influencers specifically to leverage their follower base. The increasing demand for influencers in industries like fashion, food, and travel is especially notable. In the attention economy where (media) visibility can be obtained and maintained (Duffy 121), media users practice “visibility labor” to curate their media personas and portray branding themselves as arbiters of good taste (Abidin 122). As such, influencers in genres where personal taste can be visibly presented—e.g. fashion, travel, F&B—seem to have emerged from the economic slump with a head start, especially given their dominance on the highly visual platform of Instagram. Our analysis shows that media coverage during COVID-19 repeated the discursive correlation between influencers and such hyper-visible or visually-oriented industries. However, this dominant discourse about hyper-visible influencers and the gendered genres of their work has ultimately reinforced norms of self-presentation in the industry—e.g. being feminine, young, beautiful, luxurious—while those who deviate from such norms seem to be marginalised and excluded in media coverage and economic opportunities during the pandemic cycle. Including Newness by Shifting Format Preferences We observed the inclusion of newness in the influencer scenes in all three countries. By shifting to new formats, the previously excluded and lesser seen aspects of our lives—such as home-based content—began to be integrated into the “new normal”. There were four main shifts in format preferences, wherein influencers pivoted to home-made content, where livestreaming is the new dominant format of content, and where followers preferred more casual influencer content. Influencers Have Pivoted to Home-Made Content In all three country markets, influencers have pivoted to generating content based on life at home and ideas of domesticity. These public displays of homely life corresponded with the sudden occurrence of being wired to the Internet all day—also known as “LAN cable life” (랜선라이프, lan-seon life) in the Korean media—which influencers were chiefly responsible for pioneering (B. Kim). While some genres like gaming and esports were less impacted upon by the pivot, given that the nature and production of the content has always been confined to a desktop at home (Cheik-Hussein), pivots occurred for the likes of outdoor brands (Moore), the culinary industry (Dean), and fitness and workout brands (Perelli and Whateley). In Korea, new trends such as “home cafes” (B. Kim) and DIY coffees—like the infamous “Dalgona-Coffee” that was first introduced by a Korean YouTuber 뚤기 (ddulgi)—went viral on social media across the globe (Makalintal). In Japan, the spike in influencers showcasing at-home activities (Hayama) also encouraged mainstream TV celebrities to open social media accounts explicitly to do the same (Kamada). In light of these trends, the largest Multi-Channel Network (MCN) in Japan, UUUM, partnered with one of the country’s largest entertainment industries, Yoshimoto Kogyo, to assist the latter’s comedian talents to establish a digital video presence—a trend that was also observed in Korea (Koo), further underscoring the ubiquity of influencer practices in the time of COVID-19. Along with those creators who were already producing content in a domestic environment before COVID-19, it was the influencers with the time and resources to quickly pivot to home-made content who profited the most from the spike in Internet traffic during the pandemic (Noshita). The benefits of this boost in traffic were far from equal. For instance, many others who had to turn to makeshift work for income, and those who did not have conducive living situations to produce content at home, were likely to be disadvantaged. Livestreaming Is the New Dominant Format Amidst the many new content formats to be popularised during COVID-19, livestreaming was unanimously the most prolific. In Korea, influencers were credited for the mainstreaming and demotising (Y. Kim) of livestreaming for “live commerce” through real-time advertorials and online purchases. Livestreaming influencers were solicited specifically to keep international markets continuously interested in Korean products and cultures (Oh), and livestreaming was underscored as a main economic driver for shaping a “post-COVID-19” society (Y. Kim). In Australia, livestreaming was noted among art (Dean) and fitness influencers (Dean), and in Japan it began to be adopted among major fashion brands like Prada and Chloe (Saito). While the Australian coverage included livestreaming on platforms such as Instagram, Facebook, YouTube, Twitch, and Douyin (Cheik-Hussein; Perelli and Whateley; Webb), the Japanese coverage highlighted the potential for Instagram Live to target young audiences, increase feelings of “trustworthiness”, and increase sales via word-of-mouth advertising (Saito). In light of reduced client campaigns, influencers in Australia had also used livestreaming to provide online consulting, teaching, and coaching (Perelli and Whateley), and to partner with brands to provide masterclasses and webinars (Sanders). In this era, influencers in genres and verticals that had already adopted streaming as a normative practice—e.g. gaming and lifestyle performances—were likely to have had an edge over others, while other genres were excluded from this economic silver lining. Followers Prefer More Casual Influencer Content In general, all country markets report followers preferring more casual influencer content. In Japan, this was offered via the potential of livestreaming to deliver more “raw” feelings (Saito), while in Australia this was conveyed through specific content genres like “mental or physical health battles” (Moore); specific aesthetic choices like appearing “messier”, less “curated”, and “more unfiltered” (Wilkinson); and the growing use of specific emergent platforms like TikTok (Dean, Forlani, Perelli, and Whateley). In Korea, influencers in the photography, travel, and book genres were celebrated for their new provision of pseudo-experiences during COVID-19-imposed social distancing (Kang). Influencers on Instagram also spearheaded new social media trends, like the “#wheredoyouwannago_challenge” where Instagram users photoshopped themselves into images of famous tourist spots around the world (Kang). Conclusion In our study of news articles on the impact of COVID-19 on the Australian, Japanese, and Korean influencer industries during the first wave of the pandemic, influencer marketing was primed to be the dominant and default mode of advertising and communication in the post-COVID-19 era (Tate). In general, specific industry verticals that relied more on visual portrayals of lifestyles and consumption—e.g. fashion, F&B, travel—to continue partaking in economic recovery efforts. However, given the gendered genre norms in the industry, this meant that influencers who were predominantly feminine, young, beautiful, and luxurious experienced more opportunity over others. Further, influencers who did not have the resources or skills to pivot to the “new normals” of creating content from home, engaging in livestreaming, and performing their personae more casually were excluded from these new economic opportunities. Across the countries, there were minor differences in the overall perception of influencers. There was an increasingly positive perception of influencers in Japan and Korea, due to new norms and pandemic-related opportunities in the media ecology: in Korea, influencers were considered to be the “vanguard of growing media commerce in the post-pandemonium era” (S. Kim and Cho), and in Japan, influencers were identified as critical vehicles during a more general consumer shift from traditional media to social media, as TV watching time is reduced and home-based e-commerce purchases are increasingly popular (Yadogiri). However, in Australia, in light of the sudden influx of influencer marketing strategies during COVID-19, the market seemed to be saturated more quickly: brands were beginning to question the efficiency of influencers, cautioned that their impact has not been completely proven for all industry verticals (Stephens), and have also begun to reduce commissions for influencer affiliate programmes as a cost-cutting measure (Perelli and Whateley). While news reports on these three markets indicate that there is some level of growth and expansion for various influencers and brands, such opportunities were not experienced equally, with some genres and demographics of influencers and businesses being excluded from pandemic-related pivots and silver linings. Further, in light of the increasing commercial opportunities, pressure for more regulations also emerged; for example, the Korean government announced new investigations into tax avoidance (Han). Not backed up by talent agencies or MCNs, independent influencers are likely to be more exposed to the disciplinary power of shifting regulatory practices, a condition which might have hindered their attempt at diversifying their income streams during the pandemic. Thus, while it is tempting to focus on the privileged and novel influencers who have managed to cling on to some measure of success during the pandemic, scholarly attention should also remember those who are being excluded and left behind, lest generations, cohorts, genres, or subcultures of the once-vibrant influencer industry fade into oblivion. References Abidin, Crystal. “#In$tagLam: Instagram as a repository of taste, a burgeoning marketplace, a war of eyeballs.” Mobile Media Making in an Age of Smartphones. Eds. Marsha Berry and Max Schleser. New York: Palgrave Pivot, 2014. 119-128. <https://doi.org/10.1057/9781137469816_11>. Abidin, Crystal, Jin Lee, Tommaso Barbetta, and Miao Weishan. “Influencers and COVID-19: Reviewing Key Issues in Press Coverage across Australia, China, Japan, and South Korea.” Media International Australia (2020). <https://journals.sagepub.com/doi/10.1177/1329878X20959838>. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, Mass.: Harvard UP, 1984. Cavanagh, Emily. “‘Snapchat Dysmorphia’ Is Leading Teens to Get Plastic Surgery Based on Unrealistic Filters.” Business Inside 9 Jan. 2020. <https://www.insider.com/snapchat-dysmorphia-low-self-esteem-teenagers-2020-1>. Cheik-Hussein, Mariam. “Brands Turn to Gaming Influencers as Lockdown Gives Sector Boost.” Ad News 21 Apr. 2020. <https://www.adnews.com.au/news/brands-turn-to-gaming-influencers-as-lockdown-gives-sector-boost>. Dean, Lucy. “Coronavirus Is Changing the Influencer World.” Yahoo! Finance. 3 Apr. 2020. <https://au.finance.yahoo.com/news/coronavirus-changing-social-media-225332357.html>. Duffy, Brooke Erin. (Not) Getting Paid to Do What You Love: Gender, Social Media, and Aspirational Work. Cambridge: Yale University Press, 2017. Forlani, Cristina. “What Brands Can Learn from Influencers to Remain Relevant Post-COVID-19.” We Are Social 13 May 2020. <https://wearesocial.com/au/blog/2020/05/what-brands-can-learn-from-influencers-to-remain-relevant-post-covid-19>. Glaser, Barney G., and Anselm L. Strauss. The Discovery of Grounded Theory: Strategies for Qualitative Research. Chicago: Aldine Publishing Company. 1967. Hall, Stuart, and Paul Du Gay. Questions of Cultural Identity. Sage, 1996. Han, Hyojung. “국세청, 20만명 팔로워 가진 유명인 등 고소득 크리에이터 ‘해외광고대가검증’ 나섰다 [National Tax Service Investigates High-Profile Creators’ Income Overseas].” Sejung Ilbo 24 May 2020. <http://www.sejungilbo.com/news/articleView.html?idxno=21347>. Hayama, Riho. “コロナがインスタグラムとインフルエンサーに与える影響 [The Influence of Covid on Instagram and Influencers].” Note 19 May 2020. <https://note.com/hayamari/n/n697a0ec332ee>. Kamada, Kazuki. “動画クリエイターが「公人」に。2020年はインフルエンサー時代の転換点となるか(UUUM鎌田和樹)[Video Creators as Public Figures: Will 2020 Represent a Turning Point for Influencers? (UUUM’s Kamada Kazuki)].” QJweb 8 May 2020. <https://qjweb.jp/journal/18499/>. Kang, Jumi. "[아무튼, 주말] 황금연휴라도 아직은… 사람 드문 야외, 여행 책방, 랜선 여행으로 짧은 여행 즐겨볼까 [[Weekend Anyway] Although It’s Holiday Season, Still... How about Joining the Holiday with a Short LAN-Cable Travel, Travelling Bookstores, and Travelling to Countryside?].” Chosun Daily 25 Apr. 2020. <http://news.chosun.com/site/data/html_dir/2020/04/24/2020042403600.html?utm_source=naver&utm_medium=original&utm_campaign=news>. Kim, Bokyung. “[코로나뉴트렌드] ‘집콕 3개월’...집밖에 안나가도 살 수 있어서 신기 [[COVID-19 New Trend] Staying Home for 3 Months: Don’t Need to Go Outside].” Yonhap News 26 Apr. 2020. <https://www.yna.co.kr/view/AKR20200425045300030?input=1195m>. Kim, Sanghee, and Chulhee Cho. "코로나 이후 인플루언서 경제·사회 영향력 더 커져 [Influencers' Socioeconomic Impact Increased in Covid-19 Era].” MoneyToday 28 Apr. 2020. <https://news.mt.co.kr/mtview.php?no=2020042614390682882>. Kim, Young-Eun. "[포스트 코로나 유망 비즈니스 22]실시간 방송으로 경험하고 손가락으로 산다…판 커진 라이브 커머스 [[Growing Business 22 in Post-COVID-19] Experience with Livestreaming and Purchase with Fingers].” Hankyung Business 19 May 2020. <https://news.naver.com/main/read.nhn?mode=LSD&mid=sec&sid1=101&oid=050&aid=0000053676>. Koo, Jayoon. "코로나 언택트시대… 유튜브 업계는 '승승장구' [Fast-Growing Youtube Industry in the Covid-19 Untact Era].” Financial News 24 Apr. 2020. <https://www.fnnews.com/news/202004241650545778>. Lu, Li, et al. “Forum: COVID-19 Dispatches.” Cultural Studies ↔ Critical Methodologies, Sep. 2020. DOI: 10.1177/1532708620953190. Lee, Jihye. “[포스트 코로나] ‘일상을 여행처럼, 안전을 일상처럼’...해외 대신 국내 활성화 예고 [[Post-COVID-19] ‘Daily Life as Travelling, Safety as Daily Life’... Domestic Travel Expected to Grow].” E-News Today 26 May 2020. <http://www.enewstoday.co.kr/news/articleView.html?idxno=1389486>. Makalintal, Bettina. "People All over the World Are Making Frothy 'Dalgona' Coffee, Thanks to Quarantine." Vice 20 Mar. 2020. <https://www.vice.com/en_us/article/bvgbk8/people-all-over-the-world-are-making-frothy-dalgona-coffee-thanks-to-quarantine>. Moore, Kaleigh. “Influencers’ Currency Has Increased during Covid-19 Crisis.” Vogue Business 13 Apr. 2020. <https://www.voguebusiness.com/companies/influencers-currency-has-increased-during-covid-19-crisis-marketing>. Noshita, Tomoyuki. “コロナ禍で変わるインフルエンサー活動と企業ニーズ[インタビュー][Influencer Activity and Corporate Needs Changed by the Corona Disaster].” ExchangeWire 26 May 2020. <https://www.exchangewire.jp/2020/05/26/trenders-instagram/>. Oh, Eun-seo. "코트라, 중국·대만 6곳에 중소기업 온라인마케팅 전용 'K스튜디오' 오픈 [KOTRA Launches 6 ‘K-Studios’ in China and Taiwan for Online Marketing for SME].” Global Economics 16 May 2020. <https://news.g-enews.com/ko-kr/news/article/news_all/2020050611155064653b88961c8c_1/article.html?md=20200506141610_R>. Perelli, Amanda, and Dan Whateley. “How the Coronavirus Is Changing the Influencer Business, According to Marketers and Top Instagram and YouTube Stars.” Business Insider Australia 22 Mar. 2020. <https://www.businessinsider.com.au/how-coronavirus-is-changing-influencer-marketing-creator-industry-2020-3?r=US&IR=T>. Reid, Elise. “COVID-19 Could See Advertisers Move from Influencers to Streaming Sites.” Channel News 27 Apr. 2020. <https://www.channelnews.com.au/covid-19-could-see-advertisers-move-from-influencers-to-streaming-sites/>. Rowell, Andrew. “Coronavirus: Big Tobacco Sees an Opportunity in the Pandemic.” The Conversation 14 May 2020. <https://theconversation.com/coronavirus-big-tobacco-sees-an-opportunity-in-the-pandemic-138188>. Saito, Yurika. “コロナ禍で急増の「インスタライブ」。誰でも簡単に出来る視聴・配信方法 [The Boom of Instagram Live during the Pandemic: Anyone Can Easily Watch and Stream Content].” Forbes Japan 19 May 2020. <https://forbesjapan.com/articles/detail/34475>. Sanders, Krystal. “Perth Influencer Brooke Vulinovich Says Instagram Has Become ‘Lifeline’ for Small Businesses.” Perth Now 29 Apr. 2020. <https://www.perthnow.com.au/news/coronavirus/perth-influencer-brooke-vulinovich-says-instagram-has-become-lifeline-for-small-businesses-ng-b881533823z>. Stäheli, Urs, and Rudolf Stichweh. "Introduction: Inclusion/Exclusion–Systems Theoretical and Poststructuralist Perspectives." Inclusion/Exclusion and Socio-Cultural Identities, 2002. Stephens, Lee. “Why Influencer Marketing Will Win after COVID-19.” Ad News 9 Apr. 2020. <https://www.adnews.com.au/opinion/why-influencer-marketing-will-win-after-covid-19>. Tate, Andrew. “How Vanity Viral Marketing Ran Headlong into Coronavirus.” The New Daily 29 Apr. 2020. <https://thenewdaily.com.au/news/coronavirus/2020/04/28/how-vanity-viral-marketing-ran-headlong-into-corornavirus/>. Webb, Loren. “Brands Pivot Their Marketing Strategies in the Wake of the Coronavirus.” Dynamic Business 13 Mar. 2020. <https://dynamicbusiness.com.au/topics/news/brands-pivot-their-marketing-strategies-in-the-wake-of-the-coronavirus.html>. Wilkinson, Zoe. “Head to Head: Will the Economy of Celebrity and Influencer Endorsement Recover after the COVID-19 Crisis?” Mumbrella 28 Apr. 2020. <https://mumbrella.com.au/head-to-head-will-the-economy-of-celebrity-and-influencer-endorsement-recover-after-the-covid-19-crisis-625987>. Yadorigi, Yuki. “【第7回】コロナ禍のなかで生まれた光明、新たなアプローチによるコミュニケーション [Episode 7: A Light Emerged during the Corona Crisis, a Communication Based on a New Approach].” C-Station 28 Apr. 2020. <https://c.kodansha.net/news/detail/36286/>. Yamatogokoro. “アフターコロナの観光・インバウンドを考えるVol.4世界の観光業の取り組みから学ぶ、自治体・DMOが今まさにすべきこと [After Corona Tourism and Inbound Tourism Vol. 4: What Municipalities and DMOs Should Do Right Now to Learn from Global Tourism Initiatives].” Yamatogokoro 19 May 2020. Yoo, Hwan-In. "코로나 여파, 연예인·인플루언서 마케팅 활발 [COVID-19, Star-Influencer Marketing Becomes Active].” SkyDaily 19 May 2020. <http://www.skyedaily.com/news/news_view.html?ID=104772>. Appendix Open codes Axial codes 1) Brand leverage Targeting investors Targeting influencers Targeting new digital media formats Targeting consumers/customers/viewers Types of brands/clients 2) Industry shifts Brand preferences Content production Content format Follower preferences Type of Influencers Table 1: Full list of codes from our analysis
APA, Harvard, Vancouver, ISO, and other styles
37

Shaw, Janice Marion. "The Curious Transformation of Boy to Computer." M/C Journal 19, no. 4 (August 31, 2016). http://dx.doi.org/10.5204/mcj.1130.

Full text
Abstract:
Mark Haddon’s The Curious Incident of the Dog in the Night-Time has achieved success as “the new Rain Man” or “the new definitive, popular account of the autistic condition” (Burks-Abbott 294). Integral to its favourable reception is the way it conflates the autistic main character, the fifteen-year-old narrator Christopher Boone, with the savant, or individual who exhibits both neurological problems and giftedness, thereby engaging with the way autism is presented in popular culture. In a variety of contemporary films and television series, autism has been transformed from a disability to a form of giftedness by relating it to abilities associated in contemporary media with a genius, in particular by invoking the metaphor of an autistic mind as a type of computer. As a result, the book engages with the current association of giftedness in mathematics and science with social awkwardness and isolation as constructed in popular culture: in idiomatic terms, the genius “nerd” figure characterised by an uncertain, adolescent approach to social contact (Kendall 353). The disablement of the character is, then, lessened so that the idea of being “special,” continually evoked throughout the text, has a transformative function that is related less to the special needs of those with a disability and more to the common element in adolescent fiction of longing for extraordinary power and control through being a special, gifted individual. The Curious Incident of the Dog in the Night-Time relates the protagonist, Christopher, to Sherlock Holmes and his methods of detection, specifically through the title being taken from a story by Conan Doyle, “Silver Blaze,” in which the “curious incident” referred to is that the dog did nothing in the night. In the original story, that the dog did not bark or react to an intruder was a clue that the person was known to the animal, so allowing Holmes to solve the crime by a process of deduction. Christopher copies these traditional methods of the classical detective to solve his personal mystery, that of who killed a neighbour’s dog, Wellington. The adoption of this title allows a double irony to emerge. Christopher’s attempts to emulate Holmes in his approach to crime are predicated on his assumption of his likeness to the model of the classical detective as he states, “I think that if I were a proper detective he is the kind of detective I would be,” pointing out the similarity of their powers of observation and his ability, like Holmes, to “detach his mind at will” as well as his capacity to find patterns in events (92). Through the novel, these attributes are aligned with his autism, constructing a trope of his disability conferring extraordinary abilities that are predicated on a computer-like detachment and precision in his method of thinking. The accessible narrative of the autistic Christopher gives the reader the impression of being able to understand the perspective of an individual with a spectrum disorder. In this way, the text not only engages with, but contributes to the construction of this disability in current popular culture as merely an extension of giftedness, especially in mathematics, and an associated unwillingness to communicate. Indeed, according to Raoul Eshelman, “one of its most engaging narrative devices is to make us identify with a mentally impaired narrator who is manifestly not interested in identifying either with us or anyone else” (1). The main character’s reference to mathematical and scientific ideas exploits an interest in giftedness already established by popular literature and film, and engages with a transformation effected in popular culture of the genius as autistic, and its corollary of an autistic person as potentially a genius. Such a construction ranges from fictional characters like Sheldon in The Big Bang Theory, Charlie and his physicist colleagues in Numb3rs, and Raymond Babbitt in Rain Man, to real life characters or representative figures in reality series and feature films such as x + y, The Imitation Game, The Big Short, and the television program Beauty and the Geek. While never referring specifically to autism, all the real or fictional representations contribute to the construction of a stereotype in which behaviours on the autistic spectrum are linked to a talent in mathematics and the sciences. In addition to this, detectives in the classical crime fiction alluded to in the novel typically exhibit traits of superhuman powers of deduction, pattern making, and problem solving that engage with the popular notion of genius in general and mathematics in particular by possessing a mind like a computer. Such detectives from current television series as Saga from The Bridge and Spencer Reid from Criminal Minds exhibit distance, coldness, and lack of social awareness or empathy with others, and this is presented as the basis of their extraordinary ability to discern patterns and solve crime. Spencer Reid, for example, has three PhDs in Science disciplines and Mathematics. Charlie in the television series Numb3rs is also a genius who uses his mathematical abilities to not only find the solution to crime but also explain the maths behind it to his FBI colleagues, and, in conjunction, the audience. But the character with the clearest association to Christopher is, naturally, Sherlock Holmes, both as constructed in Conan Doyle’s original text and the current adaptations and transformations of it. The television series Sherlock and Elementary, as well as the films Sherlock Holmes and Sherlock Holmes: A Game of Shadows all invoke a version of Holmes in which his powers of deduction are associated with symptoms to be found in a spectrum disorder.Like Christopher, the classical detective is characterised by being cold, emotionless, distant, socially inept, and isolated, but also keenly observant, analytical, and scientific; one who approaches the crime as a puzzle to be solved (Cawelti 43) with computer-like precision. In what is considered to be the original detective story, The Murders in the Rue Morgue, Poe included a “pseudo-mathematical logic in his literary scenario” (Platten 255). In Conan Doyle’s stories, Holmes, too, adopts a mathematical and scientific approach to construct patterns from clues that he alone can discern, and thereby solve the crime. The depiction of investigators in contemporary media such as Charlie in Numb3rs engages with these origins so that he is objective, dispassionate, and able to relate to real-world problems only through the filter of mathematical formulae. Christopher is presented similarly by engaging with the idea of the detective as implied savant and relying on an ability to discern patterns for successful crime solving.The book links the disabling behaviours of autism with the savant, so that the stereotype of the mystic displaying both disability and giftedness in fiction of earlier ages has been transformed in contemporary literature to a figure with extraordinary powers related both to autism and to the contemporary form of mysticism: innate mathematical ability and computer-style calculation. Allied with what Murray terms the “unknown and ambiguous nature” of autism, it is characterised as “the alien within the human, the mystical within the rational, the ultimate enigma” (25) in a way that is in keeping with the current fascination with the nature of genius and its association with being “special,” a term continually evoked and discussed throughout the book by the main character. The chapters on scientific ideas relate to Christopher’s world view, filtered through a mathematical and analytical approach to life and relationships with other people. Christopher examines beliefs such as the concept of humanity as superior to other animals, and the idea of religion and creationism, that is, the idea of humanity itself as special, with a cold and logical approach. He similarly discusses the idea of the individual person as special, linking this to a metaphor of the human mind being a computer (203, 148). Christopher’s narrow perspective as a result of his autism is not presented as disabling so much as protective, because the metaphorical connection of his viewpoint to a computer provides him with distance. Although initially Christopher fails to realise the significance of events, this allows him to be “switched off” (103) from events that he finds traumatising.The transformative metaphor of an autistic individual thinking like a computer is also invoked through Christopher’s explanation of “why people think that their brains are special, and different from computers” (147). Indeed, both in terms of his tendency to retreat or by “pressing CTRL + ALT + DEL and shutting down programs and turning the computer off and rebooting” (178) in times of stress, Christopher metaphorically views himself as a computer. Such a perspective invokes yet another popular cultural reference through the allusion to the human brain as “Captain Jean-Luc Picard in Star Trek: The Next Generation, sitting in his captain’s seat looking at a big screen” (147). But more importantly, the explanation refers to the basic premise of the book, that the text offers access to a condition that is inherently unknowable, but able to be understood by the reader through metaphor, often based on computers or technology as a result of a popular construction of autism that “the condition is the product of a brain in which the hard drive is incorrectly formatted” (Murray 25).Throughout the novel, the notion of “special” is presented as a trope for those with a disability, but as the protagonist, Christopher, points out, everyone is special in some way, so the whole idea of a disability as disabling is problematised throughout the text, while its associations of giftedness are upheld. Christopher’s disability, never actually designated as Asperger’s Syndrome or any type of spectrum disorder, is transformed into a protective mechanism that shields him from problematic social relationships of which he is unaware, but that the less naïve reader can well discern. In this way, rather than a limitation, the main character’s disorder protects him from a harsh reality. Even Christopher’s choice of Holmes as a role model is indicative of his desire to impose an eccentric order on his world, since this engages with a character in popular fiction who is famous not simply for his abilities, but for his eccentricity bordering on a form of autism. His aloof personality and cold logic not only fail to hamper him in his investigations, but these traits actually form the basis of them. The majority of recent adaptations of Conan Doyle’s stories, especially the BBC series Sherlock, depict Holmes with symptoms associated with spectrum disorder such as lack of empathy, difficulty in communication, and limited social skills, and these are clearly shown as contributing to his problem-solving ability. The trope of Christopher as detective also allows a parodic, postmodern comment on the classical detective form, because typically this fiction has a detective that knows more than the reader, and therefore the goal for the reader is to find the solution to the crime before it is revealed by the investigator in the final stages of the text (Rzepka 14). But the narrative works ironically in the novel since the non-autistic reader knows more than a narrator who is hampered by a limited worldview. From the beginning of the book, the narrative as focalised through Christopher’s narrow perspective allows a more profound view of events to be adopted by the reader, who is able to read clues that elude the protagonist. Christopher is well aware of this as he explains his attraction to the murder mystery novel, even though he has earlier stated he does not like novels since his inability to imagine or empathise means he is unable to relate to their fiction. For him, the genre of murder mystery is more akin to the books on maths and science that he finds comprehensible, because, like the classical detective, he views the crime as primarily a puzzle to be solved: as he states, “In a murder mystery novel someone has to work out who the murderer is and then catch them. It is a puzzle. If it is a good puzzle you can sometimes work out the answer before the end of the book” (5). But unlike Christopher, Holmes invariably knows more about the crime, can interpret the clues, and find the pattern, before other characters such as Watson, and especially the reader. In contrast, in The Curious Incident of the Dog in the Night-Time, the reader has more awareness of the probable context and significance of events than Christopher because, like a computer, he can calculate but not imagine. The reader can interpret clues within the plot of the story, such as the synchronous timing of the “death” of Christopher’s mother with the breakdown of the marriage of a neighbour, Mrs Shears. The astute reader is able to connect these events and realise that his mother has not died, but is living in a relationship with the neighbour’s husband. The construction of this pattern is denied Christopher, since he fails to determine their significance due to his limited imagination. Such a failure is related to Simon Baron-Cohen’s Theory of Mind, in which he proposes that autistic individuals have difficulty with social behaviour because they lack the capacity to comprehend that other people have individual mental states, or as Christopher terms it, “when I was little I didn’t understand about other people having minds” (145). Haddon utilises fictional licence when he allows Christopher to overcome such a limitation by a conscious shift in perspective, despite the specialist teacher within the text claiming that he would “always find this very difficult” (145). Christopher has here altered his view of events through his modelling both on the detective genre and on his affinity with mathematics, since he states, “I don’t find this difficult now. Because I decided that it was a kind of puzzle, and if something is a puzzle there is always a way of solving it” (145). In this way, the main character is shown as transcending symptoms of autism through the power of his giftedness in mathematics to ultimately discern a pattern in human relationships thereby adopting a computational approach to social problems.Haddon similarly explains the perspective of an individual with autism through a metaphor of Christopher’s memory being like a DVD recording. He is able to distance himself from his memories, choosing “Rewind” and then “Fast Forward” (96) to retrieve his recollection of events. This aspect of the precision of his memory relates to his machine-like coldness and lack of empathy for the feelings of others. But it also refers to the stereotype of the nerd figure in popular culture, where the nerd is able to relate more to a computer than to other people, exemplified in Sheldon from the television series The Big Bang Theory. Thus the presentation of Christopher’s autism relates to his giftedness in maths and science more than to areas that relate to his body. In general, descriptions of inappropriate or distressing bodily functions associated with disorders are mainly confined to other students at Christopher’s school. His references to his fellow students, such as Joseph eating his poo and playing in it (129) and his unsympathetic evaluation of Steve as not as clever or interesting as a dog because he “needs help to eat his food and could not even fetch a stick” (6), make a clear distinction between him and the other children, who despite being termed “special needs” are “special” in a different way from Christopher, because, according to him, “All the other children at my school are stupid” (56). While some reference is made to Christopher’s inappropriate behaviour in times of stress, such as punching a fellow student, wetting himself while on the train, and vomiting outside the school, in the main the emphasis is on his giftedness as a result of his autism, as displayed in the many chapters where he explains scientific and mathematical concepts. This is extrapolated into a further mathematical metaphor underlying the book, that he is like one of the prime numbers he finds so fascinating, because prime numbers do not fit neatly into the pattern of the number system, but they are essential and special nevertheless. Moreover, as James Berger suggests, prime numbers can “serve as figures for the autistic subject,” because like autistic individuals “they do not mix; they are singular, indivisible, unfactorable” yet “Mathematics could not exist without these singular entities that [. . .] are only apparent anomalies” (271).Haddon therefore offers a transformation by confounding autism with a computer-like ability to solve mathematical problems, so that the text is, as Haddon concedes, “as much about a gifted boy with behavior problems as it is about anyone on the autism spectrum” (qtd. in Burks-Abbott 291). Indeed, the word “autism” does not even appear in the book, while the terms “genius,” (140) “clever,” (32, 65, 252) and the like are continually being invoked in descriptions of Christopher, even if ironically. More importantly, the reader is constantly being shown his giftedness through the reiteration of his study of A Level Mathematics, and his explanation of scientific concepts. Throughout, Christopher explains aspects of mathematics, astrophysics, and other sciences, referring to such well-known puzzles in popular culture as the Monty Hall problem, as well as more obscure formulae and their proofs. They function to establish Christopher’s intuitive grasp of complex mathematical and scientific principles, as well as providing the reader with insight into both his perspective and the paradoxical nature of an individual who is at once able to solve quadratic equations in his head, yet is incapable of understanding the simple instruction, “Take the tube to Willesden Junction” (211).The presentation of Christopher is that of an individual who displays an extension of the social problems established in popular literature as connected to a talent for mathematics, therefore engaging with a depiction already existing in popular mythology: the isolated and analytical nerd or genius social introvert. Indeed, much of Christopher’s autistic behaviour functions to protect him from unsettling or traumatic information, since he fails to realise the significance of the information he collects or the clues he is given. His disability is therefore presented as not limiting so much as protective, and so the notion of disability is subsumed by the idea of the savant. The book, then, engages with a contemporary representation within popular culture that has transformed spectrum disability into mathematical giftedness, thereby metaphorically associating the autistic mind with the computer. ReferencesBaron-Cohen, Simon. Mindblindness: An Essay on Autism and Theory of Mind. Cambridge MA: MIT Press, 1995. Berger, James. “Alterity and Autism: Mark Haddon’s Curious Incident in the Neurological Spectrum.” Autism and Representation. Ed. Mark Osteen. Hoboken: Routledge, 2007. 271–88. Burks-Abbott, Gyasi. “Mark Haddon’s Popularity and Other Curious Incidents in My Life as an Autistic.” Autism and Representation. Ed. Mark Osteen. Hoboken: Routledge, 2007. 289–96. Cawelti, John G. Adventure, Mystery, and Romance: Formula Stories as Art and Popular Culture. Chicago: U of Chicago P, 1976. Eshelman, Raoul. “Transcendence and the Aesthetics of Disability: The Case of The Curious Incident of the Dog in the Night-Time.” Anthropoetics: The Journal of Generative Anthropology 15.1 (2009). Haddon, Mark. The Curious Incident of the Dog in the Night-Time. London: Random House Children’s Books, 2004. Kendall, Lori. “The Nerd Within: Mass Media and the Negotiation of Identity among Computer-Using Men.” Journal of Men’s Studies 3 (1999): 353–67. Murray, Stuart. “Autism and the Contemporary Sentimental: Fiction and the Narrative Fascination of the Present.” Literature and Medicine 25.1 (2006): 24–46. Platten, David. “Reading Glasses, Guns and Robots: A History of Science in French Crime Fiction.” French Cultural Studies 12 (2001): 253–70. Rzepka, Charles J. Detective Fiction. Cambridge, UK: Polity Press, 2005.
APA, Harvard, Vancouver, ISO, and other styles
38

Mackenzie, Adrian. "The Infrastructural-Political." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2229.

Full text
Abstract:
To analyse critically contemporary communications and network technologies, and to understand how they become more (or less!) political, we need to learn about the forms of attachment, the kinds of 'stickiness', and the 'velcro effects' which block or negate as well as enable contemporary infrastructural politics. In the following tableau, the heuristic fiction comes from psychotherapy (Orbach, 2000). Imagine the cultural/new media/critical researcher as the analyst. The forms of attachment to be analysed include the analyst's own as she/he comes into relation with changing infrastructural regimes. Her or his reflections are italicised. Articulation The clients are a male couple, a community-minded activist artist-hacker, Pete, and a corporate IT strategist, Roger. They come to the consultation. It starts off badly. Pete shouts at Roger, who sits quietly beside him. Pete's clothes are loose and dark, he wears funky fluorescent trainers and his laptop backpack is geek-cool. Roger is in suit and tie, neat haircut, closely shaven, a slim aluminium briefcase leans against his pinstriped trouser leg. A few minutes into the session, it looks like Pete might come to blows with Roger. Interceding, the therapist asks them to say what brought them there. Pete and Roger begin to talk about the dilemma that had precipitated the anger and distress. Pete appeals for affirmation of how he has been wronged. But as Roger talks, the dominant feeling shifts to confusion. They are certainly in trouble as a couple, but clearly neither is about to relinquish this relationship. When cultural researchers of technology open the door to a new problem, they do not occupy a separate critical space in which knowledge about objects, practices, relations, processes, or figures come to be represented. Rather, only through 'articulation,' as Donna Haraway suggests, can they add another link, another twist in the knotted linkages which constitute the domain in question (Haraway, 1997, 63). What link(s) would we want to add to the contemporary contests over network infrastructure, where the central issue is figured as access to bandwidth and ubiquitous connectivity? Revolution and convolution Before the dotcom crash, Pete and Roger's relationship had been blissful and imaginative. Together, through the years of virtual reality and the browser wars, they had agreed on and implemented protocols, cut code, designed new applications and increased connectivity. Imagining full-blown virtuality had been a shared project; they were making a world together. The arrival of online shopping, email spamming, music swapping, massive on-line gaming and even open source software had not damaged it. Although they had come from different backgrounds and upbringings, they needed each other. For Roger, Pete had represented an urban sub-cultural well-spring of invention in contemporary technological cultures. Despite his corporate confidence and affluence, Roger knew that kudos on the street underpinned commercial success. From Roger, Pete trusted he would gain access to infrastructure and technical capacity that was the basis of a shared domain of communication. Their relationship before the dotcom crash had worked well because there had been no question about their desirability to each other. There had been conflicts, but both loved their work and found it meaningful. Already we see attachment to infrastructure becoming convoluted. The infrastructural-political lies neither outside or inside technology itself. What appears as a technological revolution – the arrival of the Internet – can be a convolution in relation to collective life. The affective energy attached to communication infrastructure can be seen as the 'historical and political reality of the mass and of crowds in movement' (Balibar, 1998, 16). We could say, as Gatens & Lloyd (1999) put it, that '[r]elations of communication of affect between human individuals are ... subsidiary to the relations of communication between the affects themselves' (66). From this standpoint, the relation between the couple refracts different affects meshing with each other. Hence, we need to understand the fears and hopes, desires and mourning associated with technological media differently. Attachment to technology After the dotcom crash of early 2001, things became more difficult. Their relationship met an extremely simple dilemma: low or high network bandwidth (Lovink, 2003, 370). Pete loved technical limitations like narrow bandwidth. They stimulated artistic, political, economic and collective creativity. He was fond of the Unix command line, shell scripts, cutting code in Python or Perl, ascii art, and hand-coded html. Roger, by contrast, saw technical limitations, especially those of bandwidth, ruining the Internet. Slow or unreliable access to the net thwarted its development into a truly mass popular entertainment medium. Only high bandwidth and mobility could rescue it. He thought Pete was part of the problem. Pete represented over-attachment to the platform. Pete's love of the intricacies of code, his insistence on tinkering, making-do, recycling, sharing and re-appropriating was all very well but it was an obstacle to popularity. In his more idealistic moments, Roger even thought that Pete's truculent defiance of the popular Internet and his attempts to save the masses from being duped only 'obscured the real social significance of their pleasures' (Walkerdine, 1999, 192-3). Strong technological attachments are no accident for two reasons. Firstly, the political is underpinned by collective affects or an awareness of bodies in relation (Gatens & Lloyd, 1999, 77). Secondly, 'human affairs (praxis) and the management-production of things (technç),' (Stengers, 2000, 163) are integrated in our politics. When politics integrates human affairs and technical things, collective affects concerning infrastructure arise. In contemporary politics, utopian and dystopian fantasies and visions of 'the good life' figure through communication infrastructure. Infrastructures are integral to how cultural forms of life render and inhabit their worlds. Thus, politics increasingly concerns technoscapes (Appadurai, 1996). Dilemmas of technical capacity By the end of 2002, contact between them was perfunctory. Pete was active in community networking projects in East London and 'Pico Peering' (http://picopeer.net/wiki/). In conjunction with a local housing association, he installing a wireless backbone for community access. The projects of the late 1990s - virtual spaces for artists, on-line communities, direct action hacktivism, collaborating on open source projects - seemed less important, although he did still work on them. Connection to a vibrant, ethnically complicated and crowded inner city seemed more interesting than either the relative abstraction of code or the predictability of commercial Internet. 'Carving out mobile space is good', Pete often said, 'but reclaiming public space is better' (Gerritzen & Lovink, 2002, 93). Roger, meanwhile, had embraced broadband connectivity, not caring that it mostly seemed to be used for pornography and music downloads. It was fast, popular, and becoming the norm in Europe and USA (Warwick, 2003). Like others, he thought 'never enough Internet capacity can be provided to the velocity-hungry on-line masses' (Lovink, 2003, 370). The dilemma of bandwidth forks from a deeper ambivalence about technical capacities and their role in futurity. On the one hand, technical capacity promises to overcome existing limitations. On the other hand, limitations only become relevant when they function as sites of differentiation or problematic zones open to diverse technical and non-technical solutions. All kinds of contestation, production, representation, identification and regulation cluster around these sites. The problem for cultural analysts of technology is articulating how certain sites of differentiation attract significations, technical innovations, objects/gadgets, infrastructures, regulatory apparatus, commercial-legal conflicts, feelings and concerns. The work of articulation involves disembedding these sites and extracting the relations of communication between affects that flow through them. Connectivity and collectivity Roger is having an affair. He met Erica at a wireless LAN trade exhibition held in the Olympia Exhibition Hall during late May 2003 (http://www.wlanevent.com/home/default.asp). Hewlett Packard-Compaq, Toshiba and Fujitsui had stands, some of the telcos and network operators were there too. Lining the back alleys, generic hardware and software manufacturers displayed their gadgets and ran their software demos on laptops. 'Directors' and 'sales executives' eagerly explained their products and handed out their sometimes less-than-glossy information sheets. At the centre, Intel occupied a large glass-walled stand lavishly kitted out with plasma screens on the walls, free laptops and wi-fi hotspots, pseudo-Japanese rock garden, comfortable seating in 'breakout cubicles' and well-groomed product managers and sales managers. Their Centrino™ wireless ready processors and corporate wifi solutions were featured in TV advertisements playing on large plasma screens. These advertisements dazzled Roger. They showed a broadband world without cables, without complicated configuration tasks, and without the clutter and hassle of wire infrastructures. They meant freedom from points of attachment, network connections, dongles and plugs. Like many others, he thought to himself 'wireless networking is the best thing to happen to the Internet since the browser' (Boutin, 2003). He met Erica when he went to ask if he could have an Intel showbag full of promotional material. With Erica, a telecommunications marketing director responsible for a wireless broadband roll-out in hotels, airports, pubs, cafés and train stations throughout the UK, he ended up going to the exhibition café to talk about wireless security issues. That afternoon, together they managed to squeeze into the most popular seminar at the exhibition, 'The Typical Wireless Hacker and W-LAN Security.' Andrew Barry writes, 'rapid technical change may sometimes have to occur in order to anticipate and stifle invention by others' (Barry, 2001, 213). Sometimes, we could add, rapid technical change may occur in order to anticipate and stifle the very presence of others. Remarkably many images of wireless connectivity involve empty spaces (e.g. Toshiba ads, Intel Centrino™ ads), just as so many car ads show empty roads. What is affectively at stake in these figurations of network infrastructure? What encounter or unwanted intimacy needs to be controlled here? Conversely, what space is there to imagine other connectivities, ones that do not rest on the promise of unobstructed private access to everything everywhere? Can we treat connectivity as something that opens relations between people, that lifts the ban on others being present? What sustains relationships: what does not yet exist The affair has brought Pete and Roger's relationship to a crisis point. Pete complains that the trust and intimacy between them is defunct. He argues that in Roger’s affair with Erica, he firewalls public culture in favour of a narrow understanding of the public as consumers of bandwidth. Even though Roger is increasing connectivity through wireless networking, it is not with the purpose of augmenting public space. Indeed, Roger is working with Erica to filter public spaces through a corporate, proprietary platform. If wired infrastructure has been successfully transformed into an interlocking matrix of proprietary relations, the task is now 'full spectrum' coverage of the spaces available to wireless infrastructures. For his part, Roger no longer regards technology itself as the basis of their mutual attachment. He now sees the technology as a given, and as something on which new kinds of freedom and mobility could rely. Wireless infrastructures promise to unleash people from the wires and cables that trap them at their screens. It will bring connectivity to other places - departure lounge, hotel lobby, Starbucks, beside the pool or in the garden, throughout the campus, etc. It allows them to work and be entertained in places they've never tried before. They leave the consultation in conflict. There is no obvious solution to their problem. Pete sees techno-utopian visions of freedom dying front of his eyes (Lessing, 2003), and is dealing with that by trying to move lower into the infrastructure. From his perspective, the technology is not a given but something whose conjunctions with other objects, activities, groups, figures and spaces cannot be left to chance. Roger too regrets the death of techno-utopian visions, but rejects the expectation that he should bail out the activist communities by giving public access to infrastructure. We can fall in love with a technology imagining that we create a relationship on a blank canvas. None of us have a clean attachment to technological media or infrastructures. Earlier relationships, other media, other practices and politics indelibly stain and sustain present ones. They often repeat older imaginings of connectivity and collectivity. The problem of the infrastructural-political centres on how to identify the object of attachment or identification. ''Incorporation into collectivities which determines our individuality involves affective imitation - dynamic movements of emotional identification and appropriation.” (Gatens & Lloyd, 1999, 77). Not so long ago, it may have been possible to imagine infrastructure as part of the fabric of collective reciprocity (along with housing, health, justice and education). Individuality as a citizen, spectator, commuter, traveller, resident, consumer, worker, student, child or immigrant was underpinned by infrastructural access. In many places, infrastructure no longer looks like a space of reciprocity, a space without negativity. Hence, attachment to infrastructure, the indispensable condition for a politics of infrastructure becomes contested. The link we might want to add to infrastructural imaginings concerns the very possibility of the infrastructural-political. Contestation of the collective mode of existence of infrastructure, this tenuous and still fragile fibre, is a promising development. Works Cited Appadurai, Arjun, Modernity at large: cultural dimensions of globalization, University of Minnesota Press, Minneapolis, 1996 Balibar, Etienne Spinoza and politics London, Verso, 1998. Barry, Andrew Political Machines. Governing Technological Society, Continuum Press, London & New York, 2001 Boutin, Paul 'Wi-Fi for Dummies. You want a home wireless network, but you're afraid it won't work. Here's how to do it right', <http://slate.msn.com/id/2084046/>, accessed June 9, 2003 Gatens, Moira & Lloyd, Genevieve Collective Imaginings. Spinoza, past and present Routledge, London & New York 1999 Gerritzen, Mieke & Lovink, Geert, Mobile Minded, BIS Publishers, Amsterdam, 2002 Haraway, Donna J. 1997 Modest_Witness@Second_Millennium. FemaleMan©_Meets_OncoMouse™ Feminism and Technoscience, (Routledge, New York & London). Lovink, Geert, 'Hi-Low: The Bandwidth Dilemma, Or Internet Stagnation after Dotcom Mania' Dark Fiber. Tracking Critical Internet Culture, MIT Press, 2003 Orbach, Susie, The Impossibility of Sex, Penguin Books, 2000 Links http://picopeer.net/wiki/ http://slate.msn.com/id/2084046/ http://www.wlanevent.com/home/default.asp Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Mackenzie, Adrian. "The Infrastructural-Political" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/05-infrastructural.php>. APA Style Mackenzie, A. (2003, Aug 26). The Infrastructural-Political. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/05-infrastructural.php>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography