To see the other types of publications on this topic, follow the link: Tactile Cyber-Physical Systems.

Journal articles on the topic 'Tactile Cyber-Physical Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 journal articles for your research on the topic 'Tactile Cyber-Physical Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Di Marco, Piergiuseppe, and Pangun Park. "Architectures and Protocols for Wireless Sensor and Actuator Networks." Journal of Sensor and Actuator Networks 10, no. 3 (July 30, 2021): 52. http://dx.doi.org/10.3390/jsan10030052.

Full text
Abstract:
Recent advances in wireless networking, sensing, computing, and control are revolutionizing how physical systems interact with information and physical processes such as Cyber-Physical Systems (CPS), Internet of Things (IoT), and Tactile Internet [...]
APA, Harvard, Vancouver, ISO, and other styles
2

Polachan, Kurian, Joydeep Pal, Chandramani Singh, T. V. Prabhakar, and Fernando A. Kuipers. "TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems." IEEE/ACM Transactions on Networking 30, no. 2 (April 2022): 796–811. http://dx.doi.org/10.1109/tnet.2021.3124767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Puliafito, Antonio, Giuseppe Tricomi, Anastasios Zafeiropoulos, and Symeon Papavassiliou. "Smart Cities of the Future as Cyber Physical Systems: Challenges and Enabling Technologies." Sensors 21, no. 10 (May 12, 2021): 3349. http://dx.doi.org/10.3390/s21103349.

Full text
Abstract:
A smart city represents an improvement of today’s cities, both functionally and structurally, that strategically utilizes several smart factors, capitalizing on Information and Communications Technology (ICT) to increase the city’s sustainable growth and strengthen the city’s functions, while ensuring the citizens’ enhanced quality of life and health. Cities can be viewed as a microcosm of interconnected “objects” with which citizens interact daily, which represents an extremely interesting example of a cyber physical system (CPS), where the continuous monitoring of a city’s status occurs through sensors and processors applied within the real-world infrastructure. Each object in a city can be both the collector and distributor of information regarding mobility, energy consumption, air pollution as well as potentially offering cultural and tourist information. As a consequence, the cyber and real worlds are strongly linked and interdependent in a smart city. New services can be deployed when needed, and evaluation mechanisms can be set up to assess the health and success of a smart city. In particular, the objectives of creating ICT-enabled smart city environments target (but are not limited to) improved city services; optimized decision-making; the creation of smart urban infrastructures; the orchestration of cyber and physical resources; addressing challenging urban issues, such as environmental pollution, transportation management, energy usage and public health; the optimization of the use and benefits of next generation (5G and beyond) communication; the capitalization of social networks and their analysis; support for tactile internet applications; and the inspiration of urban citizens to improve their quality of life. However, the large scale deployment of cyber-physical-social systems faces a series of challenges and issues (e.g., energy efficiency requirements, architecture, protocol stack design, implementation, and security), which requires more smart sensing and computing methods as well as advanced networking and communications technologies to provide more pervasive cyber-physical-social services. In this paper, we discuss the challenges, the state-of-the-art, and the solutions to a set of currently unresolved key questions related to CPSs and smart cities.
APA, Harvard, Vancouver, ISO, and other styles
4

Constantin, Anghel, and Gheorghe Ion Gheorghe. "New Concepts of Modeling and Complex Simulation of Electronic Circuits for Interfacing Tactile Sensors in Cyber-mechatronic Systems." Scientific Bulletin of Valahia University - Materials and Mechanics 14, no. 11 (October 1, 2016): 39–44. http://dx.doi.org/10.1515/bsmm-2016-0007.

Full text
Abstract:
Abstract The paper presents an original concept for interfacing tactile force sensors in modern cyber-mechatronic systems. The authors show the results and conclusions of a PSPICE simulation of an original patented circuit. In the simulations, in models used were introduced some circuit components corresponding to the physical implementation for a practical mechatronic system which has already been used for the analysis of human walking. After these simulations were revealed important aspects of dynamic behavior and was proposed an optimal variant of the interface circuit as a non-typically instrumentation differential circuit spitted in two parts, one near to the sensor, and the second far from the sensor and close to an A/D converter of the data acquisition system. For electrical links between the two parts can be used low cost cable without important loss of the signal / noise ratio.
APA, Harvard, Vancouver, ISO, and other styles
5

Mourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (December 20, 2021): 3175. http://dx.doi.org/10.3390/electronics10243175.

Full text
Abstract:
For many applications deployed in manufacturing networks, communication latency has been a significant barrier. Despite the constant development of improved communication protocols and standards during Industry 4.0, the latency problem persists, lowering quality of services (QoS) and quality of experience (QoE). Tactile internet (TI), with its high availability, security, and ultra-low latency, will add a new dimension to human-machine interaction (HMI) by enabling haptic and tactile sensations. The tactile internet (TI) is a cutting-edge technology that uses 5G and beyond (B5G) communications to enable real-time interaction of haptic data over the internet between tactile ends. This emerging TI technology is regarded as the next evolutionary step for the Internet of Things (IoT) and is expected to bring about massive changes towards Society 5.0 and to address complex issues in current society. To that end, the 5G mobile communication systems will support the TI at the wireless edge. As a result, TI can be used as a backbone for delay mitigation in conjunction with 5G networks, allowing for ultra-reliable low latency applications like Smart Manufacturing, virtual reality, and augmented reality. Consequently, the purpose of this paper is to present the current state of 5G and TI, as well as the challenges and future trends for 5G networks beyond 2021, as well as a conceptual framework for integrating 5G and TI into existing industrial case studies, with a focus on the design aspects and layers of TI, such as the master, network, and slave layers. Finally, the key publications focused on the key enabling technologies of TI are summarized and the beyond 5G era towards Society 5.0 based on cyber-physical systems is discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Villalón-Huerta, Antonio, Ismael Ripoll-Ripoll, and Hector Marco-Gisbert. "CNA Tactics and Techniques: A Structure Proposal." Journal of Sensor and Actuator Networks 10, no. 1 (February 10, 2021): 14. http://dx.doi.org/10.3390/jsan10010014.

Full text
Abstract:
Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence gathering. While in CNE operations the main tactics and techniques are defined and well structured, in CNA there is a lack of such consensuated approaches. This situation hinders the modeling of threat actors, which prevents an accurate definition of control to identify and to neutralize malicious activities. In this paper, we propose the first global approach for CNA operations that can be used to map real-world activities. The proposal significantly reduces the amount of effort need to identify, analyze, and neutralize advanced threat actors targeting cyber physical systems. It follows a logical structure that can be easy to expand and adapt.
APA, Harvard, Vancouver, ISO, and other styles
7

Amro, Ahmed, and Vasileios Gkioulos. "Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases." Journal of Marine Science and Engineering 11, no. 4 (March 29, 2023): 744. http://dx.doi.org/10.3390/jmse11040744.

Full text
Abstract:
In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment of cyber risks in a CPS is a popular research area with many existing approaches that aim to suggest relevant methods and practices. However, few works have addressed the extensive and objective evaluation of the proposed approaches. In this paper, a standard-aligned evaluation methodology is presented and empirically conducted to evaluate a newly proposed cyber risk assessment approach for CPSs. The approach, which is called FMECA-ATT&CK is based on failure mode, effects and criticality analysis (FMECA) risk assessment process and enriched with the semantics and encoded knowledge in the Adversarial Tactics, Techniques, and Common Knowledge framework (ATT&CK). Several experts were involved in conducting two risk assessment processes, FMECA-ATT&CK and Bow-Tie, against two use cases in different application domains, particularly an autonomous passenger ship (APS) as a maritime-use case and a digital substation as an energy-use case. This allows for the evaluation of the approach based on a group of characteristics, namely, applicability, feasibility, accuracy, comprehensiveness, adaptability, scalability, and usability. The results highlight the positive utility of FMECA-ATT&CK in model-based, design-level, and component-level cyber risk assessment of CPSs with several identified directions for improvements. Moreover, the standard-aligned evaluation method and the evaluation characteristics have been demonstrated as enablers for the thorough evaluation of cyber risk assessment methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Cervini, James, Aviel Rubin, and Lanier Watkins. "Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 19–25. http://dx.doi.org/10.34190/iccws.17.1.29.

Full text
Abstract:
Water treatment represents an essential critical infrastructure sector which has a direct impact on the health and well-being of its customers. Water treatment is often performed by municipalities with very limited budgets for cybersecurity resources. These underfunded, high-impact, targets represent an emerging cyber warfare attack-surface paradigm which poses a direct threat to the quality of life for millions of people. On February 5th, 2021, a water treatment plant in Oldsmar, Florida was the victim of an attempted cyberattack. This attack commanded the system to add a dangerous amount ofsodium hydroxide to water which supplied thousands. Direct exposure to sodium hydroxide causes painful burns to the exposed area with permanent internal damage likely upon ingestion. A system operator noticed this malicious behaviour and corrected the situation, minimizing the attack’s impact. This paper outlines the attack and illustrates how minor modifications to the attacker’s tactics, techniques, and procedures could have resulted in a cyber-derived catastrophe for thousands of unsuspecting citizens. Lastly, this paper explores the effectiveness of various low-cost cyber-physical security technologies when pitted against differing attacker models in these theoretical scenarios. These cybersecurity solutions are evaluated by cost, ease of use, implementation difficulty, and ability to support safe operation continuity when faced with adversary behaviour. The results of this evaluation illuminate a path forward for low-cost threat mitigation which increases the difficulty to compromise these critical cyber-physical systems. With attacks targeting industrial control systems on the rise, the Oldsmar water treatment cyberattack represents more than an individual incident, it can be viewed as a reflection of the current status of thousands of similar critical infrastructure systems that have yet to be caught in crosshairs of a competent and willing adversary with financial incentives and cyber warfare mission requirements serving as impetus for adversary willingness and any resulting large-scale cyber cataclysm.
APA, Harvard, Vancouver, ISO, and other styles
9

Ur Rahman, Hafiz, Guojun Wang, Md Zakirul Alam Bhuiyan, and Jianer Chen. "In-network generalized trustworthy data collection for event detection in cyber-physical systems." PeerJ Computer Science 7 (May 4, 2021): e504. http://dx.doi.org/10.7717/peerj-cs.504.

Full text
Abstract:
Sensors in Cyber-Physical Systems (CPS) are typically used to collect various aspects of the region of interest and transmit the data towards upstream nodes for further processing. However, data collection in CPS is often unreliable due to severe resource constraints (e.g., bandwidth and energy), environmental impacts (e.g., equipment faults and noises), and security concerns. Besides, detecting an event through the aggregation in CPS can be intricate and untrustworthy if the sensor's data is not validated during data acquisition, before transmission, and before aggregation. This paper introduces In-network Generalized Trustworthy Data Collection (IGTDC) framework for event detection in CPS. This framework facilitates reliable data for aggregation at the edge of CPS. The main idea of IGTDC is to enable a sensor's module to examine locally whether the event's acquired data is trustworthy before transmitting towards the upstream nodes. It further validates whether the received data can be trusted or not before data aggregation at the sink node. Additionally, IGTDC helps to identify faulty sensors. For reliable event detection, we use collaborative IoT tactics, gate-level modeling with Verilog User Defined Primitive (UDP), and Programmable Logic Device (PLD) to ensure that the event's acquired data is reliable before transmitting towards the upstream nodes. We employ Gray code in gate-level modeling. It helps to ensure that the received data is reliable. Gray code also helps to distinguish a faulty sensor. Through simulation and extensive performance analysis, we demonstrate that the collected data in the IGTDC framework is reliable and can be used in the majority of CPS applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, M. Imran, Ahmed Ibrahim, Peter Hannay, and Leslie F. Sikos. "Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions." Computers 12, no. 4 (April 14, 2023): 79. http://dx.doi.org/10.3390/computers12040079.

Full text
Abstract:
Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains such as smart grid, healthcare, the military, and telecommunication. These systems are continually threatened by malicious software (malware) attacks by adversaries due to their improvised tactics and attack methods. A minor configuration change in a CPS through malware has devastating effects, which the world has seen in Stuxnet, BlackEnergy, Industroyer, and Triton. This paper is a comprehensive review of malware analysis practices currently being used and their limitations and efficacy in securing CPSes. Using well-known real-world incidents, we have covered the significant impacts when a CPS is compromised. In particular, we have prepared exhaustive hypothetical scenarios to discuss the implications of false positives on CPSes. To improve the security of critical systems, we believe that nature-inspired metaheuristic algorithms can effectively counter the overwhelming malware threats geared toward CPSes. However, our detailed review shows that these algorithms have not been adapted to their full potential to counter malicious software. Finally, the gaps identified through this research have led us to propose future research directions using nature-inspired algorithms that would help in bringing optimization by reducing false positives, thereby increasing the security of such systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Motghare, Sarita M., and Pramod S. Nair. "Empirical Analysis of Privacy Preservation Models for Cyber Physical Deployments from a Pragmatic Perspective." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3s (March 11, 2023): 19–29. http://dx.doi.org/10.17762/ijritcc.v11i3s.6151.

Full text
Abstract:
The difficulty of privacy protection in cyber-physical installations encompasses several sectors and calls for methods like encryption, hashing, secure routing, obfuscation, and data exchange, among others. To create a privacy preservation model for cyber physical deployments, it is advised that data privacy, location privacy, temporal privacy, node privacy, route privacy, and other types of privacy be taken into account. Consideration must also be given to other types of privacy, such as temporal privacy. The computationally challenging process of incorporating these models into any wireless network also affects quality of service (QoS) variables including end-to-end latency, throughput, energy use, and packet delivery ratio. The best privacy models must be used by network designers and should have the least negative influence on these quality-of-service characteristics. The designers used common privacy models for the goal of protecting cyber-physical infrastructure in order to achieve this. The limitations of these installations' interconnection and interface-ability are not taken into account in this. As a result, even while network security has increased, the network's overall quality of service has dropped. The many state-of-the-art methods for preserving privacy in cyber-physical deployments without compromising their performance in terms of quality of service are examined and analyzed in this research. Lowering the likelihood that such circumstances might arise is the aim of this investigation and review. These models are rated according to how much privacy they provide, how long it takes from start to finish to transfer data, how much energy they use, and how fast their networks are. In order to maximize privacy while maintaining a high degree of service performance, the comparison will assist network designers and researchers in selecting the optimal models for their particular deployments. Additionally, the author of this book offers a variety of tactics that, when used together, might improve each reader's performance. This study also provides a range of tried-and-true machine learning approaches that networks may take into account and examine in order to enhance their privacy performance.
APA, Harvard, Vancouver, ISO, and other styles
12

Grigaliūnas, Šarūnas, Rasa Brūzgienė, and Algimantas Venčkauskas. "The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System." Electronics 12, no. 3 (January 25, 2023): 591. http://dx.doi.org/10.3390/electronics12030591.

Full text
Abstract:
Industry X.0 is the new age of digitization, when information and communication systems are strongly linked to other systems and processes and are accessed remotely from anywhere at any time. The existing information systems’ security methods are ineffective because they should focus on and assess a broader range of factors in physical and digital spaces, especially because tactics of cybercrimes are always evolving and attackers are getting more inventive in searching for holes that might be exploited. To fight it, it is a need to be one step ahead of the attacker, including understanding the nature, stages and scope of the upcoming cyberattack. The objective of our research is to identify the impact of the scope of a cyberattack’s stages on the cyber resilience of an information and communication system, assessing the level of cybersecurity based on existing technical and operational measures. The research methodology includes a numerical simulation, an analytical comparison and experimental validation. The achieved results allow for the identification of up to 18 attack stages based on the aggregation of technical and organizational security metrics and detection sources. The analytical comparison proved the proposed method to be 13% more effective in identifying the stage of a cyberattack and its scope. Based on this research, the extensive scoping flexibility of the proposed method will enable additional control measures and methods that would reduce the impact of an attack on the robustness while increasing the cyber-sustainability of a system.
APA, Harvard, Vancouver, ISO, and other styles
13

Kravets, Ja, O. A. R. Almusawi, Ju N. Doroshenko, S. N. Mamedov, and Yu V. Redkin. "Security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model." Journal of Physics: Conference Series 2094, no. 4 (November 1, 2021): 042040. http://dx.doi.org/10.1088/1742-6596/2094/4/042040.

Full text
Abstract:
Abstract The problems and features of security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model are considered. The algorithm of the functioning of the system node allows for the possibility of increasing or decreasing its resources using various approaches. Models of stochastic automata with a variable structure are used to model such systems. The process of functioning of a node of a system with a distributed registry based on a chain of blocks in the form of a finite automaton with a variable structure and linear tactics is formalized, which ensures that the sequence of changing the variants of the node’s behaviour strategy depends on the conditions of the environment with which it interacts by constructing state matrices.
APA, Harvard, Vancouver, ISO, and other styles
14

Khalid, Mohd Nor Akmal, Amjed Ahmed Al-Kadhimi, and Manmeet Mahinderjit Singh. "Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review." Mathematics 11, no. 6 (March 10, 2023): 1353. http://dx.doi.org/10.3390/math11061353.

Full text
Abstract:
Cybersecurity has become a prominent issue in regard to ensuring information privacy and integrity in the internet age particularly with the rise of interconnected devices. However, advanced persistent threats (APTs) pose a significant danger to the current contemporary way of life, and effective APT detection and defense are vital. Game theory is one of the most sought-after approaches adopted against APTs, providing a framework for understanding and analyzing the strategic interactions between attackers and defenders. However, what are the most recent developments in game theory frameworks against APTs, and what approaches and contexts are applied in game theory frameworks to address APTs? In this systematic literature review, 48 articles published between 2017 and 2022 in various journals were extracted and analyzed according to PRISMA procedures and our formulated research questions. This review found that game-theory approaches have been optimized for the defensive performance of security measures and implemented to anticipate and prepare for countermeasures. Many have been designed as part of incentive-compatible and welfare-maximizing contracts and then applied to cyber–physical systems, social networks, and transportation systems, among others. The trends indicate that game theory provides the means to analyze and understand complex security scenarios based on technological advances, changes in the threat landscape, and the emergence of new trends in cyber-crime. In this study, new opportunities and challenges against APTs are outlined, such as the ways in which tactics and techniques to bypass defenses are likely to evolve in order to evade detection, and we focused on specific industries and sectors of high interest or value (e.g., healthcare, finance, critical infrastructure, and the government).
APA, Harvard, Vancouver, ISO, and other styles
15

Polachan, Kurian, Joydeep Pal, Chandramani Singh, and Prabhakar T. V. "Assessing Quality of Control in Tactile Cyber-Physical Systems." IEEE Transactions on Network and Service Management, 2022, 1. http://dx.doi.org/10.1109/tnsm.2022.3164100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Polachan, Kurian, Chandramani Singh, and T. V. Prabhakar. "Decentralized Dynamic Scheduling of TCPS flows and a Simulator for Time-Sensitive Networking." ACM Transactions on Internet Technology, February 3, 2022. http://dx.doi.org/10.1145/3498729.

Full text
Abstract:
Cybersickness and control-loop instabilities are two main concerns in Tactile Cyber-Physical Systems (TCPS). TCPS applications demand stringent bounds on end-to-end latencies to avoid their occurrences. Traditional best-effort networks cannot guarantee packet latencies in the presence of external traffic. On the other hand, emerging deterministic networks such as IEEE 802.1 Time-Sensitive Networking (TSN) can isolate time-critical flows from external traffic using IEEE 802.1Qbv Time-Aware Shaper (TAS) to guarantee bounded end-to-end packet latencies. In this work, we develop eDDSCH-TSN, a decentralized dynamic scheduling protocol to configure non-overlapping gate slots in TAS enabled TSN switches to support TCPS flows. eDDSCH-TSN supports plug-and-play operation of compatible TCPS terminals with guaranteed minimal end-to-end packet latencies. Compared to the state-of-the-art, eDDSCH-TSN provides three orders lower end-to-end packet latencies for TCPS flows in mid-size networks with ten hops between source and destination terminals. Further, we also present PYTSN, an open-source discrete-event TSN simulator which we use for evaluating eDDSCH-TSN. In particular, we use PYTSN to show the isolation of TCPS flows from external traffic and plug and play operation of TCPS terminals.
APA, Harvard, Vancouver, ISO, and other styles
17

Agarwal, Sucheta, Kuldeep Kumar Saxena, Vivek Agrawal, Jitendra Kumar Dixit, Chander Prakash, Dharam Buddhi, and Kahtan A. Mohammed. "Prioritizing the barriers of green smart manufacturing using AHP in implementing Industry 4.0: a case from Indian automotive industry." TQM Journal, October 3, 2022. http://dx.doi.org/10.1108/tqm-07-2022-0229.

Full text
Abstract:
PurposeManufacturing companies are increasingly using green smart production (GSM) as a tactic to boost productivity since it has a number of advantages over conventional manufacturing methods. It costs a lot of money and takes a lot of work to create an SMS since it combines a lot of different technologies, including automation, data exchanges, cyber-physical systems (CPS), artificial intelligence, the Internet of things (IoT) and semi-autonomous industrial systems. Green smart manufacturing (GSM) activities provide the foundation for creating ecologically friendly and green products. However, there are a number of other significant barriers obstacles to GSM deployment. As a result, removing this identification of these hurdles in a systematic manner should be a top focus of this study.Design/methodology/approach This article seeks to identify and prioritize the nine barriers based on research and expert viewpoints on GSM challenges. The analytical hierarchy process (AHP) is used to prioritize the barriers.FindingsThe result depicts that, financial constraints is the most important barrier that followed by scarcity of dedicated suppliers, concern to data security lack of understanding of the surroundings, inadequate top management commitment, proper handling of data interfaces lack of support by government, employees' lack of training, concern to data security lack of environment knowledge, fear of change/resistance and constraints of technology.Research limitations/implications The current research will help the manufacturing industry in Industry 4.0 to identify potential barriers to GSM implementation.Originality/value Green manufacturing (GM) entails the implementation of renewable production methods and eco-friendly procedures in manufacturing businesses. This study helps manufacturers come up with recycling and creative products, and manufacturers can give back to the environment by protecting natural areas by getting rid of the obstacles that get in the way.
APA, Harvard, Vancouver, ISO, and other styles
18

Bayes, Chantelle. "The Cyborg Flâneur: Reimagining Urban Nature through the Act of Walking." M/C Journal 21, no. 4 (October 15, 2018). http://dx.doi.org/10.5204/mcj.1444.

Full text
Abstract:
The concept of the “writer flâneur”, as developed by Walter Benjamin, sought to make sense of the seemingly chaotic nineteenth century city. While the flâneur provided a way for new urban structures to be ordered, it was also a transgressive act that involved engaging with urban spaces in new ways. In the contemporary city, where spaces are now heavily controlled and ordered, some members of the city’s socio-ecological community suffer as a result of idealistic notions of who and what belongs in the city, and how we must behave as urban citizens. Many of these ideals emerge from nineteenth century conceptions of the city in contrast to the country (Williams). However, a reimagining of the flâneur can allow for new transgressions of urban space and result in new literary imaginaries that capture the complexity of urban environments, question some of the more damaging processes and systems, offer new ways of connecting with the city, and propose alternative ways of living with the non-human in such places. With reference to the work of Debra Benita Shaw, Rob Shields and Donna Haraway, I will examine how the urban walking figure might be reimagined as cyborg, complicating boundaries between the real and imagined, the organic and inorganic, and between the human and non-human (Haraway Cyborgs). I will argue that the cyborg flâneur allows for new ways of writing and reading the urban and can work to reimagine the city as posthuman multispecies community. As one example of cyborg flânerie, I look to the app Story City to show how a writer can develop new environmental imaginaries in situ as an act of resistance against the anthropocentric ordering of the city. This article intends to begin a conversation about the ethical, political and epistemological potential of cyborg flânerie and leads to several questions which will require further research.Shaping the City: Environmental ImaginariesIn a sense, the flâneur is the product of a utopian imaginary of the city. According to Shields, Walter Benjamin used the flâneur as a literary device to make sense of the changing modern city of Paris: The flâneur is a hero who excels under the stress of coming to terms with a changing ‘social spatialisation’ of everyday social and economic relations which in the nineteenth century increasingly extended the world of the average person further and further to include rival mass tourism destinations linked by railroad, news of other European powers and distant colonies. This expanding spatialization took the form of economic realities such as changing labour markets and commodity prices and social encounters with strangers and foreigners which impinged on the life world of Europeans. (Fancy Footwork 67)Through his writing, these new spaces and inhabitants were made familiar again to those that lived there. In consequence, the flâneur was seen as a heroic figure who approached the city like a wilderness to be studied and tamed:Even to early 20th-century sociologists the flâneur was a heroic everyman—masculine, controlled and as in tune with his environment as James Fenimore Cooper’s Mohican braves were in their native forests. Anticipating the hardboiled hero of the detective novel, the flâneur pursued clues to the truth of the metropolis, attempting to think through its historical specificity, to inhabit it, even as the truth of empire and commodity capitalism was hidden from him. (Shields Flanerie 210)In this way, the flâneur was a stabilising force, categorising and therefore ordering the city. However, flânerie was also a transgressive act as the walker engaged in eccentric and idle wandering against the usual purposeful walking practices of the time (Coates). Drawing on this aspect, flânerie has increasingly been employed in the humanities and social sciences as a practice of resistance as Jamie Coates has shown. This makes the flâneur, albeit in a refigured form, a useful tool for transgressing strict socio-ecological conventions that affect the contemporary city.Marginalised groups are usually the most impacted by the strict control and ordering of contemporary urban spaces in response to utopian imaginaries of who and what belong. Marginalised people are discouraged and excluded from living in particular areas of the city through urban policy and commercial practices (Shaw 7). Likewise, certain non-human others, like birds, are allowed to inhabit our cities while those that don’t fit ideal urban imaginaries, like bats or snakes, are controlled, excluded or killed (Low). Defensive architecture, CCTV, and audio deterrents are often employed in cities to control public spaces. In London, the spiked corridor of a shop entrance designed to keep homeless people from sleeping there (Andreou; Borromeo) mirrors the spiked ledges that keep pigeons from resting on buildings (observed 2012/2014). On the Gold Coast youths are deterred from loitering in public spaces with classical music (observed 2013–17), while in Brisbane predatory bird calls are played near outdoor restaurants to discourage ibis from pestering customers (Hinchliffe and Begley). In contrast, bright lights, calming music and inviting scents are used to welcome orderly consumers into shopping centres while certain kinds of plants are cultivated in urban parks and gardens to attract acceptable wildlife like butterflies and lorikeets (Wilson; Low). These ways of managing public spaces are built on utopian conceptions of the city as a “civilising” force—a place of order, consumption and safety.As environmental concerns become more urgent, it is important to re-examine these conceptions of urban environments and the assemblage of environmental imaginaries that interact and continue to shape understandings of and attitudes towards human and non-human nature. The network of goods, people and natural entities that feed into and support the city mean that imaginaries shaped in urban areas influence both urban and surrounding peoples and ecologies (Braun). Local ecologies also become threatened as urban structures and processes continue to encompass more of the world’s populations and locales, often displacing and damaging entangled natural/cultural entities in the process. Furthermore, conceptions and attitudes shaped in the city often feed into global systems and as such can have far reaching implications for the way local ecologies are governed, built, and managed. There has already been much research, including work by Lawrence Buell and Ursula Heise, on the contribution that art and literature can make to the development of environmental imaginaries, whether intentional or unintentional, and resulting in both positive and negative associations with urban inhabitants (Yusoff and Gabrys; Buell; Heise). Imaginaries might be understood as social constructs through which we make sense of the world and through which we determine cultural and personal values, attitudes and beliefs. According to Neimanis et al., environmental imaginaries help us to make sense of the way physical environments shape “one’s sense of social belonging” as well as how we “formulate—and enact—our values and attitudes towards ‘nature’” (5). These environmental imaginaries underlie urban structures and work to determine which aspects of the city are valued, who is welcomed into the city, and who is excluded from participation in urban systems and processes. The development of new narrative imaginaries can question some of the underlying assumptions about who or what belongs in the city and how we might settle conflicts in ecologically diverse communities. The reimagined flâneur then might be employed to transgress traditional notions of belonging in the city and replace this with a sense of “becoming” in relation with the myriad of others inhabiting the city (Haraway The Trouble). Like the Benjaminian flâneur, the postmodern version enacts a similar transgressive walking practice. However, the postmodern flâneur serves to resist dominant narratives, with a “greater focus on the tactile and grounded qualities of walking” than the traditional flâneur—and, as opposed to the lone detached wanderer, postmodern flâneur engage in a network of social relationships and may even wander in groups (Coates 32). By employing the notion of the postmodern flâneur, writers might find ways to address problematic urban imaginaries and question dominant narratives about who should and should not inhabit the city. Building on this and in reference to Haraway (Cyborgs), the notion of a cyborg flâneur might take this resistance one step further, not only seeking to counter the dominant social narratives that control urban spaces but also resisting anthropocentric notions of the city. Where the traditional flâneur walked a pet tortoise on a leash, the cyborg flâneur walks with a companion species (Shields Fancy Footwork; Haraway Companion Species). The distinction is subtle. The traditional flâneur walks a pet, an object of display that showcases the eccentric status of the owner. The cyborg flâneur walks in mutual enjoyment with a companion (perhaps a domestic companion, perhaps not); their path negotiated together, tracked, and mapped via GPS. The two acts may at first appear the same, but the difference is in the relationship between the human, non-human, and the multi-modal spaces they occupy. As Coates argues, not everyone who walks is a flâneur and similarly, not everyone who engages in relational walking is a cyborg flâneur. Rather a cyborg flâneur enacts a deliberate practice of walking in relation with naturecultures to transgress boundaries between human and non-human, cultural and natural, and the virtual, material and imagined spaces that make up a place.The Posthuman City: Cyborgs, Hybrids, and EntanglementsIn developing new environmental imaginaries, posthuman conceptions of the city can be drawn upon to readdress urban space as complex, questioning utopian notions of the city particularly as they relate to the exclusion of certain others, and allowing for diverse socio-ecological communities. The posthuman city might be understood in opposition to anthropocentric notions where the non-human is seen as something separate to culture and in need of management and control within the human sphere of the city. Instead, the posthuman city is a complex entanglement of hybrid non-human, cultural and technological entities (Braun; Haraway Companion Species). The flâneur who experiences the city through a posthuman lens acknowledges the human as already embodied and embedded in the non-human world. Key to re-imagining the city is recognising the myriad ways in which non-human nature also acts upon us and influences decisions on how we live in cities (Schliephake 140). This constitutes a “becoming-with each other”, in Haraway’s terms, which recognises the interdependency of urban inhabitants (The Trouble 3). In re-considering the city as a negotiated process between nature and culture rather than a colonisation of nature by culture, the agency of non-humans to contribute to the construction of cities and indeed environmental imaginaries must be acknowledged. Living in the posthuman city requires us humans to engage with the city on multiple levels as we navigate the virtual, corporeal, and imagined spaces that make up the contemporary urban experience. The virtual city is made up of narratives projected through media productions such as tourism campaigns, informational plaques, site markers, and images on Google map locations, all of which privilege certain understandings of the city. Virtual narratives serve to define the city through a network of historical and spatially determined locales. Closely bound up with the virtual is the imagined city that draws on urban ideals, potential developments, mythical or alternative versions of particular cities as well as literary interpretations of cities. These narratives are overlaid on the places that we engage with in our everyday lived experiences. Embodied encounters with the city serve to reinforce or counteract certain virtual and imagined versions while imagined and virtual narratives enhance locales by placing current experience within a temporal narrative that extends into the past as well as the future. Walking the City: The Cyber/Cyborg FlâneurThe notion of the cyber flâneur emerged in the twenty-first century from the practices of idly surfing the Internet, which in many ways has become an extension of the cityscape. In the contemporary world where we exist in both physical and digital spaces, the cyber flâneur (and indeed its cousin the virtual flâneur) have been employed to make sense of new digital sites of connection, voyeurism, and consumption. Metaphors that evoke the city have often been used to describe the experience of the digital including “chat rooms”, “cyber space”, and “home pages” while new notions of digital tourism, the rise of online shopping, and meeting apps have become substitutes for engaging with the physical sites of cities such as shopping malls, pubs, and attractions. The flâneur and cyberflâneur have helped to make sense of the complexities and chaos of urban life so that it might become more palatable to the inhabitants, reducing anxieties about safety and disorder. However, as with the concept of the flâneur, implicit in the cyberflâneur is a reinforcement of traditional urban hierarchies and social structures. This categorising has also worked to solidify notions of who belongs and who does not. Therefore, as Debra Benita Shaw argues, the cyberflâneur is not able to represent the complexities of “how we inhabit and experience the hybrid spaces of contemporary cities” (3). Here, Shaw suggests that Haraway’s cyborg might be used to interrupt settled boundaries and to reimagine the urban walking figure. In both Shaw and Shields (Flanerie), the cyborg is invoked as a solution to the problematic figure of the flâneur. While Shaw presents these figures in opposition and proposes that the flâneur be laid to rest as the cyborg takes its place, I argue that the idea of the flâneur may still have some use, particularly when applied to new multi-modal narratives. As Shields demonstrates, the cyborg operates in the virtual space of simulation rather than at the material level (217). Instead of setting up an opposition between the cyborg and flâneur, these figures might be merged to bring the cyborg into being through the material practice of flânerie, while refiguring the flâneur as posthuman. The traditional flâneur sought to define space, but the cyborg flâneur might be seen to perform space in relation to an entangled natural/cultural community. By drawing on this notion of the cyborg, it becomes possible to circumvent some of the traditional associations with the urban walking figure and imagine a new kind of flâneur, one that walks the streets as an act to complicate rather than compartmentalise urban space. As we emerge into a post-truth world where facts and fictions blur, creative practitioners can find opportunities to forge new ways of knowing, and new ways of connecting with the city through the cyborg flâneur. The development of new literary imaginaries can reconstruct natural/cultural relationships and propose alternative ways of living in a posthuman and multispecies community. The rise of smart-phone apps like Story City provides cyborg flâneurs with the ability to create digital narratives overlaid on real places and has the potential to encourage real connections with urban environments. While these apps are by no means the only activity that a cyborg flâneur might participate in, they offer the writer a platform to engage audiences in a purposeful and transgressive practice of cyborg flânerie. Such narratives produced through cyborg flânerie would conflate virtual, corporeal, and imagined experiences of the city and allow for new environmental imaginaries to be created in situ. The “readers” of these narratives can also become cyborg flâneurs as the traditional urban wanderer is combined with the virtual and imagined space of the contemporary city. As opposed to wandering the virtual city online, readers are encouraged to physically walk the city and engage with the narrative in situ. For example, in one narrative, readers are directed to walk a trail along the Brisbane river or through the CBD to chase a sea monster (Wilkins and Diskett). The reader can choose different pre-set paths which influence the outcome of each story and embed the story in a physical location. In this way, the narrative is layered onto the real streets and spaces of the cityscape. As the reader is directed to walk particular routes through the city, the narratives which unfold are also partly constructed by the natural/cultural entities which make up those locales establishing a narrative practice which engages with the urban on a posthuman level. The murky water of the Brisbane River could easily conceal monsters. Occasional sightings of crocodiles (Hall), fish that leap from the water, and shadows cast by rippling waves as the City Cat moves across the surface impact the experience of the story (observed 2016–2017). Potential exists to capitalise on this narrative form and develop new environmental imaginaries that pay attention to the city as a posthuman place. For example, a narrative might direct the reader’s attention to the networks of water that hydrate people and animals, allow transportation, and remove wastes from the city. People may also be directed to explore their senses within place, be encouraged to participate in sensory gardens, or respond to features of the city in new ways. The cyborg flâneur might be employed in much the same way as the flâneur, to help the “reader” make sense of the posthuman city, where boundaries are shifted, and increasing rates of social and ecological change are transforming contemporary urban sites and structures. Shields asks whether the cyborg might also act as “a stabilising figure amidst the collapse of dualisms, polluted categories, transgressive hybrids, and unstable fluidity” (Flanerie 211). As opposed to the traditional flâneur however, this “stabilising” figure doesn’t sort urban inhabitants into discrete categories but maps the many relations between organisms and technologies, fictions and realities, and the human and non-human. The cyborg flâneur allows for other kinds of “reading” of the city to take place—including those by women, families, and non-Western inhabitants. As opposed to the nineteenth century reader-flâneur, those who read the city through the Story City app are also participants in the making of the story, co-constructing the narrative along with the author and locale. I would argue this participation is a key feature of the cyborg flâneur narrative along with the transience of the narratives which may alter and eventually expire as urban structures and environments change. Not all those who engage with these narratives will necessarily enact a posthuman understanding and not all writers of these narratives will do so as cyborg flâneurs. Nevertheless, platforms such as Story City provide writers with an opportunity to engage participants to question dominant narratives of the city and to reimagine themselves within a multispecies community. In addition, by bringing readers into contact with the human and non-human entities that make up the city, there is potential for real relationships to be established. Through new digital platforms such as apps, writers can develop new environmental imaginaries that question urban ideals including conceptions about who belongs in the city and who does not. The notion of the cyborg is a useful concept through which to reimagine the city as a negotiated process between nature and culture, and to reimagine the flâneur as performer who becomes part of the posthuman city as they walk the streets. This article provides one example of cyborg flânerie in smart-phone apps like Story City that allow writers to construct new urban imaginaries, bring the virtual and imagined city into the physical spaces of the urban environment, and can act to re-place the reader in diverse socio-ecological communities. The reader then becomes both product and constructer of urban space, a cyborg flâneur in the cyborg city. This conversation raises further questions about the cyborg flâneur, including: how might cyborg flânerie be enacted in other spaces (rural, virtual, more-than-human)? What other platforms and narrative forms might cyborg flâneurs use to share their posthuman narratives? How might cyborg flânerie operate in other cities, other cultures and when adopted by marginalised groups? In answering these questions, the potential and limitations of the cyborg flâneur might be refined. The hope is that one day the notion of a cyborg flâneur will no longer necessary as the posthuman city becomes a space of negotiation rather than exclusion. ReferencesAndreou, Alex. “Anti-Homeless Spikes: ‘Sleeping Rough Opened My Eyes to the City’s Barbed Cruelty.’” The Guardian 19 Feb. 2015. 25 Aug. 2017 <https://www.theguardian.com/society/2015/feb/18/defensive-architecture-keeps-poverty-undeen-and-makes-us-more-hostile>.Borromeo, Leah. “These Anti-Homeless Spikes Are Brutal. We Need to Get Rid of Them.” The Guardian 23 Jul. 2015. 25 Aug. 2017 <https://www.theguardian.com/commentisfree/2015/jul/23/anti-homeless-spikes-inhumane-defensive-architecture>.Braun, Bruce. “Environmental Issues: Writing a More-than-Human Urban Geography.” Progress in Human Geography 29.5 (2005): 635–50. Buell, Lawrence. The Future of Environmental Criticism: Environmental Crisis and Literary Imagination. Malden: Blackwell, 2005.Coates, Jamie. “Key Figure of Mobility: The Flâneur.” Social Anthropology 25.1 (2017): 28–41.Hall, Peter. “Crocodiles Spotted in Queensland: A Brief History of Sightings and Captures in the Southeast.” The Courier Mail 4 Jan. 2017. 20 Aug. 2017 <http://www.couriermail.com.au/news/queensland/crocodiles-spotted-in-queensland-a-brief-history-of-sightings-and-captures-in-the-southeast/news-story/5fbb2d44bf3537b8a6d1f6c8613e2789>.Haraway, Donna J. Staying with the Trouble: Making Kin in the Chthulucene. Durham: Duke UP, 2016.———. The Companion Species Manifesto: Dogs, People, and Significant Otherness. Vol. 1. Chicago: Prickly Paradigm Press, 2003.———. Simians, Cyborgs, and Women: The Reinvention of Nature. Oxon: Routledge, 1991.Heise, Ursula K. Sense of Place and Sense of Planet: The Environmental Imagination of the Global. Oxford: Oxford UP, 2008. Hinchliffe, Jessica, and Terri Begley. “Brisbane’s Angry Birds: Recordings No Deterrent for Nosey Ibis at South Bank.” ABC News 2 Jun. 2015. 25 Aug. 2017 <http://www.abc.net.au/news/2015-02-06/recorded-bird-noise-not-detering-south-banks-angry-birds/6065610>.Low, Tim. The New Nature: Winners and Losers in Wild Australia. London: Penguin, 2002.Neimanis, Astrid, Cecilia Asberg, and Suzi Hayes. “Posthumanist Imaginaries.” Research Handbook on Climate Governance. Eds. K. Bäckstrand and E. Lövbrand. Massachusetts: Edward Elgar Publishing, 2015. 480–90.Schliephake, Christopher. Urban Ecologies: City Space, Material Agency, and Environmental Politics in Contemporary Culture. Maryland: Lexington Books, 2014.Shaw, Debra Benita. “Streets for Cyborgs: The Electronic Flâneur and the Posthuman City.” Space and Culture 18.3 (2015): 230–42.Shields, Rob. “Fancy Footwork: Walter Benjamin’s Notes on Flânerie.” The Flâneur. Ed. Keith Tester. London: Routledge, 2014. 61–80.———. “Flânerie for Cyborgs.” Theory, Culture & Society 23.7-8 (2006): 209–20.Yusoff, Kathryn, and Jennifer Gabrys. “Climate Change and the Imagination.” Wiley Interdisciplinary Reviews: Climate Change 2.4 (2011): 516–34.Wilkins, Kim, and Joseph Diskett. 9 Fathom Deep. Brisbane: Story City, 2014. Williams, Raymond. The Country and the City. New York: Oxford UP, 1975.Wilson, Alexander. The Culture of Nature: North American Landscape from Disney to the Exxon Valdez. Toronto: Between the Lines, 1991.
APA, Harvard, Vancouver, ISO, and other styles
19

Jethani, Suneel. "Lists, Spatial Practice and Assistive Technologies for the Blind." M/C Journal 15, no. 5 (October 12, 2012). http://dx.doi.org/10.5204/mcj.558.

Full text
Abstract:
IntroductionSupermarkets are functionally challenging environments for people with vision impairments. A supermarket is likely to house an average of 45,000 products in a median floor-space of 4,529 square meters and many visually impaired people are unable to shop without assistance, which greatly impedes personal independence (Nicholson et al.). The task of selecting goods in a supermarket is an “activity that is expressive of agency, identity and creativity” (Sutherland) from which many vision-impaired persons are excluded. In response to this, a number of proof of concept (demonstrating feasibility) and prototype assistive technologies are being developed which aim to use smart phones as potential sensorial aides for vision impaired persons. In this paper, I discuss two such prototypic technologies, Shop Talk and BlindShopping. I engage with this issue’s list theme by suggesting that, on the one hand, list making is a uniquely human activity that demonstrates our need for order, reliance on memory, reveals our idiosyncrasies, and provides insights into our private lives (Keaggy 12). On the other hand, lists feature in the creation of spatial inventories that represent physical environments (Perec 3-4, 9-10). The use of lists in the architecture of assistive technologies for shopping illuminates the interaction between these two modalities of list use where items contained in a list are not only textual but also cartographic elements that link the material and immaterial in space and time (Haber 63). I argue that despite the emancipatory potential of assistive shopping technologies, their efficacy in practical situations is highly dependent on the extent to which they can integrate a number of lists to produce representations of space that are meaningful for vision impaired users. I suggest that the extent to which these prototypes may translate to becoming commercially viable, widely adopted technologies is heavily reliant upon commercial and institutional infrastructures, data sources, and regulation. Thus, their design, manufacture and adoption-potential are shaped by the extent to which certain data inventories are accessible and made interoperable. To overcome such constraints, it is important to better understand the “spatial syntax” associated with the shopping task for a vision impaired person; that is, the connected ordering of real and virtual spatial elements that result in a supermarket as a knowable space within which an assisted “spatial practice” of shopping can occur (Kellerman 148, Lefebvre 16).In what follows, I use the concept of lists to discuss the production of supermarket-space in relation to the enabling and disabling potentials of assistive technologies. First, I discuss mobile digital technologies relative to disability and impairment and describe how the shopping task produces a disabling spatial practice. Second, I present a case study showing how assistive technologies function in aiding vision impaired users in completing the task of supermarket shopping. Third, I discuss various factors that may inhibit the liberating potential of technology assisted shopping by vision-impaired people. Addressing Shopping as a Disabling Spatial Practice Consider how a shopping list might inform one’s experience of supermarket space. The way shopping lists are written demonstrate the variability in the logic that governs list writing. As Bill Keaggy demonstrates in his found shopping list Web project and subsequent book, Milk, Eggs, Vodka, a shopping list may be written on a variety of materials, be arranged in a number of orientations, and the writer may use differing textual attributes, such as size or underlining to show emphasis. The writer may use longhand, abbreviate, write neatly, scribble, and use an array of alternate spelling and naming conventions. For example, items may be listed based on knowledge of the location of products, they may be arranged on a list as a result of an inventory of a pantry or fridge, or they may be copied in the order they appear in a recipe. Whilst shopping, some may follow strictly the order of their list, crossing back and forth between aisles. Some may work through their list item-by-item, perhaps forward scanning to achieve greater economies of time and space. As a person shops, their memory may be stimulated by visual cues reminding them of products they need that may not be included on their list. For the vision impaired, this task is near impossible to complete without the assistance of a relative, friend, agency volunteer, or store employee. Such forms of assistance are often unsatisfactory, as delays may be caused due to the unavailability of an assistant, or the assistant having limited literacy, knowledge, or patience to adequately meet the shopper’s needs. Home delivery services, though readily available, impede personal independence (Nicholson et al.). Katie Ellis and Mike Kent argue that “an impairment becomes a disability due to the impact of prevailing ableist social structures” (3). It can be said, then, that supermarkets function as a disability producing space for the vision impaired shopper. For the vision impaired, a supermarket is a “hegemonic modern visual infrastructure” where, for example, merchandisers may reposition items regularly to induce customers to explore areas of the shop that they wouldn’t usually, a move which adds to the difficulty faced by those customers with impaired vision who work on the assumption that items remain as they usually are (Schillmeier 161).In addressing this issue, much emphasis has been placed on the potential of mobile communications technologies in affording vision impaired users greater mobility and flexibility (Jolley 27). However, as Gerard Goggin argues, the adoption of mobile communication technologies has not necessarily “gone hand in hand with new personal and collective possibilities” given the limited access to standard features, even if the device is text-to-speech enabled (98). Issues with Digital Rights Management (DRM) limit the way a device accesses and reproduces information, and confusion over whether audio rights are needed to convert text-to-speech, impede the accessibility of mobile communications technologies for vision impaired users (Ellis and Kent 136). Accessibility and functionality issues like these arise out of the needs, desires, and expectations of the visually impaired as a user group being considered as an afterthought as opposed to a significant factor in the early phases of design and prototyping (Goggin 89). Thus, the development of assistive technologies for the vision impaired has been left to third parties who must adopt their solutions to fit within certain technical parameters. It is valuable to consider what is involved in the task of shopping in order to appreciate the considerations that must be made in the design of shopping intended assistive technologies. Shopping generally consists of five sub-tasks: travelling to the store; finding items in-store; paying for and bagging items at the register; exiting the store and getting home; and, the often overlooked task of putting items away once at home. In this process supermarkets exhibit a “trichotomous spatial ontology” consisting of locomotor space that a shopper moves around the store, haptic space in the immediate vicinity of the shopper, and search space where individual products are located (Nicholson et al.). In completing these tasks, a shopper will constantly be moving through and switching between all three of these spaces. In the next section I examine how assistive technologies function in producing supermarkets as both enabling and disabling spaces for the vision impaired. Assistive Technologies for Vision Impaired ShoppersJason Farman (43) and Adriana de Douza e Silva both argue that in many ways spaces have always acted as information interfaces where data of all types can reside. Global Positioning System (GPS), Radio Frequency Identification (RFID), and Quick Response (QR) codes all allow for practically every spatial encounter to be an encounter with information. Site-specific and location-aware technologies address the desire for meaningful representations of space for use in everyday situations by the vision impaired. Further, the possibility of an “always-on” connection to spatial information via a mobile phone with WiFi or 3G connections transforms spatial experience by “enfolding remote [and latent] contexts inside the present context” (de Souza e Silva). A range of GPS navigation systems adapted for vision-impaired users are currently on the market. Typically, these systems convert GPS information into text-to-speech instructions and are either standalone devices, such as the Trekker Breeze, or they use the compass, accelerometer, and 3G or WiFi functions found on most smart phones, such as Loadstone. Whilst both these products are adequate in guiding a vision-impaired user from their home to a supermarket, there are significant differences in their interfaces and data architectures. Trekker Breeze is a standalone hardware device that produces talking menus, maps, and GPS information. While its navigation functionality relies on a worldwide radio-navigation system that uses a constellation of 24 satellites to triangulate one’s position (May and LaPierre 263-64), its map and text-to-speech functionality relies on data on a DVD provided with the unit. Loadstone is an open source software system for Nokia devices that has been developed within the vision-impaired community. Loadstone is built on GNU General Public License (GPL) software and is developed from private and user based funding; this overcomes the issue of Trekker Breeze’s reliance on trading policies and pricing models of the few global vendors of satellite navigation data. Both products have significant shortcomings if viewed in the broader context of the five sub-tasks involved in shopping described above. Trekker Breeze and Loadstone require that additional devices be connected to it. In the case of Trekker Breeze it is a tactile keypad, and with Loadstone it is an aftermarket screen reader. To function optimally, Trekker Breeze requires that routes be pre-recorded and, according to a review conducted by the American Foundation for the Blind, it requires a 30-minute warm up time to properly orient itself. Both Trekker Breeze and Loadstone allow users to create and share Points of Interest (POI) databases showing the location of various places along a given route. Non-standard or duplicated user generated content in POI databases may, however, have a negative effect on usability (Ellis and Kent 2). Furthermore, GPS-based navigation systems are accurate to approximately ten metres, which means that users must rely on their own mobility skills when they are required to change direction or stop for traffic. This issue with GPS accuracy is more pronounced when a vision-impaired user is approaching a supermarket where they are likely to encounter environmental hazards with greater frequency and both pedestrian and vehicular traffic in greater density. Here the relations between space defined and spaces poorly defined or undefined by the GPS device interact to produce the supermarket surrounds as a disabling space (Galloway). Prototype Systems for Supermarket Navigation and Product SelectionIn the discussion to follow, I look at two prototype systems using QR codes and RFID that are designed to be used in-store by vision-impaired shoppers. Shop Talk is a proof of concept system developed by researchers at Utah State University that uses synthetic verbal route directions to assist vision impaired shoppers with supermarket navigation, product search, and selection (Nicholson et al.). Its hardware consists of a portable computational unit, a numeric keypad, a wireless barcode scanner and base station, headphones for the user to receive the synthetic speech instructions, a USB hub to connect all the components, and a backpack to carry them (with the exception of the barcode scanner) which has been slightly modified with a plastic stabiliser to assist in correct positioning. Shop Talk represents the supermarket environment using two data structures. The first is comprised of two elements: a topological map of locomotor space that allows for directional labels of “left,” “right,” and “forward,” to be added to the supermarket floor plan; and, for navigation of haptic space, the supermarket inventory management system, which is used to create verbal descriptions of product information. The second data structure is a Barcode Connectivity Matrix (BCM), which associates each shelf barcode with several pieces of information such as aisle, aisle side, section, shelf, position, Universal Product Code (UPC) barcode, product description, and price. Nicholson et al. suggest that one of their “most immediate objectives for future work is to migrate the system to a more conventional mobile platform” such as a smart phone (see Mobile Shopping). The Personalisable Interactions with Resources on AMI-Enabled Mobile Dynamic Environments (PRIAmIDE) research group at the University of Deusto is also approaching Ambient Assisted Living (AAL) by exploring the smart phone’s sensing, communication, computing, and storage potential. As part of their work, the prototype system, BlindShopping, was developed to address the issue of assisted shopping using entirely off-the-shelf technology with minimal environmental adjustments to navigate the store and search, browse and select products (López-de-Ipiña et al. 34). Blind Shopping’s architecture is based on three components. Firstly, a navigation system provides the user with synthetic verbal instructions to users via headphones connected to the smart phone device being used in order to guide them around the store. This requires a RFID reader to be attached to the tip of the user’s white cane and road-marking-like RFID tag lines to be distributed throughout the aisles. A smartphone application processes the RFID data that is received by the smart phone via Bluetooth generating the verbal navigation commands as a result. Products are recognised by pointing a QR code reader enabled smart phone at an embossed code located on a shelf. The system is managed by a Rich Internet Application (RIA) interface, which operates by Web browser, and is used to register the RFID tags situated in the aisles and the QR codes located on shelves (López-de-Ipiña and 37-38). A typical use-scenario for Blind Shopping involves a user activating the system by tracing an “L” on the screen or issuing the “Location” voice command, which activates the supermarket navigation system which then asks the user to either touch an RFID floor marking with their cane or scan a QR code on a nearby shelf to orient the system. The application then asks the user to dictate the product or category of product that they wish to locate. The smart phone maintains a continuous Bluetooth connection with the RFID reader to keep track of user location at all times. By drawing a “P” or issuing the “Product” voice command, a user can switch the device into product recognition mode where the smart phone camera is pointed at an embossed QR code on a shelf to retrieve information about a product such as manufacturer, name, weight, and price, via synthetic speech (López-de-Ipiña et al. 38-39). Despite both systems aiming to operate with as little environmental adjustment as possible, as well as minimise the extent to which a supermarket would need to allocate infrastructural, administrative, and human resources to implementing assistive technologies for vision impaired shoppers, there will undoubtedly be significant establishment and maintenance costs associated with the adoption of production versions of systems resembling either prototype described in this paper. As both systems rely on data obtained from a server by invoking Web services, supermarkets would need to provide in-store WiFi. Further, both systems’ dependence on store inventory data would mean that commercial versions of either of these systems are likely to be supermarket specific or exclusive given that there will be policies in place that forbid access to inventory systems, which contain pricing information to third parties. Secondly, an assumption in the design of both prototypes is that the shopping task ends with the user arriving at home; this overlooks the important task of being able to recognise products in order to put them away or to use at a later time.The BCM and QR product recognition components of both respective prototypic systems associates information to products in order to assist users in the product search and selection sub-tasks. However, information such as use-by dates, discount offers, country of manufacture, country of manufacturer’s origin, nutritional information, and the labelling of products as Halal, Kosher, containing alcohol, nuts, gluten, lactose, phenylalanine, and so on, create further challenges in how different data sources are managed within the devices’ software architecture. The reliance of both systems on existing smartphone technology is also problematic. Changes in the production and uptake of mobile communication devices, and the software that they operate on, occurs rapidly. Once the fit-out of a retail space with the necessary instrumentation in order to accommodate a particular system has occurred, this system is unlikely to be able to cater to the requirement for frequent upgrades, as built environments are less flexible in the upgrading of their technological infrastructure (Kellerman 148). This sets up a scenario where the supermarket may persist as a disabling space due to a gap between the functional capacities of applications designed for mobile communication devices and the environments in which they are to be used. Lists and Disabling Spatial PracticeThe development and provision of access to assistive technologies and the data they rely upon is a commercial issue (Ellis and Kent 7). The use of assistive technologies in supermarket-spaces that rely on the inter-functional coordination of multiple inventories may have the unintended effect of excluding people with disabilities from access to legitimate content (Ellis and Kent 7). With de Certeau, we can ask of supermarket-space “What spatial practices correspond, in the area where discipline is manipulated, to these apparatuses that produce a disciplinary space?" (96).In designing assistive technologies, such as those discussed in this paper, developers must strive to achieve integration across multiple data inventories. Software architectures must be optimised to overcome issues relating to intellectual property, cross platform access, standardisation, fidelity, potential duplication, and mass-storage. This need for “cross sectioning,” however, “merely adds to the muddle” (Lefebvre 8). This is a predicament that only intensifies as space and objects in space become increasingly “representable” (Galloway), and as the impetus for the project of spatial politics for the vision impaired moves beyond representation to centre on access and meaning-making.ConclusionSupermarkets act as sites of hegemony, resistance, difference, and transformation, where the vision impaired and their allies resist the “repressive socialization of impaired bodies” through their own social movements relating to environmental accessibility and the technology assisted spatial practice of shopping (Gleeson 129). It is undeniable that the prototype technologies described in this paper, and those like it, indeed do have a great deal of emancipatory potential. However, it should be understood that these devices produce representations of supermarket-space as a simulation within a framework that attempts to mimic the real, and these representations are pre-determined by the industrial, technological, and regulatory forces that govern their production (Lefebvre 8). Thus, the potential of assistive technologies is dependent upon a range of constraints relating to data accessibility, and the interaction of various kinds of lists across the geographic area that surrounds the supermarket, locomotor, haptic, and search spaces of the supermarket, the home-space, and the internal spaces of a shopper’s imaginary. These interactions are important in contributing to the reproduction of disability in supermarkets through the use of assistive shopping technologies. The ways by which people make and read shopping lists complicate the relations between supermarket-space as location data and product inventories versus that which is intuited and experienced by a shopper (Sutherland). Not only should we be creating inventories of supermarket locomotor, haptic, and search spaces, the attention of developers working in this area of assistive technologies should look beyond the challenges of spatial representation and move towards a focus on issues of interoperability and expanded access of spatial inventory databases and data within and beyond supermarket-space.ReferencesDe Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California Press, 1984. Print.De Souza e Silva, A. “From Cyber to Hybrid: Mobile Technologies As Interfaces of Hybrid Spaces.” Space and Culture 9.3 (2006): 261-78.Ellis, Katie, and Mike Kent. Disability and New Media. New York: Routledge, 2011.Farman, Jason. Mobile Interface Theory: Embodied Space and Locative Media. New York: Routledge, 2012.Galloway, Alexander. “Are Some Things Unrepresentable?” Theory, Culture and Society 28 (2011): 85-102.Gleeson, Brendan. Geographies of Disability. London: Routledge, 1999.Goggin, Gerard. Cell Phone Culture: Mobile Technology in Everyday Life. London: Routledge, 2006.Haber, Alex. “Mapping the Void in Perec’s Species of Spaces.” Tattered Fragments of the Map. Ed. Adam Katz and Brian Rosa. S.l.: Thelimitsoffun.org, 2009.Jolley, William M. When the Tide Comes in: Towards Accessible Telecommunications for People with Disabilities in Australia. Sydney: Human Rights and Equal Opportunity Commission, 2003.Keaggy, Bill. Milk Eggs Vodka: Grocery Lists Lost and Found. Cincinnati, Ohio: HOW Books, 2007.Kellerman, Aharon. Personal Mobilities. London: Routledge, 2006.Kleege, Georgia. “Blindness and Visual Culture: An Eyewitness Account.” The Disability Studies Reader. 2nd edition. Ed. Lennard J. Davis. New York: Routledge, 2006. 391-98.Lefebvre, Henri. The Production of Space. Oxford, UK: Blackwell, 1991.López-de-Ipiña, Diego, Tania Lorido, and Unai López. “Indoor Navigation and Product Recognition for Blind People Assisted Shopping.” Ambient Assisted Living. Ed. J. Bravo, R. Hervás, and V. Villarreal. Berlin: Springer-Verlag, 2011. 25-32. May, Michael, and Charles LaPierre. “Accessible Global Position System (GPS) and Related Orientation Technologies.” Assistive Technology for Visually Impaired and Blind People. Ed. Marion A. Hersh, and Michael A. Johnson. London: Springer-Verlag, 2008. 261-88. Nicholson, John, Vladimir Kulyukin, and Daniel Coster. “Shoptalk: Independent Blind Shopping Through Verbal Route Directions and Barcode Scans.” The Open Rehabilitation Journal 2.1 (2009): 11-23.Perec, Georges. Species of Spaces and Other Pieces. Trans. and Ed. John Sturrock. London: Penguin Books, 1997.Schillmeier, Michael W. J. Rethinking Disability: Bodies, Senses, and Things. New York: Routledge, 2010.Sutherland, I. “Mobile Media and the Socio-Technical Protocols of the Supermarket.” Australian Journal of Communication. 36.1 (2009): 73-84.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography