Journal articles on the topic 'Telecommunication systems Australia'

To see the other types of publications on this topic, follow the link: Telecommunication systems Australia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 journal articles for your research on the topic 'Telecommunication systems Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wilde, W., and Paul Swatman. "Federal Government Policy and Community Objectives in Regional Telecommunications: A SISP-Based Study of Ballarat." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 1 (April 1, 2006): 16–31. http://dx.doi.org/10.3390/jtaer1010003.

Full text
Abstract:
The decline of regional Australia in terms of wealth and population during the two decades since 1980 has compelled the Federal Government to intervene. In 1997 the Australian Federal Government devoted in excess of $A460 million to a grant award scheme called the Regional Telecommunication Infrastructure Fund (RTIF) in which regional communities identified local telecommunication problems and applied for funds to correct them. Our project examines, through the lens of a conceptual framework extended from and informed by Strategic Information Systems Planning (SISP), the effectiveness of the mechanism of this and similar schemes. The primary purpose of this paper is to present a study of the experience of Ballarat in relation to the Australian RTIF programme.
APA, Harvard, Vancouver, ISO, and other styles
2

Garcia-Retuerta, David, Pablo Chamoso, Guillermo Hernández, Agustín San Román Guzmán, Tan Yigitcanlar, and Juan M. Corchado. "An Efficient Management Platform for Developing Smart Cities: Solution for Real-Time and Future Crowd Detection." Electronics 10, no. 7 (March 24, 2021): 765. http://dx.doi.org/10.3390/electronics10070765.

Full text
Abstract:
A smart city is an environment that uses innovative technologies to make networks and services more flexible, effective, and sustainable with the use of information, digital, and telecommunication technologies, improving the city’s operations for the benefit of its citizens. Most cities incorporate data acquisition elements from their own systems or those managed by subcontracted companies that can be used to optimise their resources: energy consumption, smart meters, lighting, irrigation water consumption, traffic data, camera images, waste collection, security systems, pollution meters, climate data, etc. The city-as-a-platform concept is becoming popular and it is increasingly evident that cities must have efficient management systems capable of deploying, for instance, IoT platforms, open data, etc., and of using artificial intelligence intensively. For many cities, data collection is not a problem, but managing and analysing data with the aim of optimising resources and improving the lives of citizens is. This article presents deepint.net, a platform for capturing, integrating, analysing, and creating dashboards, alert systems, optimisation models, etc. This article shows how deepint.net has been used to estimate pedestrian traffic on the streets of Melbourne (Australia) using the XGBoost algorithm. Given the current situation, it is advisable not to transit urban roads when overcrowded, thus, the model proposed in this paper (and implemented with deepint.net) facilitates the identification of areas with less pedestrian traffic. This use case is an example of an efficient crowd management system, implemented and operated via a platform that offers many possibilities for the management of the data collected in smart territories and cities.
APA, Harvard, Vancouver, ISO, and other styles
3

Cosoli, Simone. "Implementation of the Listen-Before-Talk Mode for SeaSonde High-Frequency Ocean Radars." Journal of Marine Science and Engineering 8, no. 1 (January 19, 2020): 57. http://dx.doi.org/10.3390/jmse8010057.

Full text
Abstract:
The International Telecommunication Union (ITU) Resolution 612, in combination with Report ITU-R M2.234 (11/2011) and Recommendation ITU-R M.1874-1 (02/2013), regulates the use of the radiolocation services between 3 and 50 MHz to support high frequency oceanographic radar (HFR) operations. The operational frame for HFR systems include: band sharing capabilities, such as synchronization of the signal modulation; pulse shaping and multiple levels of filtering, to reduce out-of-band interferences; low radiated power; directional transmission antenna, to reduce emission over land. Resolution 612 also aims at reducing the use of spectral bands, either through the application of existing band-sharing capabilities, the reduction of the spectral leakage to neighboring frequency bands, or the development and implementation of listen-before-talk (LBT) capabilities. While the LBT mode is operational and commonly used at several phased-array HFR installations, the implementation to commercial direction-finding systems does not appear to be available yet. In this paper, a proof-of-concept is provided for the implementation of the LBT mode for commercial SeaSonde HFRs deployed in Australia, with potential for applications in other networks and installations elsewhere. Potential critical aspects for systems operated under this configuration are also pointed out. Both the receiver and the transmitter antennas may lose efficiency if the frequency offset from the resonant frequency or calibration pattern are too large. Radial resolution clearly degrades when a dynamical adaptation of the bandwidth is performed, which results in non-homogeneous spatial resolution and reduction of the quality of the data. A recommendation would be to perform the LBT-adapt scans after a full measurement cycle (1-h or 3-h, depending on the system configuration) is concluded. Mutual cross-interference from clock offsets between two HFR systems may bias the frequency scans when the site computers controlling data acquisitions are not properly time-synchronized.
APA, Harvard, Vancouver, ISO, and other styles
4

Boulais, Denis. "Sex Offspring Ratio and Radiofrequency Radiation Exposure." Journal of System Safety 53, no. 1 (April 1, 2017): 35–38. http://dx.doi.org/10.56094/jss.v53i1.100.

Full text
Abstract:
Radiofrequency (RF) radiation is a silent and invisible hazard for both high-access window cleaners and telecommunications riggers that can heat body tissue, resulting in injury. In this study, a total of 68 high-access window cleaners were interviewed to establish their sex offspring ratio. Results indicated that there was no significant variance to that of the general Australian population. The high-access window cleaning industry has a lower awareness of this hazard than the telecommunications industry. This study compares and contrasts its outcomes against a similar study within the telecommunications industry (n = 68), which also identified no significant variance. As mobile telecommunication networks expand, the risk for high-access window cleaners will increase. Therefore, the study recommended that high-access window cleaning companies should revise their safety systems to ensure this hazard is addressed. A further recommendation was that this study should be repeated in the future to determine if expanding telecommunications networks and increased potential exposure has affected sex offspring ratios.
APA, Harvard, Vancouver, ISO, and other styles
5

Soldani, David, Malcolm Shore, Jeremy Mitchell, and Mark A. Gregory. "The 4G to 5G Network Architecture Evolution in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (November 2, 2018): 1–30. http://dx.doi.org/10.18080/ajtde.v6n4.161.

Full text
Abstract:
This paper provides a review of selected design and security aspects of 5G systems and addresses key questions about the deployment scenarios of Next Generation Radio Access Networks in Australia. The paper first presents the most relevant 5G use cases for the Australian market in 2018-19, and beyond; 5G concept and definitions; 3GPP updates, in terms of system architecture and enabling technologies and corresponding timelines; and spectrum availability, linked to possible 5G deployments in Australia. Then, the paper discusses the 5G functional architecture, possible configuration options, enabling technologies and network migration strategies and related 5G security, in Australia and globally. This is followed by a description of the possible 5G deployment scenarios in a multivendor environment and includes, as a case study, the Huawei product portfolio and site solution in Australia. The paper concludes with a discussion on the potential benefits of a telecommunications security assurance centre to improve the whole-of-life security assurance of critical telecommunications infrastructure and why it is important for the Australia telecommunications sector.
APA, Harvard, Vancouver, ISO, and other styles
6

Soldani, David, Malcolm Shore, Jeremy Mitchell, and Mark A. Gregory. "The 4G to 5G Network Architecture Evolution in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (November 2, 2018): 1–30. http://dx.doi.org/10.18080/jtde.v6n4.161.

Full text
Abstract:
This paper provides a review of selected design and security aspects of 5G systems and addresses key questions about the deployment scenarios of Next Generation Radio Access Networks in Australia. The paper first presents the most relevant 5G use cases for the Australian market in 2018-19, and beyond; 5G concept and definitions; 3GPP updates, in terms of system architecture and enabling technologies and corresponding timelines; and spectrum availability, linked to possible 5G deployments in Australia. Then, the paper discusses the 5G functional architecture, possible configuration options, enabling technologies and network migration strategies and related 5G security, in Australia and globally. This is followed by a description of the possible 5G deployment scenarios in a multivendor environment and includes, as a case study, the Huawei product portfolio and site solution in Australia. The paper concludes with a discussion on the potential benefits of a telecommunications security assurance centre to improve the whole-of-life security assurance of critical telecommunications infrastructure and why it is important for the Australia telecommunications sector.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Yang, Mahbube Subhani, Azadeh Noori Hoshyar, Jianchun Li, and Huan Li. "Automated Health Condition Diagnosis of in situ Wood Utility Poles Using an Intelligent Non-Destructive Evaluation (NDE) Framework." International Journal of Structural Stability and Dynamics 20, no. 10 (September 2020): 2042002. http://dx.doi.org/10.1142/s021945542042002x.

Full text
Abstract:
Wood utility poles are widely applied in power transmission and telecommunication systems in Australia. Because of a variety of external influence factors, such as fungi, termite and environmental conditions, failure of poles due to the wood degradation with time is of common occurrence with high degree uncertainty. The pole failure may result in serious consequences including both economic and public safety. Therefore, accurately and timely identifying the health condition of the utility poles is of great significance for economic and safe operation of electricity and communication networks. In this paper, a novel non-destructive evaluation (NDE) framework with advanced signal processing and artificial intelligence (AI) techniques is developed to diagnose the condition of utility pole in field. To begin with, the guided waves (GWs) generated within the pole is measured using multi-sensing technique, avoiding difficult interpretation of various wave modes which cannot be detected by only one sensor. Then, empirical mode decomposition (EMD) and principal component analysis (PCA) are employed to extract and select damage-sensitive features from the captured GW signals. Additionally, the up-to-date machine learning (ML) techniques are adopted to diagnose the health condition of the pole based on selected signal patterns. Eventually, the performance of the developed NDE framework is evaluated using the field testing data from 15 new and 24 decommissioned utility poles at the pole yard in Sydney.
APA, Harvard, Vancouver, ISO, and other styles
8

Abolhasan, Mehran, and Alyson Wright. "Survey of the potential of emerging wireless technologies to improve telecommunication services in remote Australian settlements." Rangeland Journal 30, no. 1 (2008): 157. http://dx.doi.org/10.1071/rj07035.

Full text
Abstract:
Providing efficient yet cost effective telecommunication systems to Aboriginal people living in remote locations has proven to be a challenging task. This is primarily due to low population density and distance from major service centres. Extending high-capacity telecommunications infrastructure to these people would incur high costs of installation, maintenance and administration without significant financial returns. The cost of services such as cabled phone lines to all houses, satellite and wireless cellular networks are often unaffordable for people in remote settlements, and, as a result, the provision of telecommunication services is often subsidised by the government. New wireless standards and products are being developed which could provide broadband-type network connections to large areas at an affordable price. This paper describes these new standards and products and their potential applications in rural and remote regions. There is also a comparison of their transmission requirements, cost, performance and coverage with several currently available technologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Pritchard-Kelly, Ruth, and John Costa. "Low Earth Orbit Satellite Systems." Journal of Telecommunications and the Digital Economy 10, no. 1 (March 16, 2022): 1–22. http://dx.doi.org/10.18080/jtde.v10n1.552.

Full text
Abstract:
Satellites have been around for many decades, yet the low Earth orbit (LEO) was avoided as the cost exceeded the demand until recently. This paper is based on a live presentation to the Australian Telecommunications Association (TelSoc) by Ruth Pritchard-Kelly, Senior Advisor on Regulatory Affairs for OneWeb, and was chaired by TelSoc Broadband Futures Group member, John Costa. This paper describes the new generation of LEO satellites, how they substantially differ from earlier satellites, and the factors now making them not only viable but increasingly indispensable as part of a global communication ecosystem. The paper then introduces OneWeb’s specific LEO plans, including details about deployment in Australia.
APA, Harvard, Vancouver, ISO, and other styles
10

Titus Mukisa, Muhambe, and Daniel Orwa Ochien. "Post adoption evaluation model for cloud computing services utilization in universities in Kenya." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (October 15, 2013): 614–28. http://dx.doi.org/10.24297/ijmit.v5i3.4221.

Full text
Abstract:
Cloud Computing, a recent technology development presents a paradigm shift in computing, a move away from personal computers and enterprise server systems, to a cloud of computers located on the internet. Applications and resources are accessed from the cloud. The introduction of cloud computing services in Kenya by some telecommunication company like Safari Cloud from Safaricom Limited is an indicator that cloud computing technology is gaining ground and popularity locally. Technology adoption studies, which include Cloud computing adoption, have mainly been carried out in United State of America, Europe, Japan and Australia. No previous study has analyzed the acceptance and use of cloud computing services in a university setting in Kenya. In addition, no model has been advanced to explain the factors that influence acceptance and use of cloud services in the same setting. A conceptual model derived from the Unified Theory of Acceptance and Use of Technology (UTAUT) was used as a guide in this study. Survey (n=217) and Focus Group Discussion (n=12) were used as data collection instruments in an attempt to understand cloud services adoption and use. The results of partial correlation showed that Performance Expectancy and Facilitating Condition were the two main factors that significantly influence cloud services acceptance and use in the universities in Kenya. The Focus Group Discussion results established that personal ego was a factor that prevented individuals from admitting that they were socially influenced towards adoption and use of cloud services. The findings will be useful to multiple stakeholders that include; academic researchers, technology adoption and perception researchers and cloud services providers and vendors.
APA, Harvard, Vancouver, ISO, and other styles
11

de Vos, Stuart John, Simone Cosoli, and Jacob Munroe. "The Traveling Wave Loop Antenna: A Terminated Wire Loop Aerial for Directional High-Frequency Ocean RADAR Transmission." Remote Sensing 12, no. 17 (August 29, 2020): 2800. http://dx.doi.org/10.3390/rs12172800.

Full text
Abstract:
In this paper we document the design, development, results, performance and field applications of a compact directive transmit antenna for the long-range High Frequency ocean RADAR (HFR) systems operating in the International Telecommunication Union (ITU) designated 4MHz and 5MHz radiodetermination bands. The antenna design is based on the combination of the concepts of an electrically small loop with that of travelling wave antenna. This has the effect of inducing a radiated wave predominantly in a direction opposed to that of energy flow on the antenna structures. We demonstrate here that travelling wave design allows for a more compact antenna than other directive options, it has straightforward feed-point matching arrangements, and a flat frequency and phase response over an entire radiodetermination band. In situ measurements of the antenna radiation pattern, obtained with the aid of a drone, correlate well with those obtained from simulations, and show between 8dB and 30dB front-to-back suppression, with a 3dB beam width in the forward lobe of 100∘ or more. The broad-beam radiation pattern ensures proper illumination over the ocean and the significant front-to-back suppression guarantees reduced interference to terrestrial services. The proposed antenna design is compact and straight forward and can be easily deployed by minimal modifications of an existing transmission antenna. The design may be readily adapted to different environments due to the relative insensitivity of its radiation pattern and frequency response to geometric detail. The only downside to these antennas is their relatively low radiation efficiency which, however, may easily be compensated for by the available power output of a typical HFR transmitter. Antennas based on this design are currently deployed at the SeaSonde HFR sites in New South Wales, Australia, with operational ranges up to 200 km offshore despite their low radiating efficiency and the extremely low output power in use at these installations. Due to their directional pattern, it is also planned to test these antennas in phased-array Wellen RADAR (WERA) systems in both the standard receive arrays: where in-band radio frequency noise of terrestrial origin is impacting on data quality, and in the transmit array: to possibly simplify splitting, phasing and tuning requirements.
APA, Harvard, Vancouver, ISO, and other styles
12

Breunig, Robert, and Owen McCarthy. "Household telecommunications expenditure in Australia." Telecommunications Policy 44, no. 1 (February 2020): 101837. http://dx.doi.org/10.1016/j.telpol.2019.101837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Richardson, Paul, and Peter Weill. "Telstra's National Telemarketing Centre." Journal of Information Technology 14, no. 3 (September 1999): 217–34. http://dx.doi.org/10.1177/026839629901400302.

Full text
Abstract:
Telstra – until recently Australia's only telecommunications carrier – is internationally recognized within the industry for providing a world-class telecommunications service to a highly dispersed and isolated population under challenging environmental conditions. In 1990, the Australian Government announced that it would end Telstra's monopoly and move towards a deregulated telecommunications industry. The first step was a competitive duopoly and, in 1991–1992, a private carrier – Optus Communications – became Telstra's first competitor in the Australian market-place. On 1 July 1997 the industry was fully deregulated. Over this period, Telstra has undergone enormous changes – none of which is more dramatic than the shift from an engineering-driven organization, to one with a marketing focus. The shift in emphasis from engineering to marketing is clearly reflected by the establishment of Telstra's National Telemarketing Centre (NTC). Though originally created in response to deregulation and the threat of its first competitor, the NTC has grown to become a major national marketing channel for Telstra, as well as providing national customer and product support services. This case examines the function of the NTC within Telstra, the role of technology at the NTC and the way call centres affect organizational flexibility and change the relationship between Telstra and its customers.
APA, Harvard, Vancouver, ISO, and other styles
14

Gregory, Mark A. "Future of Telecommunications is Open Source." Journal of Telecommunications and the Digital Economy 8, no. 3 (September 30, 2020): ii—iv. http://dx.doi.org/10.18080/jtde.v8n3.363.

Full text
Abstract:
Papers in the September 2020 issue of the Journal include the NBN Futures Forum on the social and economic benefits of broadband for digital inclusion and telehealth, the benefits of submarine cables to South Pacific nations, 5G transmission, the economics of over-the-top media, energy efficient wireless sensor networks and a celebration of the life of Liz Fell, journalist and Distinguished Fellow of the Telecommunications Society of Australia (now the Telecommunications Association). This year, open source has moved into focus with the telecommunications industry, with open core systems and open radio access networks for 5G taking centre stage. The Journal welcomes contributions on telecommunications and the digital economy.
APA, Harvard, Vancouver, ISO, and other styles
15

Smith, Scott. "The Spectrum Auctions: Mismanagement, Lost Opportunities and the Undermining of a Critical Communications Conduit." Media International Australia 107, no. 1 (May 2003): 89–104. http://dx.doi.org/10.1177/1329878x0310700110.

Full text
Abstract:
The welfare of wireless communications systems in Australia depends on the recognition of the electromagnetic spectrum as a unique and crucial cultural ‘resource’ of an information society. This article suggests that the elusive nature of ‘spectrum’ has resulted in mismanagement and lost opportunities, and that now the rights of local communities to our ‘airwaves’ are under threat, an assertion explored through an analysis of spectrum management in the 2000/01 financial year. I will further demonstrate that the new orthodoxy of ‘spectrum auctions’ reflects our political and economic milieu: the prominence of short-term decision-making and ‘budget politics’, the lack of concern with concentration of media/telecommunications ownership and, moreover, the undermining of cultural and ecological aspects of the Australian communications system. This article argues for the provision of unlicensed ‘spectrum’ for local communities (or bioregions) — a ‘commons’ — to nurture the world of non-commercial communications and the distribution of localised ecological information, both scientific and cultural.
APA, Harvard, Vancouver, ISO, and other styles
16

Bronitt, Simon, and James Stellios. "Telecommunications interception in Australia: Recent trends and regulatory prospects." Telecommunications Policy 29, no. 11 (December 2005): 875–88. http://dx.doi.org/10.1016/j.telpol.2005.06.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Stuhmcke, Anita. "The rise of the Australian Telecommunications Industry Ombudsman." Telecommunications Policy 26, no. 1-2 (February 2002): 69–85. http://dx.doi.org/10.1016/s0308-5961(01)00054-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Crouch, Andrew. "A coordinated satellite and terrestrial microwave backhaul for cellular mobile in remote and regional Australia." Australian Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 23–41. http://dx.doi.org/10.18080/ajtde.v1n1.126.

Full text
Abstract:
For several years prior to the Australian Federal elections in September 2013, Commonwealth Government telecommunications policy and legislation focussed exclusively on the fixed services National Broadband Network. This distracted broader public attention from the need for cellular mobile expansion in the more sparsely populated areas of the country. Commercial returns in these areas are clearly inadequate for unilateral private operator investment, making government participation crucial. Thus a commitment from the newly elected Coalition Government for a Mobile Black Spot co-investment programme marks a significant change of prospects for remote and regional Australia. This paper proposes that the joint program should commence with a comprehensive financial and technical study of backhaul and base station technology options, to identify the most cost effective approaches. These options include the coordinated provisioning of modern satellite and terrestrial backhaul systems, utilising and upgrading existing HCRC microwave system infrastructure, and the implementation of small cell base station types. It is especially timely for these opportunities to be considered now, during the present pre-launch design and construction phase for the NBN Ka band satellites.
APA, Harvard, Vancouver, ISO, and other styles
19

Crouch, Andrew. "A coordinated satellite and terrestrial microwave backhaul for cellular mobile in remote and regional Australia." Journal of Telecommunications and the Digital Economy 1, no. 1 (December 15, 2013): 23–41. http://dx.doi.org/10.18080/jtde.v1n1.126.

Full text
Abstract:
For several years prior to the Australian Federal elections in September 2013, Commonwealth Government telecommunications policy and legislation focussed exclusively on the fixed services National Broadband Network. This distracted broader public attention from the need for cellular mobile expansion in the more sparsely populated areas of the country. Commercial returns in these areas are clearly inadequate for unilateral private operator investment, making government participation crucial. Thus a commitment from the newly elected Coalition Government for a Mobile Black Spot co-investment programme marks a significant change of prospects for remote and regional Australia. This paper proposes that the joint program should commence with a comprehensive financial and technical study of backhaul and base station technology options, to identify the most cost effective approaches. These options include the coordinated provisioning of modern satellite and terrestrial backhaul systems, utilising and upgrading existing HCRC microwave system infrastructure, and the implementation of small cell base station types. It is especially timely for these opportunities to be considered now, during the present pre-launch design and construction phase for the NBN Ka band satellites.
APA, Harvard, Vancouver, ISO, and other styles
20

Howell, Bronwyn E., and Petrus H. Potgieter. "Politics, policy and fixed-line telecommunications provision: Insights from Australia." Telecommunications Policy 44, no. 7 (August 2020): 101999. http://dx.doi.org/10.1016/j.telpol.2020.101999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

van der Vlies, Marina C. "The transition from monopoly to competition in Australian telecommunications." Telecommunications Policy 20, no. 5 (June 1996): 311–23. http://dx.doi.org/10.1016/0308-5961(96)00009-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mitchell, David. "Internet Content Regulation in Southeast Asia: Directions." Media International Australia 101, no. 1 (November 2001): 43–55. http://dx.doi.org/10.1177/1329878x0110100107.

Full text
Abstract:
The movement of Internet content regulation from telecommunications regulatory regimes into the existing streams of media regulation can be seen all over Southeast Asia — from Australia and Singapore to Vietnam and Laos. This paper examines this movement, comparing regulatory regimes for internet content control in Vietnam, Singapore and Australia. It will show that these countries have moved to integrate internet content regulation within existing media regulatory regimes and that regulation of internet content in countries of widely differing social and political cultures is not as different as may be believed. The regulatory path in a future of converged distribution systems for previously disparate forms of content may, however, force a re-evaluation of existing rationales for media and broadcasting regulation.
APA, Harvard, Vancouver, ISO, and other styles
23

Troshani, Indrit, and Sally Rao Hill. "Regulating Mobile Services." International Journal of E-Business Research 7, no. 1 (January 2011): 52–70. http://dx.doi.org/10.4018/jebr.2011010104.

Full text
Abstract:
While the development of mobile services is experiencing a spectacular growth in many countries worldwide, existing regulatory regimes are ill equipped for dealing with them. In this paper, the authors use qualitative evidence to investigate the manner in which institutional regulatory factors, including legal, societal, and economic factors, can impact mobile services in the Australian mobile telecommunications industry. These factors are important as they shape both the nature of emerging mobile services and their diffusion trajectory. The investigation culminates with an innovative institutional regulatory framework that includes factors such as consumer and intellectual property protection, market and resources access. The authors argue that co-regulation, a mixture of direct monitoring and intervention of regulators through legislation and complete industry self-regulation, is an effective approach for regulating the mobile telecommunications industry. Given the complex and dynamic nature of this industry, co-regulation can minimize monitoring costs and enhance compliance.
APA, Harvard, Vancouver, ISO, and other styles
24

Bandias, Susan, and Siva Ram Vemuri. "Telecommunications infrastructure facilitating sustainable development of rural and remote communities in Northern Australia." Telecommunications Policy 29, no. 2-3 (March 2005): 237–49. http://dx.doi.org/10.1016/j.telpol.2004.11.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mcgrath, G. M., C. N. G. Dampney, and E. More. "Planning for information systems integration: some key challenges." Journal of Information Science 20, no. 3 (June 1994): 149–60. http://dx.doi.org/10.1177/016555159402000301.

Full text
Abstract:
Over the last few decades, technological advances in computer and telecommunications technologies have promised much to organisations. Yet it is clear that, in practice, the reality generally seems to have fallen well short of the ideal. Organisations seeking strategic advantage from their information systems frequently undertake a Strategic Information Systems Planning (SISP) exercise as an initial step. However, despite the substantial increase in SISP activity over the last decade, it would appear that most strategies have not been successfully implemented. In this paper, some important recent research in support of this contention is summarised, and key problems in SISP implementation are identified. It is argued that: (i) the objective of data and systems integration is a distinguishing characteristic of SISP work; (ii) such integration may cause major changes to the balance of organisational power; (iii) SISP implementation is unlikely to be successful unless political turbulence caused by potential power losses is adequately addressed; and (iv) political turbulence may well be the single most important issue facing SISP implementors. Strategy implementation problems are illustrated through reference to a recent, major (three-year) case study of a SISP implementation in one of Australia's largest organisations. We conclude by presenting some suggestions aimed at offering a way forward out of the current malaise.
APA, Harvard, Vancouver, ISO, and other styles
26

Agarwal, Renu, and Willem Selen. "Multi‐dimensional nature of service innovation." International Journal of Operations & Production Management 31, no. 11 (October 18, 2011): 1164–92. http://dx.doi.org/10.1108/01443571111178484.

Full text
Abstract:
PurposeInnovation in services is thought to be multi‐dimensional in nature, and in this context the purpose of this paper is to present and operationalise the concept of “elevated service offerings” (ESO) in collaborating service organisations. ESO stands for new or enhanced service offerings which can only be eventuated as a result of partnering, and which could not be delivered on individual organisational merit. ESO helps us expand our understanding of service innovation to include a service network or service system's dimension.Design/methodology/approachA structural equation model is specified and estimated based on constructs and relationships grounded in the literature, as well as self‐developed constructs, using empirical data from 449 respondents in an Australian telecommunications service provider (SP) and its partnering organisations.FindingsResults show that ESO is a multi‐dimensional construct which was operationalised and validated through an extensive literature review, exploratory factor analysis, confirmatory factor analysis, and structural equation modelling using a holdout sample.Research limitations/implicationsQualitative and empirical data analysis was undertaken with data collected from a single large telecommunications SP organisation, and its partnering organisations. Future research may seek to collect data from the entire telecommunications industry sector and their partnering organisations, across other service sectors, or even any other organisation where collaboration is pivotal to their success.Practical implicationsService organisations today need to understand that innovation in services is not just about process or product innovation, or even performance and productivity improvements, but in fact includes organisational forms of innovation. Indeed, the interactions and complementarities between the three different aspects of ESO – strategic, productivity, and performance – highlight the increasing complex and multi‐dimensional character of innovation and the ongoing iterative process.Originality/valueThis research provides empirical evidence for the existence of a multi‐dimensional innovation in services construct – known as elevated service offerings in a collaborative service network, along with an adapted definition of service and a service innovation model.
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Fuhmei. "TELEHEALTH, SUSTAINABLE ECONOMIC DEVELOPMENT, AND SOCIAL WELFARE." Technological and Economic Development of Economy 18, no. 4 (December 20, 2012): 711–21. http://dx.doi.org/10.3846/20294913.2012.754798.

Full text
Abstract:
Country experiences in Australia, New Zealand, Norway, Taiwan, and UK have been in favor of telehealth services since the early 1990s. Though a few studies do discuss evidence of the efficacy and cost-effectiveness of telehealth programs, the literature might limit to financial evaluation. This research investigates the welfare implications of conventional in-person and telecommunications health care as improving health levels or preventing health from deterioration for efficient resource allocation by incorporating government intervention for equal accessibility of health care in the economic progress perspective. Analytical findings indicate that the inverse U shape relationship between telehealth expenditure share and social welfare status exists as the nonlinear nexus between telehealth expenditure share and economic growth presents. The health dividend in terms of an enhanced economic growth rate can be achieved only when the initial share of telehealth expenditure is smaller than the growth-maximizing share. For economic sustainable development, telehealth initiatives strengthen rather than compete with conventional in-person health care. Research results guide the countries, which have or will have telehealth systems, for effectively allocating medical resources to stimulate economic growth and improve the population's well-being.
APA, Harvard, Vancouver, ISO, and other styles
28

Семыкина, Ольга, and Olga Semykina. "COMBATING CYBERCRIME IN FOREIGN COUNTRIES." Journal of Foreign Legislation and Comparative Law, December 21, 2016, 0. http://dx.doi.org/10.12737/23525.

Full text
Abstract:
Modern trends in Cybercrime in the criminal legislation of Russia and foreign countries are so multifaceted that sometimes it is difficult to distinguish between acts that directly violate information security, and invasions associated with computer technology in which the use of computer information systems is only one of the ways committing a crime. It is supported by the analytical material based on the study of criminal law engineered in the legislation of the UK, Australia, the USA, Germany and the CIS countries in view of the characteristic of illegal access to information technologies and (or) the misuse of information and telecommunication networks. Carried out in this article a comparative analyzes of the different criminal law as concentrated in one group, taking into account the identity of the object of the offence and “dissolved” in the structure of other criminal law provisions reveal the real “picture” of trends in the sphere of combating Cybercrime (against the constitutional rights and freedoms, property, area of economic activity, against public health and public morality, constitutional order and security of the state).
APA, Harvard, Vancouver, ISO, and other styles
29

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (March 1, 2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
30

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text
Abstract:
Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile phones have produced new uses and new discourses (see Katz and Aakhus; Brown, Green, and Harper; and Plant). Contemporary soundscapes now feature not only voice calls in previously quiet public spaces such as buses or restaurants but also the aural irruptions of customised polyphonic ringtones identifying whose phone is ringing by the tune downloaded. The mobile phone plays an important role in contemporary visual and material culture as fashion item and status symbol. Most tragically one might point to the tableau of people in the twin towers of the World Trade Centre, or aboard a plane about to crash, calling their loved ones to say good-bye (Galvin). By contrast, one can look on at the bathos of Australian cricketer Shane Warne’s predilection for pressing his mobile phone into service to arrange wanted and unwanted assignations while on tour. In this article, I wish to consider another important and so far also under-theorised aspect of mobile phones: text. Of contemporary textual and semiotic systems, mobile text is only a recent addition. Yet it is already produces millions of inscriptions each day, and promises to be of far-reaching significance. Txt Txt msg ws an acidnt. no 1 expcted it. Whn the 1st txt msg ws sent, in 1993 by Nokia eng stdnt Riku Pihkonen, the telcom cpnies thought it ws nt important. SMS – Short Message Service – ws nt considrd a majr pt of GSM. Like mny teks, the *pwr* of txt — indeed, the *pwr* of the fon — wz discvrd by users. In the case of txt mssng, the usrs were the yng or poor in the W and E. (Agar 105) As Jon Agar suggests in Constant Touch, textual communication through mobile phone was an after-thought. Mobile phones use radio waves, operating on a cellular system. The first such mobile service went live in Chicago in December 1978, in Sweden in 1981, in January 1985 in the United Kingdom (Agar), and in the mid-1980s in Australia. Mobile cellular systems allowed efficient sharing of scarce spectrum, improvements in handsets and quality, drawing on advances in science and engineering. In the first instance, technology designers, manufacturers, and mobile phone companies had been preoccupied with transferring telephone capabilities and culture to the mobile phone platform. With the growth in data communications from the 1960s onwards, consideration had been given to data capabilities of mobile phone. One difficulty, however, had been the poor quality and slow transfer rates of data communications over mobile networks, especially with first-generation analogue and early second-generation digital mobile phones. As the internet was widely and wildly adopted in the early to mid-1990s, mobile phone proponents looked at mimicking internet and online data services possibilities on their hand-held devices. What could work on a computer screen, it was thought, could be reinvented in miniature for the mobile phone — and hence much money was invested into the wireless access protocol (or WAP), which spectacularly flopped. The future of mobiles as a material support for text culture was not to lie, at first at least, in aping the world-wide web for the phone. It came from an unexpected direction: cheap, simple letters, spelling out short messages with strange new ellipses. SMS was built into the European Global System for Mobile (GSM) standard as an insignificant, additional capability. A number of telecommunications manufacturers thought so little of the SMS as not to not design or even offer the equipment needed (the servers, for instance) for the distribution of the messages. The character sets were limited, the keyboards small, the typeface displays rudimentary, and there was no acknowledgement that messages were actually received by the recipient. Yet SMS was cheap, and it offered one-to-one, or one-to-many, text communications that could be read at leisure, or more often, immediately. SMS was avidly taken up by young people, forming a new culture of media use. Sending a text message offered a relatively cheap and affordable alternative to the still expensive timed calls of voice mobile. In its early beginnings, mobile text can be seen as a subcultural activity. The text culture featured compressed, cryptic messages, with users devising their own abbreviations and grammar. One of the reasons young people took to texting was a tactic of consolidating and shaping their own shared culture, in distinction from the general culture dominated by their parents and other adults. Mobile texting become involved in a wider reworking of youth culture, involving other new media forms and technologies, and cultural developments (Butcher and Thomas). Another subculture that also was in the vanguard of SMS was the Deaf ‘community’. Though the Alexander Graham Bell, celebrated as the inventor of the telephone, very much had his hearing-impaired wife in mind in devising a new form of communication, Deaf people have been systematically left off the telecommunications network since this time. Deaf people pioneered an earlier form of text communications based on the Baudot standard, used for telex communications. Known as teletypewriter (TTY), or telecommunications device for the Deaf (TDD) in the US, this technology allowed Deaf people to communicate with each other by connecting such devices to the phone network. The addition of a relay service (established in Australia in the mid-1990s after much government resistance) allows Deaf people to communicate with hearing people without TTYs (Goggin & Newell). Connecting TTYs to mobile phones have been a vexed issue, however, because the digital phone network in Australia does not allow compatibility. For this reason, and because of other features, Deaf people have become avid users of SMS (Harper). An especially favoured device in Europe has been the Nokia Communicator, with its hinged keyboard. The move from a ‘restricted’, ‘subcultural’ economy to a ‘general’ economy sees mobile texting become incorporated in the semiotic texture and prosaic practices of everyday life. Many users were already familiar with the new conventions already developed around electronic mail, with shorter, crisper messages sent and received — more conversation-like than other correspondence. Unlike phone calls, email is asynchronous. The sender can respond immediately, and the reply will be received with seconds. However, they can also choose to reply at their leisure. Similarly, for the adept user, SMS offers considerable advantages over voice communications, because it makes textual production mobile. Writing and reading can take place wherever a mobile phone can be turned on: in the street, on the train, in the club, in the lecture theatre, in bed. The body writes differently too. Writing with a pen takes a finger and thumb. Typing on a keyboard requires between two and ten fingers. The mobile phone uses the ‘fifth finger’ — the thumb. Always too early, and too late, to speculate on contemporary culture (Morris), it is worth analyzing the textuality of mobile text. Theorists of media, especially television, have insisted on understanding the specific textual modes of different cultural forms. We are familiar with this imperative, and other methods of making visible and decentring structures of text, and the institutions which animate and frame them (whether author or producer; reader or audience; the cultural expectations encoded in genre; the inscriptions in technology). In formal terms, mobile text can be described as involving elision, great compression, and open-endedness. Its channels of communication physically constrain the composition of a very long single text message. Imagine sending James Joyce’s Finnegan’s Wake in one text message. How long would it take to key in this exemplar of the disintegration of the cultural form of the novel? How long would it take to read? How would one navigate the text? Imagine sending the Courier-Mail or Financial Review newspaper over a series of text messages? The concept of the ‘news’, with all its cultural baggage, is being reconfigured by mobile text — more along the lines of the older technology of the telegraph, perhaps: a few words suffices to signify what is important. Mobile textuality, then, involves a radical fragmentation and unpredictable seriality of text lexia (Barthes). Sometimes a mobile text looks singular: saying ‘yes’ or ‘no’, or sending your name and ID number to obtain your high school or university results. Yet, like a telephone conversation, or any text perhaps, its structure is always predicated upon, and haunted by, the other. Its imagined reader always has a mobile phone too, little time, no fixed address (except that hailed by the network’s radio transmitter), and a finger poised to respond. Mobile text has structure and channels. Yet, like all text, our reading and writing of it reworks those fixities and makes destabilizes our ‘clear’ communication. After all, mobile textuality has a set of new pre-conditions and fragilities. It introduces new sorts of ‘noise’ to signal problems to annoy those theorists cleaving to the Shannon and Weaver linear model of communication; signals often drop out; there is a network confirmation (and message displayed) that text messages have been sent, but no system guarantee that they have been received. Our friend or service provider might text us back, but how do we know that they got our text message? Commodity We are familiar now with the pleasures of mobile text, the smile of alerting a friend to our arrival, celebrating good news, jilting a lover, making a threat, firing a worker, flirting and picking-up. Text culture has a new vector of mobility, invented by its users, but now coveted and commodified by businesses who did not see it coming in the first place. Nimble in its keystrokes, rich in expressivity and cultural invention, but relatively rudimentary in its technical characteristics, mobile text culture has finally registered in the boardrooms of communications companies. Not only is SMS the preferred medium of mobile phone users to keep in touch with each other, SMS has insinuated itself into previously separate communication industries arenas. In 2002-2003 SMS became firmly established in television broadcasting. Finally, interactive television had arrived after many years of prototyping and being heralded. The keenly awaited back-channel for television arrives courtesy not of cable or satellite television, nor an extra fixed-phone line. It’s the mobile phone, stupid! Big Brother was not only a watershed in reality television, but also in convergent media. Less obvious perhaps than supplementary viewing, or biographies, or chat on Big Brother websites around the world was the use of SMS for voting. SMS is now routinely used by mainstream television channels for viewer feedback, contest entry, and program information. As well as its widespread deployment in broadcasting, mobile text culture has been the language of prosaic, everyday transactions. Slipping into a café at Bronte Beach in Sydney, why not pay your parking meter via SMS? You’ll even receive a warning when your time is up. The mobile is becoming the ‘electronic purse’, with SMS providing its syntax and sentences. The belated ingenuity of those fascinated by the economics of mobile text has also coincided with a technological reworking of its possibilities, with new implications for its semiotic possibilities. Multimedia messaging (MMS) has now been deployed, on capable digital phones (an instance of what has been called 2.5 generation [G] digital phones) and third-generation networks. MMS allows images, video, and audio to be communicated. At one level, this sort of capability can be user-generated, as in the popularity of mobiles that take pictures and send these to other users. Television broadcasters are also interested in the capability to send video clips of favourite programs to viewers. Not content with the revenues raised from millions of standard-priced SMS, and now MMS transactions, commercial participants along the value chain are keenly awaiting the deployment of what is called ‘premium rate’ SMS and MMS services. These services will involve the delivery of desirable content via SMS and MMS, and be priced at a premium. Products and services are likely to include: one-to-one textchat; subscription services (content delivered on handset); multi-party text chat (such as chat rooms); adult entertainment services; multi-part messages (such as text communications plus downloads); download of video or ringtones. In August 2003, one text-chat service charged $4.40 for a pair of SMS. Pwr At the end of 2003, we have scarcely registered the textual practices and systems in mobile text, a culture that sprang up in the interstices of telecommunications. It may be urgent that we do think about the stakes here, as SMS is being extended and commodified. There are obvious and serious policy issues in premium rate SMS and MMS services, and questions concerning the political economy in which these are embedded. Yet there are cultural questions too, with intricate ramifications. How do we understand the effects of mobile textuality, rewriting the telephone book for this new cultural form (Ronell). What are the new genres emerging? And what are the implications for cultural practice and policy? Does it matter, for instance, that new MMS and 3rd generation mobile platforms are not being designed or offered with any-to-any capabilities in mind: allowing any user to upload and send multimedia communications to other any. True, as the example of SMS shows, the inventiveness of users is difficult to foresee and predict, and so new forms of mobile text may have all sorts of relationships with content and communication. However, there are worrying signs of these developing mobile circuits being programmed for narrow channels of retail purchase of cultural products rather than open-source, open-architecture, publicly usable nodes of connection. Works Cited Agar, Jon. Constant Touch: A Global History of the Mobile Phone. Cambridge: Icon, 2003. Barthes, Roland. S/Z. Trans. Richard Miller. New York: Hill & Wang, 1974. Brown, Barry, Green, Nicola, and Harper, Richard, eds. Wireless World: Social, Cultural, and Interactional Aspects of the Mobile Age. London: Springer Verlag, 2001. Butcher, Melissa, and Thomas, Mandy, eds. Ingenious: Emerging youth cultures in urban Australia. Melbourne: Pluto, 2003. Galvin, Michael. ‘September 11 and the Logistics of Communication.’ Continuum: Journal of Media and Cultural Studies 17.3 (2003): 303-13. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Digital in New Media. Lanham, MA: Rowman & Littlefield, 2003. Harper, Phil. ‘Networking the Deaf Nation.’ Australian Journal of Communication 30. 3 (2003), in press. International Telecommunications Union (ITU). ‘Mobile Cellular, subscribers per 100 people.’ World Telecommunication Indicators <http://www.itu.int/ITU-D/ict/statistics/> accessed 13 October 2003. Katz, James E., and Aakhus, Mark, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. Cambridge: Cambridge U P, 2002. Morris, Meaghan. Too Soon, Too Late: History in Popular Culture. Bloomington and Indianapolis: U of Indiana P, 1998. Plant, Sadie. On the Mobile: The Effects of Mobile Telephones on Social and Individual Life. < http://www.motorola.com/mot/documents/0,1028,296,00.pdf> accessed 5 October 2003. Ronell, Avital. The Telephone Book: Technology—schizophrenia—electric speech. Lincoln: U of Nebraska P, 1989. Citation reference for this article MLA Style Goggin, Gerard. "‘mobile text’" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/03-goggin.php>. APA Style Goggin, G. (2004, Jan 12). ‘mobile text’. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/03-goggin.php>
APA, Harvard, Vancouver, ISO, and other styles
31

Vlahu-Gjorgievska, Elena, Swetha Nagapuri, and Khin Than Win. "Tele-monitoring Technology as a Tool for Monitoring and Management of Patients with Congestive Heart Failure." Australasian Journal of Information Systems 23 (February 12, 2019). http://dx.doi.org/10.3127/ajis.v23i0.1816.

Full text
Abstract:
Telehealth interventions are designed to facilitate the remote exchange of information and data between patients and health care providers, improving the quality and safety of the patients and increasing efficiency and cost-effectiveness of health care providers. The development of telecommunications and virtual technology allowed a number of telehealth systems to be applied in different health care areas. These technologies can provide an alternative monitoring and solutions for decreasing the hospital readmission rates for patients with congestive heart failure (CHF). In this paper, a systematic literature review regarding tele-monitoring and its use in the management of patients with CHF is conducted. The result indicated that a standardized tele-monitoring design would reduce a length of hospitalization and re-hospitalization rate. The other factors that moderate the effectiveness of the tele-monitoring intervention include quality of life, mortality rate, and disease-specific knowledge (health literacy). All these factors align with the consumer-centred principle of The Australian Safety and Quality Framework for Health Care.
APA, Harvard, Vancouver, ISO, and other styles
32

Holloway, Donell Joy, Lelia Green, and Kylie Stevenson. "Digitods: Toddlers, Touch Screens and Australian Family Life." M/C Journal 18, no. 5 (August 20, 2015). http://dx.doi.org/10.5204/mcj.1024.

Full text
Abstract:
Introduction Children are beginning to use digital technologies at younger and younger ages. The emerging trend of very young children (babies, toddlers and pre-schoolers) using Internet connected devices, especially touch screen tablets and smartphones, has elicited polarising opinions from early childhood experts. At present there is little actual research about the risks or benefits of tablet and smartphone use by very young children. Current usage recommendations, based on research into passive television watching which claims that screen time is detrimental, is in conflict with advice from education experts and app developers who commend interactive screen time as engaging and educational. Guidelines from the health professions typically advise strict time limits on very young children’s screen-time. Based for the most part on policy developed by the American Academy of Paediatrics, it is usually recommended that children under two have no screen time at all (Brown), and children over this age have no more than two hours a day (Strasburger, et al.). On the other hand, early childhood education guidelines promote the development of digital literacy skills (Department of Education). Further, education-based research indicates that access to computers and the Internet in the preschool years is associated with overall educational achievement (Bittman et al.; Cavanaugh et al; Judge et al; Neumann). The US based National Association for Education of Young Children’s position statement on technology for zero to eight year-olds declares that “when used intentionally and appropriately, technology and interactive media are effective tools to support learning and development” (NAEYC). This article discusses the notion of Digitods—a name for those children born since the introduction of the iPhone in 2007 who have ready access to touchscreen technologies since birth. It reports on the limited availability of evidence-based research about these children’s ICT use concluding that current research and recommendations are not grounded in the everyday life of very young children and their families. The article then reports on the beginnings of a research project funded by the Australian Research Council entitled Toddlers and Tablets: exploring the risks and benefits 0-5s face online. This research project recognises that at this stage it is parents who “are the real experts in their toddlers’ use of screen technologies. Accordingly, the project’s methodological approach draws on parents, pre-schoolers and their families as communities of practice in the construction of social meaning around toddlers’ use of touch screen technology. Digitods In 2000 Bill Gates introduced the notion of Generation I to describe the first cohort of children raised with the Internet as a reality in their lives. They are those born after the 1990s and will, in most cases; have no memory of life without the Net. [...] Generation I will be able to conceive of the Internet’s possibilities far more profoundly than we can today. This new generation will become agents of change as the limits of the Internet expand to include educational, scientific, and business applications that we cannot even imagine. (Gates)Digitods, on the other hand, is a term that has been used in education literature (Leathers et al.) to describe those children born after the introduction of the iPhone in 2007. These children often begin their lives with ready access to the Internet via easily usable touch screen devices, which could have been designed with toddlers’ touch and swipe movements in mind. Not only are they the youngest group of children to actively engage with the Internet they are the first group to grow up with a range of mobile Internet devices (Leathers et al.). The difference between Digitods and Gates’s Generation I is that Digitods are the first pre-verbal, non-ambulant infants to have ready access to digital technologies. Somewhere around the age of 10 months to fourteen months a baby learns to point with his or her forefinger. At this stage the child is ready to swipe and tap a touch screen (Leathers et al.). This is in contrast to laptops and PCs given that very young children often need assistance to use a mouse or keyboard. The mobility of touch screen devices allows very young children to play at the kitchen table, in the bedroom or on a car trip. These mobile devices have, of course, a myriad of mobile apps to go with them. These apps create an immediacy of access for infants and pre-schoolers who do not need to open a web browser to find their favourite sites. In the lives of these children it seems that it has always been possible to touch and swipe their way into games, books and creative and communicative experiences (Holloway et al. 149). The interactivity of most pre-school apps, as opposed to more passive screen activities such as watching television shows or videos (both offline or online), requires toddlers and pre-schoolers to pay careful attention, think about things and act purposefully (Leathers et al.). It is this interactivity which is the main point of difference, one which holds the potential to engage and educate our youngest children. It should be noted within this discussion about Digitods that, while the trope Digital Natives tends to homogenise an entire generation, the authors do not assume that all children born today are Digitods by default. Many children do not have the same privileged opportunities as others, or the (parental) cultural capital, to enable access, ease of use and digital skill development. In addition to this it is not implied that Digitods will be more tech savvy than their older siblings. The term is used more to describe and distinguish those children who have digital access almost since birth—in order to differentiate or tease out everyday family practices around these children’s ICT use and the possible risks and benefits this access affords babies, toddlers and pre-schoolers. While the term Digital Native has also been criticised as being a white middle class phenomenon this is not necessarily the case with Digitods. In the Southeast Asia and the Pacific region developed countries like Japan, Korea, New Zealand and Singapore have extremely high rates of touchscreen use by very young children (Child Sciences; Jie; Goh; Unantenne). Other countries such as the Philippines and Indonesia have moved to a high smart phone usage by very young children while at the same time have only nascent ICT access and instruction within their education systems (Unantenne). The Digitod Parent Parents of Digitods are usually experienced Internet users themselves, and many are comfortable with their children using these child-friendly touch screen devices (Findahl). Digital technologies are integral to their everyday lives, often making daily life easier and improving communication with family and friends, even during the high pressure parenting years of raising toddlers and pre-schoolers. Even though many parents and caregivers are enabling very young children’s use of touch screen technologies, they are also concerned about the changes they are making. This is because very young children’s use of touch screen devices “has become another area where they fear possible criticism and in which their parental practices risk negative evaluation by others” (Holloway et al). The tensions between expert advice regarding young children’s screen-time and parents’ and caregivers’ own judgments are also being played out online. Parenting blogs, online magazines and discussion groups are all joining in the debate: On the one hand, parents want their children to swim expertly in the digital stream that they will have to navigate all their lives; on the other hand, they fear that too much digital media, too early, will sink them. Parents end up treating tablets like precision surgical instruments, gadgets that might perform miracles for their child’s IQ and help him win some nifty robotics competition—but only if they are used just so. (Rosin)Thus, with over 80 000 children’s apps marketed as educational in the Apple App Store alone, parents can find it difficult to choose apps that are worth purchasing (Yelland). Nonetheless, recent research regarding Australian children shows that three to five year olds who access touch screen devices will typically have five or more specific apps to choose from (5.23 on average) (Neumann). With little credible evidence or considered debate, parents have been left to make their own choices about the pros and cons of their young children’s access to touch screens. Nonetheless, one immediate benefit that comes to mind is toddlers and pre-schoolers video chatting with dispersed family member—due to increased globalisation, guest worker arrangements, FIFO (fly-in fly-out) workforces and family separation or divorce. Such clear benefits around sociability and youngsters’ connection with significant others make previous screen-related guidelines out of date and no longer contextually relevant. Little Research Attention Family ownership of tablet devices as well as touch screen phones has risen dramatically in the last five years. With very young children being loaned these technologies by mum or dad, and a tendency in Australia to rely on market-orientated research regarding ownership and usage, there is very little knowledge about touch screen usage rates for very young Australian children. UK and US usage figures indicate that over the last few years there has been a five-fold increase in tablet uptake by zero to eight year olds (Ofcom; Rideout). Although large scale, comparative Australian data is not available, previous research regarding older children indicates that Australia is similar to high use countries like some Scandinavian nations and the UK (Green et al.). In addition to this, two small research projects in Australia, with under 160 participant families each, indicate that two thirds of these children (0-5) use touchscreen devices (Neumann; Coenenna et. al.). Beyond usage figures, there is also very limited evidence-based research about very young children’s app use. Interactive technologies available via touch screen technologies have been available domestically for a very short time. Consequently, “valid scientific research has not been completed and replicated due to [the lack of] available time” (Leathers el al. 129) and longitudinal studies which rely on an intervention group (in this case exposure to children’s apps) and a control group (no exposure) are even fewer and more time-consuming. Interestingly, researchers have revisited the issue of passive screen viewing. A recent 2015 review of previous 2007 research, which linked babies watching videos with poor language development, has found that there was statistical and methodological issues with the 2007 study and that there are no strong inferences to be drawn between media exposure and language development (Ferguson and Donellan). Thus, there seems to be no conclusive evidence-based research on which to inform parents and educators about the possible downside or benefits of touch screen use. Nonetheless, early childhood experts have been quick to weigh in on the possible effects of screen usage, some providing restrictive guidelines and recommendations, with others advocating the use of interactive apps for very young children for their educational value. This knowledge-gap disguises what is actually happening in the lives of real Australian families. Due to the lack of local data, as well as worldwide research, it is essential that Australian researchers obtain a comprehensive understanding about actual behaviour around touch screen use in the lives of children aged between zero and five and their families. Beginning Research While research into very young children’s touch screen use is beginning to take place, few results have been published. When researching two to three year olds’ learning from interactive versus non-interactive videos Kirkorian, Choi and Pempek found that “toddlers may learn more from interactive media than from non-interactive video” (Kirkorian et al). This means that the use of interactive apps on touch screen devices may hold a greater potential for learning than passive video or television viewing for children in this age range. Another study considered the degree to which the young children could navigate to and use apps on touch screen devices by observing and analysing YouTube videos of infants and young children using touch screens (Hourcade et al.). It was found that between the ages of 12 months and 17 months the children filmed seemed to begin to “make meaningful use of the tablets [and] more than 90 per cent of children aged two [had] reached this level of ability” (1923). The kind of research mentioned above, usually the preserve of psychologists, paediatricians and some educators, does not, however, ground very young children’s use in their domestic context—in the spaces and with those people with whom most touch screen usage takes place. With funding from the Australian Research Council Australian, Irish and UK researchers are about to adopt a media studies (domestication) approach to comprehensively investigate digital media use in the everyday lives of very young children. This Australian-based research project positions very young children’s touch screen use within the family and will help provide an understanding of the everyday knowledge and strategies that this cohort of technology users (very young children and their parents) have already developed—in the knowledge vacuum left by the swift appropriation and incorporation of these new media technologies into the lives of families with very young children. Whilst using a conventional social constructionist perspective, the project will also adopt a co-creation of knowledge approach. The co-creation of knowledge approach (Fong) has links with the communities of practice literature (Wegner) and recognises that parents, care-givers and the children themselves are the current experts in this field in terms of the everyday uses of these technologies by very young children. Families’ everyday discourse and practices regarding their children’s touch screen use do not necessarily work through obvious power hierarchies (via expert opinions), but rather through a process of meaning making where they shape their own understandings and attitudes through experience and shared talk within their own everyday family communities of practice. This Toddlers and Tablets research is innovative in many ways. It seeks to capture the enthusiasm of young children’s digital interactions and to pioneer new ways of ‘beginnings’ researching with very young children, as well as with their parents. The researchers will work with parents and children in their broad domestic contexts (including in and out-of-home activities, and grandparental and wider-family involvement) to co-create knowledge about young children’s digital technologies and the social contexts in which these technologies are used. Aspects of these interactions, such as interviews and observations of everyday digital interactions will be recorded (audio and video respectively). In addition to this, data collected from media commentary, policy debates, research publications and learned articles from other disciplinary traditions will be interrogated to see if there are correlations, contrasts, trends or synergies between parents’ construction of meaning, public commentary and current research. Critical discourse tools and methods (Chouliaraki and Fairclough) will be used to analyse verbatim transcripts, video, and all written materials. Conclusion Very young children are uniquely dependent upon others for the basic necessities of life and for the tools they need, and will need to develop, to claim their place in the world. Given the ubiquitous role played by digital media in the lives of their parents and other caregivers it would be a distortion of everyday life for children to be excluded from the technologies that are routinely used to connect with other people and with information. In the same way that adults use digital media to renew and strengthen social and emotional bonds across distance, so young children delight in ‘Facetime’ and other technologies that connect them audio-visually with friends and family members who are not physically co-present. Similarly, a very short time spent in the company of toddlers using touch screens is sufficient to demonstrate the sheer delight that these young infants have in developing their sense of agency and autonomy (https://www.youtube.com/watch?v=aXV-yaFmQNk). Media, communications and cultural studies are beginning to claim a space for evidence based policy drawn from everyday activities in real life contexts. Research into the beginnings of digital life, with families who are beginning to find a way to introduce these technologies to the youngest generation, integrating them within social and emotional repertoires, may prove to be the start of new understandings into the communication skills of the preverbal and preliterate young people whose technology preferences will drive future development – with their parents likely trying to keep pace. Acknowledgment This research is supported under Australia Research Council’s Discovery Projects funding scheme (project number DP150104734). References Bittman, Michael, et al. "Digital Natives? New and Old Media and Children's Outcomes." Australian Journal of Education 55.2 (2011): 161-75. Brown, Ari. "Media Use by Children Younger than 2 Years." Pediatrics 128.5 (2011): 1040-45. Burr, Vivien. Social Constructionism. 2nd ed. London: Routledge, 2003. Cavanaugh, Cathy, et al. "The Effects of Distance Education on K–12 Student Outcomes: A Meta-Analysis." Naperville, Ill.: Learning Point Associates, 2004. 5 Mar. 2009 ‹http://www.ncrel.org/tech/distance/index.html›. Child Sciences and Parenting Research Office. Survey of Media Use by Children and Parents (Summary). Tokyo: Benesse Educational Research and Development Institute, 2014. Coenena, Pieter, Erin Howiea, Amity Campbella, and Leon Strakera. Mobile Touch Screen Device Use among Young Australian Children–First Results from a National Survey. Proceedings 19th Triennial Congress of the IEA. 2015. Chouliaraki, Lilie and Norman Fairclough. Discourse in Late Modernity: Rethinking Critical Discourse Analysis. Edinburgh: Edinburgh UP, 1999. Department of Education. "Belonging, Being and Becoming: The Early Years Learning Framework for Australia." Australian Government, 2009. Ferguson, Christopher J., and M. Brent Donnellan. "Is the Association between Children’s Baby Video Viewing and Poor Language Development Robust? A Reanalysis of Zimmerman, Christakis, and Meltzoff (2007)." Developmental Psychology 50.1 (2014): 129. Findahl, Olle. Swedes and the Internet 2013. Stockholm: The Internet Infrastructure Foundation, 2013. Fong, Patrick S.W. "Co-Creation of Knowledge by Multidisciplinary Project Teams." Management of Knowledge in Project Environments. Eds. E. Love, P. Fong, and Z. Irani. Burlington, MA: Elsevier, 2005. 41-56. Gates, Bill. "Enter 'Generation I': The Responsibility to Provide Access for All to the Most Incredible Learning Tool Ever Created." Instructor 109.6 (2000): 98. Goh, Wendy W.L., Susanna Bay, and Vivian Hsueh-Hua Chen. "Young School Children’s Use of Digital Devices and Parental Rules." Telematics and Informatics 32.4 (2015): 787-95. Green, Lelia, et al. "Risks and Safety for Australian Children on the Internet: Full Findings from the AU Kids Online Survey of 9-16 Year Olds and Their Parents." Cultural Science Journal 4.1 (2011): 1-73. Holloway, Donell, Lelia Green, and Carlie Love. "'It's All about the Apps': Parental Mediation of Pre-Schoolers' Digital Lives." Media International Australia 153 (2014): 148-56. Hourcade, Juan Pablo, Sarah Mascher, David Wu, and Luiza Pantoja. Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2015. Jie S.H. "ICT Use Statistics of Households and Individuals in Korea." 10th World Telecommunication/ICT Indicators Meeting (WTIM-12). Korea Internet & Security Agency (KISA), 25-7 Sep. 2012.Judge, Sharon, Kathleen Puckett, and Sherry Mee Bell. "Closing the Digital Divide: Update from the Early Childhood Longitudinal Study." The Journal of Educational Research 100.1 (2006): 52-60. Kirkorian, H., K. Choi, and Pempek. "Toddlers' Word Learning from Contingent and Non-Contingent Video on Touchscreens." Child Development (in press). Leathers, Heather, Patti Summers, and Desollar. Toddlers on Technology: A Parents' Guide. Illinois: AuthorHouse, 2013. NAEYC. Technology and Interactive Media as Tools in Early Childhood Programs Serving Children from Birth through Age 8 [Position Statement]. Washington: National Association for the Education of Young Children, the Fred Rogers Center for Early Learning and Children’s Media at Saint Vincent College, 2012. Neumann, Michelle M. "An Examination of Touch Screen Tablets and Emergent Literacy in Australian Pre-School Children." Australian Journal of Education 58.2 (2014): 109-22. Ofcom. Children and Parents: Media Use and Attitudes Report. London, 2013. Rideout, Victoria. Zero to Eight: Children’s Media Use in America 2013. San Francisco: Common Sense Media, 2013. Rosin, Hanna. "The Touch-Screen Generation." The Atlantic, 20 Apr. 2013. Strasburger, Victor C., et al. "Children, Adolescents, and the Media." Pediatrics 132.5 (2013): 958-61. Unantenne, Nalika. Mobile Device Usage among Young Kids: A Southeast Asia Study. Singapore: The Asian Parent and Samsung Kids Time, 2014. Wenger, Etienne. Communities of Practice: Learning, Meaning, and Identity. New York: Cambridge University Press, 1998. Wenger, Etienne. "Communities of Practice and Social Learning Systems." Organization 7.2 (2000): 225-46. Yelland, Nicola. "Which Apps Are Educational and Why? It’s in the Eye of the Beholder." The Conversation 13 July 2015. 16 Aug. 2015 ‹http://theconversation.com/which-apps-are-educational-and-why-its-in-the-eye-of-the-beholder-37968›.
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Peter. "Community without Flesh." M/C Journal 2, no. 3 (May 1, 1999). http://dx.doi.org/10.5204/mcj.1750.

Full text
Abstract:
On Wednesday 21 April the Minister for Communications, Information Technology and the Arts introduced a piece of legislation into the Australian Senate to regulate the way Australians use the Internet. This legislation is presented within Australia's existing system of content regulation, a scheme that the Minister describes is not censorship, but merely regulation (Alston 55). Underlying Senator Alston's rhetoric about the protection of children from snuff film makers, paedophiles, drug pushers and other criminals, this long anticipated bill is aimed at reducing the amount of pornographic materials available via computer networks, a censorship regime in an age when regulation and classification are the words we prefer to use when society draws the line under material we want to see, but dare not allow ourselves access to. Regardless of any noble aspirations expressed by free-speech organisations such as Electronic Frontiers Australia relating to the defence of personal liberty and freedom of expression, this legislation is about porn. Under the Bill, Australia would proscribe our citizens from accessing: explicit depictions of sexual acts between consenting adults; mild non-violent fetishes; depictions of sexual violence, coercion or non-consent of any kind; depictions of child sexual abuse, bestiality, sexual acts accompanied by offensive fetishes, or exploitative incest fantasies; unduly detailed and/or relished acts of extreme violence or cruelty; explicit or unjustifiable depictions of sexual violence against non-consenting persons; and detailed instruction or encouragement in matters of crime or violence or the abuse of proscribed drugs. (OFLC) The Australian public, as a whole, favour the availability of sexually explicit materials in some form, with OFLC data indicating a relatively high degree of public support for X rated videos, the "high end" of the porn market (Paterson et al.). In Australia strict regulation of X rated materials in conventional media has resulted in a larger illegal market for these materials than the legalised sex industries of the ACT and Northern Territory (while 1.2 million X rated videos are legally sold out of the territories, 2 million are sold illegally in other jurisdictions, according to Patten). In Australia, censorship of media content has traditionally been based on the principles of the protection of society from moral harm and individual degradation, with specific emphasis on the protection of innocents from material they are not old enough for, or mentally capable of dealing with (Joint Select Committee on Video Material). Even when governments distanced themselves from direct personal censorship (such as Don Chipp's approach to the censorship of films and books in the late 1960s and early 1970s) and shifted the rationale behind censorship from prohibition to classification, the publicly stated aims of these decisions have been the support of existing community standards, rather than the imposition of strict legalistic moral values upon an unwilling society. In the debates surrounding censorship, and especially the level of censorship applied (rather than censorship as a whole), the question "what is the community we are talking about here?" has been a recurring theme. The standards that are applied to the regulation of media content, both online and off, are often the focus of community debate (a pluralistic community that obviously lacks "standards" by definition of the word). In essence the problem of maintaining a single set of moral and ethical values for the treatment of media content is a true political dilemma: a problem that lacks any form of solution acceptable to all participants. Since the introduction of the Internet as a "mass" medium (or more appropriately, a "popular" one), government indecision about how best to treat this new technology has precluded any form or content regulation other than the ad hoc use of existing non-technologically specific law to deal with areas of criminal or legally sanctionable intent (such as the use of copyright law, or the powers under the Crimes Act relating to the improper use of telecommunications services). However, indecision in political life is often associated with political weakness, and in the face of pressure to act decisively (motivated again by "community concern"), the Federal government has decided to extend the role of the Australian Broadcasting Authority to regulate and impose a censorship regime on Australian access of morally harmful materials. It is important to note the government's intention to censor access, rather than content of the Internet. While material hosted in Australia (ignoring, of course, the "cyberspace" definitions of non-territorial existence of information stored in networks) will be censored (removed from Australia computers), the government, lacking extraterritorial powers to compel the owners of machines located offshore, intends to introduce of some form of refused access list to materials located in other nations. What is interesting to consider in this context is the way that slight shifts of definitional paradigm alter the way this legislation can be considered. If information flows (upon which late capitalism is becoming more dependent) were to be located within the context of international law governing the flow of waterways, does the decision to prevent travel of morally dubious material through Australia's informational waterways impinge upon the riparian rights of other nations (the doctrine of fair usage without impeding flow; Godana 50)? Similarly, if we take Smith's extended definition of community within electronic transactional spaces (the maintenance of members' commitment to the group, monitoring and sanctioning behaviour and the production and distribution of resources), then the current Bill proposes the regulation of the activities of one community by another (granted, a larger community that incorporates the former). Seen in this context, this legislation is the direct intervention in an established social order by a larger and less homogeneous group. It may be trite to quote the Prime Minister's view of community in this context, where he states ...It is free individuals, strong communities and the rule of law which are the best defence against the intrusive power of the state and against those who think they know what is best for everyone else. (Howard 21) possibly because the paradigm in which this new legislation is situated does not classify those Australians online (who number up to 3 million) as a community in their own right. In a way the Internet users of Australia have never identified themselves as a community, nor been asked to act in a communitarian manner. While discussions about the value of community models when applied to the Internet are still divided, there are those who argue that their use of networked services can be seen in this light (Worthington). What this new legislation does, however, is preclude the establishment of public communities in order to meet the desires of government for some limits to be placed on Internet content. The Bill does allow for the development of "restricted access systems" that would allow pluralistic communities to develop and engage in a limited amount of self-regulation. These systems include privately accessible Intranets, or sites that restrict access through passwords or some other form of age verification technique. Thus, ignoring the minimum standards that will be required for these communities to qualify for some measure of self-regulatory freedom, what is unspoken here is that specific subsections of the Internet population may exist, provided they keep well away from the public gaze. A ghetto without physical walls. Under the Bill, a co-regulatory approach is endorsed by the government, favouring the establishment of industry codes of practice by ISPs and (or) the establishment of a single code of practice by the content hosting industry (content developers are relegated to yet undetermined complementary state legislation). However, this section of the Bill, in mandating a range of minimum requirements for these codes of practice, and denying plurality to the content providers, places an administrative imperative above any communitarian spirit. That is, that the Internet should have no more than one community, it should be an entity bound by a single guiding set of principles and be therefore easier to administer by Australian censors. This administrative imperative re-encapsulates the dilemma faced by governments dealing with the Internet: that at heart, the broadcast and print press paradigms of existing censorship regimes face massive administrative problems when presented with a communications technology that allows for wholesale publication of materials by individuals. Whereas the limited numbers of broadcasters and publishers have allowed the development of Australia's system of classification of materials (on a sliding scale from G to RC classifications or the equivalent print press version), the new legislation introduced into the Senate uses the classification scheme simply as a censorship mechanism: Internet content is either "ok" or "not ok". From a public administration perspective, this allows government to drastically reduce the amount of work required by regulators and eases the burden of compliance costs by ISPs, by directing clear and unambiguous statements about the acceptability of existing materials placed online. However, as we have seen in other areas of social policy (such as the rationalisation of Social Security services or Health), administrative expedience is often antipathetic to small communities that have special needs, or cultural sensitivities outside of mainstream society. While it is not appropriate to argue that public administration creates negative social impacts through expedience, what can be presented is that, where expedience is a core aim of legislation, poor administration may result. For many Australian purveyors of pornography, my comments will be entirely unhelpful as they endeavour to find effective ways to spoof offshore hosts or bone up (no pun intended) on tunnelling techniques. Given the easy way in which material can be reconstituted and relocated on the Internet, it seems likely that some form of regulatory avoidance will occur by users determined not to have their content removed or blocked. For those regulators given the unenviable task of censoring Internet access it may be worthwhile quoting from Sexing the Cherry, in which Jeanette Winterson describes the town: whose inhabitants are so cunning that to escape the insistence of creditors they knock down their houses in a single night and rebuild them elsewhere. So the number of buildings in the city is always constant but they are never in the same place from one day to the next. (43) Thus, while Winterson saw this game as a "most fulfilling pastime", it is likely to present real administrative headaches to ABA regulators when attempting to enforce the Bill's anti-avoidance clauses. The Australian government, in adapting existing regulatory paradigms to the Internet, has overlooked the informal communities who live, work and play within the virtual world of cyberspace. In attempting to meet a perceived social need for regulation with political and administrative expedience, it has ignored the potentially cohesive role of government in developing self-regulating communities who need little government intervention to produce socially beneficial outcomes. In proscribing activity externally to the realm in which these communities reside, what we may see is a new type of community, one whose desire for a feast of flesh leads them to evade the activities of regulators who operate in the "meat" world. What this may show us is that in a virtual environment, the regulators' net is no match for a world wide web. References Alston, Richard. "Regulation is Not Censorship." The Australian 13 April 1999: 55. Paterson, K., et. al. Classification Issues: Film, Video and Television. Sydney: The Office of Film and Literature Classification, 1993. Patten, F. Personal interview. 9 Feb. 1999. Godana, B.A. Africa's Shared Water Resources: Legal and Institutional Aspects of the Nile, Niger and Senegal River Systems. London: Frances Pinter, 1985. Howard, John. The Australia I Believe In: The Values, Directions and Policy Priorities of a Coalition Government Outlined in 1995. Canberra: Liberal Party, 1995. Joint Select Committee On Video Material. Report of the Joint Select Committee On Video Material. Canberra: APGS, 1988. Office of Film and Literature Classification. Cinema & Video Ratings Guide. 1999. 1 May 1999 <http://www.oflc.gov.au/classinfo.php>. Smith, Marc A. "Voices from the WELL: The Logic of the Virtual Commons." 1998. 2 Mar. 1999 <http://www.sscnet.ucla.edu/soc/csoc/papers/voices/Voices.htm>. Winterson, Jeanette. Sexing the Cherry. New York: Vintage Books. 1991. Worthington, T. Testimony before the Senate Select Committee on Information Technologies. Unpublished, 1999. Citation reference for this article MLA style: Peter Chen. "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999." M/C: A Journal of Media and Culture 2.3 (1999). [your date of access] <http://www.uq.edu.au/mc/9905/bill.php>. Chicago style: Peter Chen, "Community without Flesh: First Thoughts on the New Broadcasting Services Amendment (Online Services) Bill 1999," M/C: A Journal of Media and Culture 2, no. 3 (1999), <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]). APA style: Author. (1999) Community without flesh: first thoughts on the new broadcasting services amendment (online services) bill 1999. M/C: A Journal of Media and Culture 2(3). <http://www.uq.edu.au/mc/9905/bill.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
34

Pace, Steven. "Revisiting Mackay Online." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1527.

Full text
Abstract:
IntroductionIn July 1997, the Mackay campus of Central Queensland University hosted a conference with the theme Regional Australia: Visions of Mackay. It was the first academic conference to be held at the young campus, and its aim was to provide an opportunity for academics, business people, government officials, and other interested parties to discuss their visions for the development of Mackay, a regional community of 75,000 people situated on the Central Queensland coast (Danaher). I delivered a presentation at that conference and authored a chapter in the book that emerged from its proceedings. The chapter entitled “Mackay Online” explored the potential impact that the Internet could have on the Mackay region, particularly in the areas of regional business, education, health, and entertainment (Pace). Two decades later, how does the reality compare with that vision?Broadband BluesAt the time of the Visions of Mackay conference, public commercial use of the Internet was in its infancy. Many Internet services and technologies that users take for granted today were uncommon or non-existent then. Examples include online video, video-conferencing, Voice over Internet Protocol (VoIP), blogs, social media, peer-to-peer file sharing, payment gateways, content management systems, wireless data communications, smartphones, mobile applications, and tablet computers. In 1997, most users connected to the Internet using slow dial-up modems with speeds ranging from 28.8 Kbps to 33.6 Kbps. 56 Kbps modems had just become available. Lamenting these slow data transmission speeds, I looked forward to a time when widespread availability of high-bandwidth networks would allow the Internet’s services to “expand to include electronic commerce, home entertainment and desktop video-conferencing” (Pace 103). Although that future eventually arrived, I incorrectly anticipated how it would arrive.In 1997, Optus and Telstra were engaged in the rollout of hybrid fibre coaxial (HFC) networks in Sydney, Melbourne, and Brisbane for the Optus Vision and Foxtel pay TV services (Meredith). These HFC networks had a large amount of unused bandwidth, which both Telstra and Optus planned to use to provide broadband Internet services. Telstra's Big Pond Cable broadband service was already available to approximately one million households in Sydney and Melbourne (Taylor), and Optus was considering extending its cable network into regional Australia through partnerships with smaller regional telecommunications companies (Lewis). These promising developments seemed to point the way forward to a future high-bandwidth network, but that was not the case. A short time after the Visions of Mackay conference, Telstra and Optus ceased the rollout of their HFC networks in response to the invention of Asynchronous Digital Subscriber Line (ADSL), a technology that increases the bandwidth of copper wire and enables Internet connections of up to 6 Mbps over the existing phone network. ADSL was significantly faster than a dial-up service, it was broadly available to homes and businesses across the country, and it did not require enormous investment in infrastructure. However, ADSL could not offer speeds anywhere near the 27 Mbps of the HFC networks. When it came to broadband provision, Australia seemed destined to continue playing catch-up with the rest of the world. According to data from the Organisation for Economic Cooperation and Development (OECD), in 2009 Australia ranked 18th in the world for broadband penetration, with 24.1 percent of Australians having a fixed-line broadband subscription. Statistics like these eventually prompted the federal government to commit to the deployment of a National Broadband Network (NBN). In 2009, the Kevin Rudd Government announced that the NBN would combine fibre-to-the-premises (FTTP), fixed wireless, and satellite technologies to deliver Internet speeds of up to 100 Mbps to 90 percent of Australian homes, schools, and workplaces (Rudd).The rollout of the NBN in Mackay commenced in 2013 and continued, suburb by suburb, until its completion in 2017 (Frost, “Mackay”; Garvey). The rollout was anything but smooth. After a change of government in 2013, the NBN was redesigned to reduce costs. A mixed copper/optical technology known as fibre-to-the-node (FTTN) replaced FTTP as the preferred approach for providing most NBN connections. The resulting connection speeds were significantly slower than the 100 Mbps that was originally proposed. Many Mackay premises could only achieve a maximum speed of 40 Mbps, which led to some overcharging by Internet service providers, and subsequent compensation for failing to deliver services they had promised (“Optus”). Some Mackay residents even complained that their new NBN connections were slower than their former ADSL connections. NBN Co representatives claimed that the problems were due to “service providers not buying enough space in the network to provide the service they had promised to customers” (“Telcos”). Unsurprisingly, the number of complaints about the NBN that were lodged with the Telecommunications Industry Ombudsman skyrocketed during the last six months of 2017. Queensland complaints increased by approximately 40 percent when compared with the same period during the previous year (“Qld”).Despite the challenges presented by infrastructure limitations, the rollout of the NBN was a boost for the Mackay region. For some rural residents, it meant having reliable Internet access for the first time. Frost, for example, reports on the experiences of a Mackay couple who could not get an ADSL service at their rural home because it was too far away from the nearest telephone exchange. Unreliable 3G mobile broadband was the only option for operating their air-conditioning business. All of that changed with the arrival of the NBN. “It’s so fast we can run a number of things at the same time”, the couple reported (“NBN”).Networking the NationOne factor that contributed to the uptake of Internet services in the Mackay region after the Visions of Mackay conference was the Australian Government’s Networking the Nation (NTN) program. When the national telecommunications carrier Telstra was partially privatised in 1997, and further sold in 1999, proceeds from the sale were used to fund an ambitious communications infrastructure program named Networking the Nation (Department of Communications, Information Technology and the Arts). The program funded projects that improved the availability, accessibility, affordability, and use of communications facilities and services throughout regional Australia. Eligibility for funding was limited to not-for-profit organisations, including local councils, regional development organisations, community groups, local government associations, and state and territory governments.In 1998, the Mackay region received $930,000 in Networking the Nation funding for Mackay Regionlink, a project that aimed to provide equitable community access to online services, skills development for local residents, an affordable online presence for local business and community organisations, and increased external awareness of the Mackay region (Jewell et al.). One element of the project was a training program that provided basic Internet skills to 2,168 people across the region over a period of two years. A second element of the project involved the establishment of 20 public Internet access centres in locations throughout the region, such as libraries, community centres, and tourist information centres. The centres provided free Internet access to users and encouraged local participation and skill development. More than 9,200 users were recorded in these centres during the first year of the project, and the facilities remained active until 2006. A third element of the project was a regional web portal that provided a free easily-updated online presence for community organisations. The project aimed to have every business and community group in the Mackay region represented on the website, with hosting fees for the business web pages funding its ongoing operation and development. More than 6,000 organisations were listed on the site, and the project remained financially viable until 2005.The availability, affordability and use of communications facilities and services in Mackay increased significantly during the period of the Regionlink project. Changes in technology, services, markets, competition, and many other factors contributed to this increase, so it is difficult to ascertain the extent to which Mackay Regionlink fostered those outcomes. However, the large number of people who participated in the Regionlink training program and made use of the public Internet access centres, suggests that the project had a positive influence on digital literacy in the Mackay region.The Impact on BusinessThe Internet has transformed regional business for both consumers and business owners alike since the Visions of Mackay conference. When Mackay residents made a purchase in 1997, their choice of suppliers was limited to a few local businesses. Today they can shop online in a global market. Security concerns were initially a major obstacle to the growth of electronic commerce. Consumers were slow to adopt the Internet as a place for doing business, fearing that their credit card details would be vulnerable to hackers once they were placed online. After observing the efforts that finance and software companies were making to eliminate those obstacles, I anticipated that it would only be a matter of time before online transactions became commonplace:Consumers seeking a particular product will be able to quickly find the names of suitable suppliers around the world, compare their prices, and place an order with the one that can deliver the product at the cheapest price. (Pace 106)This expectation was soon fulfilled by the arrival of online payment systems such as PayPal in 1998, and online shopping services such as eBay in 1997. eBay is a global online auction and shopping website where individuals and businesses buy and sell goods and services worldwide. The eBay service is free to use for buyers, but sellers are charged modest fees when they make a sale. It exemplifies the notion of “friction-free capitalism” articulated by Gates (157).In 1997, regional Australian business owners were largely sceptical about the potential benefits the Internet could bring to their businesses. Only 11 percent of Australian businesses had some form of web presence, and less than 35 percent of those early adopters felt that their website was significant to their business (Department of Industry, Science and Tourism). Anticipating the significant opportunities that the Internet offered Mackay businesses to compete in new markets, I recommended that they work “towards the goal of providing products and services that meet the needs of international consumers as well as local ones” (107). In the two decades that have passed since that time, many Mackay businesses have been doing just that. One prime example is Big on Shoes (bigonshoes.com.au), a retailer of ladies’ shoes from sizes five to fifteen (Plane). Big on Shoes has physical shopfronts in Mackay and Moranbah, an online store that has been operating since 2009, and more than 12,000 followers on Facebook. This speciality store caters for women who have traditionally been unable to find shoes in their size. As the store’s customer base has grown within Australia and internationally, an unexpected transgender market has also emerged. In 2018 Big on Shoes was one of 30 regional businesses featured in the first Facebook and Instagram Annual Gift Guide, and it continues to build on its strengths (Cureton).The Impact on HealthThe growth of the Internet has improved the availability of specialist health services for people in the Mackay region. Traditionally, access to surgical services in Mackay has been much more limited than in metropolitan areas because of the shortage of specialists willing to practise in regional areas (Green). In 2003, a senior informant from the Royal Australasian College of Surgeons bluntly described the Central Queensland region from Mackay to Gladstone as “a black hole in terms of surgery” (Birrell et al. 15). In 1997 I anticipated that, although the Internet would never completely replace a visit to a local doctor or hospital, it would provide tools that improve the availability of specialist medical services for people living in regional areas. Using these tools, doctors would be able to “analyse medical images captured from patients living in remote locations” and “diagnose patients at a distance” (Pace 108).These expectations have been realised in the form of Queensland Health’s Telehealth initiative, which permits medical specialists in Brisbane and Townsville to conduct consultations with patients at the Mackay Base Hospital using video-conference technology. Telehealth reduces the need for patients to travel for specialist advice, and it provides health professionals with access to peer support. Averill (7), for example, reports on the experience of a breast cancer patient at the Mackay Base Hospital who was able to participate in a drug trial with a Townsville oncologist through the Telehealth network. Mackay health professionals organised the patient’s scans, administered blood tests, and checked her lymph nodes, blood pressure and weight. Townsville health professionals then used this information to advise the Mackay team about her ongoing treatment. The patient expressed appreciation that the service allowed her to avoid the lengthy round-trip to Townsville. Prior to being offered the Telehealth option, she had refused to participate in the trial because “the trip was just too much of a stumbling block” (Averill 7).The Impact on Media and EntertainmentThe field of media and entertainment is another aspect of regional life that has been reshaped by the Internet since the Visions of Mackay conference. Most of these changes have been equally apparent in both regional and metropolitan areas. Over the past decade, the way individuals consume media has been transformed by new online services offering user-generated video, video-on-demand, and catch-up TV. These developments were among the changes I anticipated in 1997:The convergence of television and the Internet will stimulate the creation of new services such as video-on-demand. Today television is a synchronous media—programs are usually viewed while they are being broadcast. When high-quality video can be transmitted over the information superhighway, users will be able to watch what they want, when and where they like. […] Newly released movies will continue to be rented, but probably not from stores. Instead, consumers will shop on the information superhighway for movies that can be delivered on demand.In the mid-2000s, free online video-sharing services such as YouTube and Vimeo began to emerge. These websites allow users to freely upload, view, share, comment on, and curate online videos. Subscription-based streaming services such as Netflix and Amazon Prime have also become increasingly popular since that time. These services offer online streaming of a library of films and television programs for a fee of less than 20 dollars per month. Computers, smart TVs, Blu-ray players, game consoles, mobile phones, tablets, and other devices provide a multitude of ways of accessing streaming services. Some of these devices cost less than 100 dollars, while higher-end electronic devices include the capability as a bundled feature. Netflix became available in Mackay at the time of its Australian launch in 2015. The growth of streaming services greatly reduced the demand for video rental shops in the region, and all closed down as a result. The last remaining video rental store in Mackay closed its doors in 2018 after trading for 26 years (“Last”).Some of the most dramatic transformations that have occurred the field of media and entertainment were not anticipated in 1997. The rise of mobile technology, including wireless data communications, smartphones, mobile applications, and tablet computers, was largely unforeseen at that time. Some Internet luminaries such as Vinton Cerf expected that mobile access to the Internet via laptop computers would become commonplace (Lange), but this view did not encompass the evolution of smartphones, and it was not widely held. Similarly, the rise of social media services and the impact they have had on the way people share content and communicate was generally unexpected. In some respects, these phenomena resemble the Black Swan events described by Nassim Nicholas Taleb (xvii)—surprising events with a major effect that are often inappropriately rationalised after the fact. They remind us of how difficult it is to predict the future media landscape by extrapolating from things we know, while failing to take into consideration what we do not know.The Challenge for MackayIn 1997, when exploring the potential impact that the Internet could have on the Mackay region, I identified a special challenge that the community faced if it wanted to be competitive in this new environment:The region has traditionally prospered from industries that control physical resources such as coal, sugar and tourism, but over the last two decades there has been a global ‘shift away from physical assets and towards information as the principal driver of wealth creation’ (Petre and Harrington 1996). The risk for Mackay is that its residents may be inclined to believe that wealth can only be created by means of industries that control physical assets. The community must realise that its value-added information is at least as precious as its abundant natural resources. (110)The Mackay region has not responded well to this challenge, as evidenced by measures such as the Knowledge City Index (KCI), a collection of six indicators that assess how well a city is positioned to grow and advance in today’s technology-driven, knowledge-based economy. A 2017 study used the KCI to conduct a comparative analysis of 25 Australian cities (Pratchett, Hu, Walsh, and Tuli). Mackay rated reasonably well in the areas of Income and Digital Access. But the city’s ratings were “very limited across all the other measures of the KCI”: Knowledge Capacity, Knowledge Mobility, Knowledge Industries and Smart Work (44).The need to be competitive in a technology-driven, knowledge-based economy is likely to become even more pressing in the years ahead. The 2017 World Energy Outlook Report estimated that China’s coal use is likely to have peaked in 2013 amid a rapid shift toward renewable energy, which means that demand for Mackay’s coal will continue to decline (International Energy Agency). The sugar industry is in crisis, finding itself unable to diversify its revenue base or increase production enough to offset falling global sugar prices (Rynne). The region’s biggest tourism drawcard, the Great Barrier Reef, continues to be degraded by mass coral bleaching events and ongoing threats posed by climate change and poor water quality (Great Barrier Reef Marine Park Authority). All of these developments have disturbing implications for Mackay’s regional economy and its reliance on coal, sugar, and tourism. Diversifying the local economy through the introduction of new knowledge industries would be one way of preparing the Mackay region for the impact of new technologies and the economic challenges that lie ahead.ReferencesAverill, Zizi. “Webcam Consultations.” Daily Mercury 22 Nov. 2018: 7.Birrell, Bob, Lesleyanne Hawthorne, and Virginia Rapson. The Outlook for Surgical Services in Australasia. Melbourne: Monash University Centre for Population and Urban Research, 2003.Cureton, Aidan. “Big Shoes, Big Ideas.” Daily Mercury 8 Dec. 2018: 12.Danaher, Geoff. Ed. Visions of Mackay: Conference Papers. Rockhampton: Central Queensland UP, 1998.Department of Communications, Information Technology and the Arts. Networking the Nation: Evaluation of Outcomes and Impacts. Canberra: Australian Government, 2005.Department of Industry, Science and Tourism. Electronic Commerce in Australia. Canberra: Australian Government, 1998.Frost, Pamela. “Mackay Is Up with Switch to Speed to NBN.” Daily Mercury 15 Aug. 2013: 8.———. “NBN Boost to Business.” Daily Mercury 29 Oct. 2013: 3.Gates, Bill. The Road Ahead. New York: Viking Penguin, 1995.Garvey, Cas. “NBN Rollout Hit, Miss in Mackay.” Daily Mercury 11 Jul. 2017: 6.Great Barrier Reef Marine Park Authority. Reef Blueprint: Great Barrier Reef Blueprint for Resilience. Townsville: Great Barrier Reef Marine Park Authority, 2017.Green, Anthony. “Surgical Services and Referrals in Rural and Remote Australia.” Medical Journal of Australia 177.2 (2002): 110–11.International Energy Agency. World Energy Outlook 2017. France: IEA Publications, 2017.Jewell, Roderick, Mary O’Flynn, Fiorella De Cindio, and Margaret Cameron. “RCM and MRL—A Reflection on Two Approaches to Constructing Communication Memory.” Constructing and Sharing Memory: Community Informatics, Identity and Empowerment. Eds. Larry Stillman and Graeme Johanson. Newcastle: Cambridge Scholars Publishing, 2007. 73–86.Lange, Larry. “The Internet: Where’s It All Going?” Information Week 17 Jul. 1995: 30.“Last Man Standing Shuts Doors after 26 Years of Trade.” Daily Mercury 28 Aug. 2018: 7.Lewis, Steve. “Optus Plans to Share Cost Burden.” Australian Financial Review 22 May 1997: 26.Meredith, Helen. “Time Short for Cable Modem.” Australian Financial Review 10 Apr. 1997: 42Nassim Nicholas Taleb. The Black Swan: The Impact of the Highly Improbable. New York: Random House, 2007.“Optus Offers Comp for Slow NBN.” Daily Mercury 10 Nov. 2017: 15.Organisation for Economic Cooperation and Development. “Fixed Broadband Subscriptions.” OECD Data, n.d. <https://data.oecd.org/broadband/fixed-broadband-subscriptions.htm>.Pace, Steven. “Mackay Online.” Visions of Mackay: Conference Papers. Ed. Geoff Danaher. Rockhampton: Central Queensland University Press, 1998. 111–19.Petre, Daniel and David Harrington. The Clever Country? Australia’s Digital Future. Sydney: Lansdown Publishing, 1996.Plane, Melanie. “A Shoe-In for Big Success.” Daily Mercury 9 Sep. 2017: 6.Pratchett, Lawrence, Richard Hu, Michael Walsh, and Sajeda Tuli. The Knowledge City Index: A Tale of 25 Cities in Australia. Canberra: University of Canberra neXus Research Centre, 2017.“Qld Customers NB-uN Happy Complaints about NBN Service Double in 12 Months.” Daily Mercury 17 Apr. 2018: 1.Rudd, Kevin. “Media Release: New National Broadband Network.” Parliament of Australia Press Release, 7 Apr. 2009 <https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:"media/pressrel/PS8T6">.Rynne, David. “Revitalising the Sugar Industry.” Sugar Policy Insights Feb. 2019: 2–3.Taylor, Emma. “A Dip in the Pond.” Sydney Morning Herald 16 Aug. 1997: 12.“Telcos and NBN Co in a Crisis.” Daily Mercury 27 Jul. 2017: 6.
APA, Harvard, Vancouver, ISO, and other styles
35

Burwell, Catherine. "New(s) Readers: Multimodal Meaning-Making in AJ+ Captioned Video." M/C Journal 20, no. 3 (June 21, 2017). http://dx.doi.org/10.5204/mcj.1241.

Full text
Abstract:
IntroductionIn 2013, Facebook introduced autoplay video into its newsfeed. In order not to produce sound disruptive to hearing users, videos were muted until a user clicked on them to enable audio. This move, recognised as a competitive response to the popularity of video-sharing sites like YouTube, has generated significant changes to the aesthetics, form, and modalities of online video. Many video producers have incorporated captions into their videos as a means of attracting and maintaining user attention. Of course, captions are not simply a replacement or translation of sound, but have instead added new layers of meaning and changed the way stories are told through video.In this paper, I ask how the use of captions has altered the communication of messages conveyed through online video. In particular, I consider the role captions have played in news reporting, as online platforms like Facebook become increasingly significant sites for the consumption of news. One of the most successful producers of online news video has been Al Jazeera Plus (AJ+). I examine two recent AJ+ news videos to consider how meaning is generated when captions are integrated into the already multimodal form of the video—their online reporting of Australian versus US healthcare systems, and the history of the Black Panther movement. I analyse interactions amongst image, sound, language, and typography and consider the role of captions in audience engagement, branding, and profit-making. Sean Zdenek notes that captions have yet to be recognised “as a significant variable in multimodal analysis, on par with image, sound and video” (xiii). Here, I attempt to pay close attention to the representational, cultural and economic shifts that occur when captions become a central component of online news reporting. I end by briefly enquiring into the implications of captions for our understanding of literacy in an age of constantly shifting media.Multimodality in Digital MediaJeff Bezemer and Gunther Kress define a mode as a “socially and culturally shaped resource for meaning making” (171). Modes include meaning communicated through writing, sound, image, gesture, oral language, and the use of space. Of course, all meanings are conveyed through multiple modes. A page of written text, for example, requires us to make sense through the simultaneous interpretation of words, space, colour, and font. Media such as television and film have long been understood as multimodal; however, with the appearance of digital technologies, media’s multimodality has become increasingly complex. Video games, for example, demonstrate an extraordinary interplay between image, sound, oral language, written text, and interactive gestures, while technologies such as the mobile phone combine the capacity to produce meaning through speaking, writing, and image creation.These multiple modes are not simply layered one on top of the other, but are instead “enmeshed through the complexity of interaction, representation and communication” (Jewitt 1). The rise of multimodal media—as well as the increasing interest in understanding multimodality—occurs against the backdrop of rapid technological, cultural, political, and economic change. These shifts include media convergence, political polarisation, and increased youth activism across the globe (Herrera), developments that are deeply intertwined with uses of digital media and technology. Indeed, theorists of multimodality like Jay Lemke challenge us to go beyond formalist readings of how multiple modes work together to create meaning, and to consider multimodality “within a political economy and a cultural ecology of identities, markets and values” (140).Video’s long history as an inexpensive and portable way to produce media has made it an especially dynamic form of multimodal media. In 1974, avant-garde video artist Nam June Paik predicted that “new forms of video … will stimulate the whole society to find more imaginative ways of telecommunication” (45). Fast forward more than 40 years, and we find that video has indeed become an imaginative and accessible form of communication. The cultural influence of video is evident in the proliferation of video genres, including remix videos, fan videos, Let’s Play videos, video blogs, live stream video, short form video, and video documentary, many of which combine semiotic resources in novel ways. The economic power of video is evident in the profitability of video sharing sites—YouTube in particular—as well as the recent appearance of video on other social media platforms such as Instagram and Facebook.These platforms constitute significant “sites of display.” As Rodney Jones notes, sites of display are not merely the material media through which information is displayed. Rather, they are complex spaces that organise social interactions—for example, between producers and users—and shape how meaning is made. Certainly we can see the influence of sites of display by considering Facebook’s 2013 introduction of autoplay into its newsfeed, a move that forced video producers to respond with new formats. As Edson Tandoc and Julian Maitra write, news organisations have had been forced to “play by Facebook’s frequently modified rules and change accordingly when the algorithms governing the social platform change” (2). AJ+ has been considered one of the media companies that has most successfully adapted to these changes, an adaptation I examine below. I begin by taking up Lemke’s challenge to consider multimodality contextually, reading AJ+ videos through the conceptual lens of the “attention economy,” a lens that highlights the profitability of attention within digital cultures. I then follow with analyses of two short AJ+ videos to show captions’ central role, not only in conveying meaning, but also in creating markets, and communicating branded identities and ideologies.AJ+, Facebook and the New Economies of AttentionThe Al Jazeera news network was founded in 1996 to cover news of the Arab world, with a declared commitment to give “voice to the voiceless.” Since that time, the network has gained global influence, yet many of its attempts to break into the American market have been unsuccessful (Youmans). In 2013, the network acquired Current TV in an effort to move into cable television. While that effort ultimately failed, Al Jazeera’s purchase of the youth-oriented Current TV nonetheless led to another, surprisingly fruitful enterprise, the development of the digital media channel Al Jazeera Plus (AJ+). AJ+ content, which is made up almost entirely of video, is directed at 18 to 35-year-olds. As William Youmans notes, AJ+ videos are informal and opinionated, and, while staying consistent with Al Jazeera’s mission to “give voice to the voiceless,” they also take an openly activist stance (114). Another distinctive feature of AJ+ videos is the way they are tailored for specific platforms. From the beginning, AJ+ has had particular success on Facebook, a success that has been recognised in popular and trade publications. A 2015 profile on AJ+ videos in Variety (Roettgers) noted that AJ+ was the ninth biggest video publisher on the social network, while a story on Journalism.co (Reid, “How AJ+ Reaches”) that same year commented on the remarkable extent to which Facebook audiences shared and interacted with AJ+ videos. These stories also note the distinctive video style that has become associated with the AJ+ brand—short, bold captions; striking images that include photos, maps, infographics, and animations; an effective opening hook; and a closing call to share the video.AJ+ video producers were developing this unique style just as Facebook’s autoplay was being introduced into newsfeeds. Autoplay—a mechanism through which videos are played automatically, without action from a user—predates Facebook’s introduction of the feature. However, autoplay on Internet sites had already begun to raise the ire of many users before its appearance on Facebook (Oremus, “In Defense of Autoplay”). By playing video automatically, autoplay wrests control away from users, and causes particular problems for users using assistive technologies. Reporting on Facebook’s decision to introduce autoplay, Josh Constine notes that the company was looking for a way to increase advertising revenues without increasing the number of actual ads. Encouraging users to upload and share video normalises the presence of video on Facebook, and opens up the door to the eventual addition of profitable video ads. Ensuring that video plays automatically gives video producers an opportunity to capture the attention of users without the need for them to actively click to start a video. Further, ensuring that the videos can be understood when played silently means that both deaf users and users who are situationally unable to hear the audio can also consume its content in any kind of setting.While Facebook has promoted its introduction of autoplay as a benefit to users (Oremus, “Facebook”), it is perhaps more clearly an illustration of the carefully-crafted production strategies used by digital platforms to capture, maintain, and control attention. Within digital capitalism, attention is a highly prized and scarce resource. Michael Goldhaber argues that once attention is given, it builds the potential for further attention in the future. He writes that “obtaining attention is obtaining a kind of enduring wealth, a form of wealth that puts you in a preferred position to get anything this new economy offers” (n.p.). In the case of Facebook, this offers video producers the opportunity to capture users’ attention quickly—in the time it takes them to scroll through their newsfeed. While this may equate to only a few seconds, those few seconds hold, as Goldhaber predicted, the potential to create further value and profit when videos are viewed, liked, shared, and commented on.Interviews with AJ+ producers reveal that an understanding of the value of this attention drives the organisation’s production decisions, and shapes content, aesthetics, and modalities. They also make it clear that it is captions that are central in their efforts to engage audiences. Jigar Mehta, former head of engagement at AJ+, explains that “those first three to five seconds have become vital in grabbing the audience’s attention” (quoted in Reid, “How AJ+ Reaches”). While early videos began with the AJ+ logo, that was soon dropped in favour of a bold image and text, a decision that dramatically increased views (Reid, “How AJ+ Reaches”). Captions and titles are not only central to grabbing attention, but also to maintaining it, particularly as many audience members consume video on mobile devices without sound. Mehta tells an editor at the Nieman Journalism Lab:we think a lot about whether a video works with the sound off. Do we have to subtitle it in order to keep the audience retention high? Do we need to use big fonts? Do we need to use color blocking in order to make words pop and make things stand out? (Mehta, qtd. in Ellis)An AJ+ designer similarly suggests that the most important aspects of AJ+ videos are brand, aesthetic style, consistency, clarity, and legibility (Zou). While questions of brand, style, and clarity are not surprising elements to associate with online video, the matter of legibility is. And yet, in contexts where video is viewed on small, hand-held screens and sound is not an option, legibility—as it relates to the arrangement, size and colour of type—does indeed take on new importance to storytelling and sense-making.While AJ+ producers frame the use of captions as an innovative response to Facebook’s modern algorithmic changes, it makes sense to also remember the significant histories of captioning that their videos ultimately draw upon. This lineage includes silent films of the early twentieth century, as well as the development of closed captions for deaf audiences later in that century. Just as he argues for the complexity, creativity, and transformative potential of captions themselves, Sean Zdenek also urges us to view the history of closed captioning not as a linear narrative moving inevitably towards progress, but as something far more complicated and marked by struggle, an important reminder of the fraught and human histories that are often overlooked in accounts of “new media.” Another important historical strand to consider is the centrality of the written word to digital media, and to the Internet in particular. As Carmen Lee writes, despite public anxieties and discussions over a perceived drop in time spent reading, digital media in fact “involve extensive use of the written word” (2). While this use takes myriad forms, many of these forms might be seen as connected to the production, consumption, and popularity of captions, including practices such as texting, tweeting, and adding titles and catchphrases to photos.Captions, Capture, and Contrast in Australian vs. US HealthcareOn May 4, 2017, US President Donald Trump was scheduled to meet with Australian Prime Minister Malcolm Turnbull in New York City. Trump delayed the meeting, however, in order to await the results of a vote in the US House of Representatives to repeal the Affordable Care Act—commonly known as Obama Care. When he finally sat down with the Prime Minister later that day, Trump told him that Australia has “better health care” than the US, a statement that, in the words of a Guardian report, “triggered astonishment and glee” amongst Trump’s critics (Smith). In response to Trump’s surprising pronouncement, AJ+ produced a 1-minute video extending Trump’s initial comparison with a series of contrasts between Australian government-funded health care and American privatised health care (Facebook, “President Trump Says…”). The video provides an excellent example of the role captions play in both generating attention and creating the unique aesthetic that is crucial to the AJ+ brand.The opening frame of the video begins with a shot of the two leaders seated in front of the US and Australian flags, a diplomatic scene familiar to anyone who follows politics. The colours of the picture are predominantly red, white and blue. Superimposed on top of the image is a textbox containing the words “How does Australia’s healthcare compare to the US?” The question appears in white capital letters on a black background, and the box itself is heavily outlined in yellow. The white and yellow AJ+ logo appears in the upper right corner of the frame. This opening frame poses a question to the viewer, encouraging a kind of rhetorical interactivity. Through the use of colour in and around the caption, it also quickly establishes the AJ+ brand. This opening scene also draws on the Internet’s history of humorous “image macros”—exemplified by the early LOL cat memes—that create comedy through the superimposition of captions on photographic images (Shifman).Captions continue to play a central role in meaning-making once the video plays. In the next frame, Trump is shown speaking to Turnbull. As he speaks, his words—“We have a failing healthcare”—drop onto the screen (Image 1). The captions are an exact transcription of Trump’s awkward phrase and appear centred in caps, with the words “failing healthcare” emphasised in larger, yellow font. With or without sound, these bold captions are concise, easily read on a small screen, and visually dominate the frame. The next few seconds of the video complete the sequence, as Trump tells Turnbull, “I shouldn’t say this to our great gentleman, my friend from Australia, ‘cause you have better healthcare than we do.” These words continue to appear over the image of the two men, still filling the screen. In essence, Trump’s verbal gaffe, transcribed word for word and appearing in AJ+’s characteristic white and yellow lettering, becomes the video’s hook, designed to visually call out to the Facebook user scrolling silently through their newsfeed.Image 1: “We have a failing healthcare.”The middle portion of the video answers the opening question, “How does Australia’s healthcare compare to the US?”. There is no verbal language in this segment—the only sound is a simple synthesised soundtrack. Instead, captions, images, and spatial design, working in close cooperation, are used to draw five comparisons. Each of these comparisons uses the same format. A title appears at the top of the screen, with the remainder of the screen divided in two. The left side is labelled Australia, the right U.S. Underneath these headings, a representative image appears, followed by two statistics, one for each country. For example, the third comparison contrasts Australian and American infant mortality rates (Image 2). The left side of the screen shows a close-up of a mother kissing a baby, with the superimposed caption “3 per 1,000 births.” On the other side of the yellow border, the American infant mortality rate is illustrated with an image of a sleeping baby superimposed with a corresponding caption, “6 per 1,000 births.” Without voiceover, captions do much of the work of communicating the national differences. They are, however, complemented and made more quickly comprehensible through the video’s spatial design and its subtly contrasting images, which help to visually organise the written content.Image 2: “Infant mortality rate”The final 10 seconds of the video bring sound back into the picture. We once again see and hear Trump tell Turnbull, “You have better healthcare than we do.” This image transforms into another pair of male faces—liberal American commentator Chris Hayes and US Senator Bernie Sanders—taken from a MSNBC cable television broadcast. On one side, Hayes says “They do have, they have universal healthcare.” On the other, Sanders laughs uproariously in response. The only added caption for this segment is “Hahahaha!”, the simplicity of which suggests that the video’s target audience is assumed to have a context for understanding Sander’s laughter. Here and throughout the video, autoplay leads to a far more visual style of relating information, one in which captions—working alongside images and layout—become, in Zdenek’s words, a sort of “textual performance” (6).The Black Panther Party and the Textual Performance of Progressive PoliticsReports on police brutality and Black Lives Matters protests have been amongst AJ+’s most widely viewed and shared videos (Reid, “Beyond Websites”). Their 2-minute video (Facebook, Black Panther) commemorating the 50th anniversary of the Black Panther Party, viewed 9.5 million times, provides background to these contemporary events. Like the comparison of American and Australian healthcare, captions shape the video’s structure. But here, rather than using contrast as means of quick visual communication, the video is structured as a list of five significant points about the Black Panther Party. Captions are used not only to itemise and simplify—and ultimately to reduce—the party’s complex history, but also, somewhat paradoxically, to promote the news organisation’s own progressive values.After announcing the intent and structure of the video—“5 things you should know about the Black Panther Party”—in its first 3 seconds, the video quickly sets in to describe each item in turn. The themes themselves correspond with AJ+’s own interests in policing, community, and protest, while the language used to announce each theme is characteristically concise and colloquial:They wanted to end police brutality.They were all about the community.They made enemies in high places.Women were vocal and active panthers.The Black Panthers’ legacy is still alive today.Each of these themes is represented using a combination of archival black and white news footage and photographs depicting Black Panther members, marches, and events. These still and moving images are accompanied by audio recordings from party members, explaining its origins, purposes, and influences. Captions are used throughout the video both to indicate the five themes and to transcribe the recordings. As the video moves from one theme to another, the corresponding number appears in the centre of the screen to indicate the transition, and then shrinks and moves to the upper left corner of the screen as a reminder for viewers. A musical soundtrack of strings and percussion, communicating a sense of urgency, underscores the full video.While typographic features like font size, colour, and placement were significant in communicating meaning in AJ+’s healthcare video, there is an even broader range of experimentation here. The numbers 1 to 5 that appear in the centre of the screen to announce each new theme blink and flicker like the countdown at the beginning of bygone film reels, gesturing towards the historical topic and complementing the black and white footage. For those many viewers watching the video without sound, an audio waveform above the transcribed interviews provides a visual clue that the captions are transcriptions of recorded voices. Finally, the colour green, used infrequently in AJ+ videos, is chosen to emphasise a select number of key words and phrases within the short video. Significantly, all of these words are spoken by Black Panther members. For example, captions transcribing former Panther leader Ericka Huggins speaking about the party’s slogan—“All power to the people”—highlight the words “power” and “people” with large, lime green letters that stand out against the grainy black and white photos (Image 3). The captions quite literally highlight ideas about oppression, justice, and social change that are central to an understanding of the history of the Black Panther Party, but also to the communication of the AJ+ brand.Image 3: “All power to the people”ConclusionEmploying distinctive combinations of word and image, AJ+ videos are produced to call out to users through the crowded semiotic spaces of social media. But they also call out to scholars to think carefully about the new kinds of literacies associated with rapidly changing digital media formats. Captioned video makes clear the need to recognise how meaning is constructed through sophisticated interpretive strategies that draw together multiple modes. While captions are certainly not new, an analysis of AJ+ videos suggests the use of novel typographical experiments that sit “midway between language and image” (Stöckl 289). Discussions of literacy need to expand to recognise this experimentation and to account for the complex interactions between the verbal and visual that get lost when written text is understood to function similarly across multiple platforms. In his interpretation of closed captioning, Zdenek provides an insightful list of the ways that captions transform meaning, including their capacity to contextualise, clarify, formalise, linearise and distill (8–9). His list signals not only the need for a deeper understanding of the role of captions, but also for a broader and more vivid vocabulary to describe multimodal meaning-making. Indeed, as Allan Luke suggests, within the complex multimodal and multilingual contexts of contemporary global societies, literacy requires that we develop and nurture “languages to talk about language” (459).Just as importantly, an analysis of captioned video that takes into account the economic reasons for captioning also reminds us of the need for critical media literacies. AJ+ videos reveal how the commercial goals of branding, promotion, and profit-making influence the shape and presentation of news. As meaning-makers and as citizens, we require the capacity to assess how we are being addressed by news organisations that are themselves responding to the interests of economic and cultural juggernauts such as Facebook. In schools, universities, and informal learning spaces, as well as through discourses circulated by research, media, and public policy, we might begin to generate more explicit and critical discussions of the ways that digital media—including texts that inform us and even those that exhort us towards more active forms of citizenship—simultaneously seek to manage, direct, and profit from our attention.ReferencesBezemer, Jeff, and Gunther Kress. “Writing in Multimodal Texts: A Social Semiotic Account of Designs for Learning.” Written Communication 25.2 (2008): 166–195.Constine, Josh. “Facebook Adds Automatic Subtitling for Page Videos.” TechCrunch 4 Jan. 2017. 1 May 2017 <https://techcrunch.com/2017/01/04/facebook-video-captions/>.Ellis, Justin. “How AJ+ Embraces Facebook, Autoplay, and Comments to Make Its Videos Stand Out.” Nieman Labs 3 Aug. 2015. 28 Apr. 2017 <http://www.niemanlab.org/2015/08/how-aj-embraces-facebook-autoplay-and-comments-to-make-its-videos-stand-out/>.Facebook. “President Trump Says…” Facebook, 2017. <https://www.facebook.com/ajplusenglish/videos/954884227986418/>.Facebook. “Black Panther.” Facebook, 2017. <https://www.facebook.com/ajplusenglish/videos/820822028059306/>.Goldhaber, Michael. “The Attention Economy and the Net.” First Monday 2.4 (1997). 9 June 2013 <http://firstmonday.org/article/view/519/440>.Herrera, Linda. “Youth and Citizenship in the Digital Age: A View from Egypt.” Harvard Educational Review 82.3 (2012): 333–352.Jewitt, Carey.”Introduction.” Routledge Handbook of Multimodal Analysis. Ed. Carey Jewitt. New York: Routledge, 2009. 1–8.Jones, Rodney. “Technology and Sites of Display.” Routledge Handbook of Multimodal Analysis. Ed. Carey Jewitt. New York: Routledge, 2009. 114–126.Lee, Carmen. “Micro-Blogging and Status Updates on Facebook: Texts and Practices.” Digital Discourse: Language in the New Media. Eds. Crispin Thurlow and Kristine Mroczek. Oxford Scholarship Online, 2011. DOI: 10.1093/acprof:oso/9780199795437.001.0001.Lemke, Jay. “Multimodality, Identity, and Time.” Routledge Handbook of Multimodal Analysis. Ed. Carey Jewitt. New York: Routledge, 2009. 140–150.Luke, Allan. “Critical Literacy in Australia: A Matter of Context and Standpoint.” Journal of Adolescent and Adult Literacy 43.5 (200): 448–461.Oremus, Will. “Facebook Is Eating the Media.” National Post 14 Jan. 2015. 15 June 2017 <http://news.nationalpost.com/news/facebook-is-eating-the-media-how-auto-play-videos-could-put-news-websites-out-of-business>.———. “In Defense of Autoplay.” Slate 16 June 2015. 14 June 2017 <http://www.slate.com/articles/technology/future_tense/2015/06/autoplay_videos_facebook_twitter_are_making_them_less_annoying.html>.Paik, Nam June. “The Video Synthesizer and Beyond.” The New Television: A Public/Private Art. Eds. Douglas Davis and Allison Simmons. Cambridge, MA: MIT Press, 1977. 45.Reid, Alistair. “Beyond Websites: How AJ+ Is Innovating in Digital Storytelling.” Journalism.co 17 Apr. 2015. 13 Feb. 2017 <https://www.journalism.co.uk/news/beyond-websites-how-aj-is-innovating-in-digital-storytelling/s2/a564811/>.———. “How AJ+ Reaches 600% of Its Audience on Facebook.” Journalism.co. 5 Aug. 2015. 13 Feb. 2017 <https://www.journalism.co.uk/news/how-aj-reaches-600-of-its-audience-on-facebook/s2/a566014/>.Roettgers, Jank. “How Al Jazeera’s AJ+ Became One of the Biggest Video Publishers on Facebook.” Variety 30 July 2015. 1 May 2017 <http://variety.com/2015/digital/news/how-al-jazeeras-aj-became-one-of-the-biggest-video-publishers-on-facebook-1201553333/>.Shifman, Limor. Memes in Digital Culture. Cambridge, MA: MIT Press, 2014.Smith, David. “Trump Says ‘Everybody’, Not Just Australia, Has Better Healthcare than US.” The Guardian 5 May 2017. 5 May 2017 <https://www.theguardian.com/us-news/2017/may/05/trump-healthcare-australia-better-malcolm-turnbull>.Stöckl, Hartmut. “Typography: Visual Language and Multimodality.” Interactions, Images and Texts. Eds. Sigrid Norris and Carmen Daniela Maier. Amsterdam: De Gruyter, 2014. 283–293.Tandoc, Edson, and Maitra, Julian. “New Organizations’ Use of Native Videos on Facebook: Tweaking the Journalistic Field One Algorithm Change at a Time. New Media & Society (2017). DOI: 10.1177/1461444817702398.Youmans, William. An Unlikely Audience: Al Jazeera’s Struggle in America. New York: Oxford University Press, 2017.Zdenek, Sean. Reading Sounds: Closed-Captioned Media and Popular Culture. Chicago: University of Chicago Press, 2015.Zou, Yanni. “How AJ+ Applies User-Centered Design to Win Millennials.” Medium 16 Apr. 2016. 7 May 2017 <https://medium.com/aj-platforms/how-aj-applies-user-centered-design-to-win-millennials-3be803a4192c>.
APA, Harvard, Vancouver, ISO, and other styles
36

Humphry, Justine. "Making an Impact: Cultural Studies, Media and Contemporary Work." M/C Journal 14, no. 6 (November 18, 2011). http://dx.doi.org/10.5204/mcj.440.

Full text
Abstract:
Cultural Studies has tended to prioritise the domain of leisure and consumption over work as an area for meaning making, in many ways defining everyday life in opposition to work. Greg Noble, a cultural researcher who examined work in the context of the early computerisation of Australian universities made the point that "discussions of everyday life often make the mistake of assuming that everyday life equates with home and family life, or leisure" (87). This article argues for the need within Cultural Studies to focus on work and media as a research area of everyday life. With the growth of flexible and creative labour and the widespread uptake of an array of new media technologies used for work, traditional ways to identify and measure the space and time of work have become increasingly flawed, with implications for how we account for work and negotiate its boundaries. New approaches are needed to address the complex media environments and technological practices that are an increasing part of contemporary working life. Cultural Studies can make a significant impact towards this research agenda by offering new ways to analyse the complex interrelations of space, time and technology in everyday work practice. To further this goal, a new material practices account of work termed Officing is introduced, developed through my doctoral research on professionals' daily use of information and communication technology (ICT). This approach builds on the key cultural concepts of "bricolage" and "appropriation" combined with the idea of "articulation work" proposed by Anselm Strauss, to support the analysis of the office workplace as a contingent and provisional arrangement or process. Officing has a number of benefits as a framework for analysing the nature of work in a highly mediated world. Highlighting the labour that goes into stabilising work platforms makes it possible to assess the claims of productivity and improved work-life balance brought about by new mobile media technologies; to identify previously unidentified sources of time pressure, overwork and intensification and ultimately, to contribute to the design of more sustainable work environments. The Turn Away from Work Work held a central position in social and cultural analysis in the first half of the twentieth century but as Strangleman observed, there was a marked shift away from the study of work from the mid 1970s (3.1). Much of the impulse for this shift came from critiques of the over-emphasis on relations of production and the workplace as the main source of meaning and value (5.1). In line with this position, feminist researchers challenged the traditional division of labour into paid and unpaid work, arguing that this division sustained the false perception of domestic work as non-productive (cf. Delphy; Folbre). Accompanying these critiques were significant changes in work itself, as traditional jobs literally began to disappear with the decline of manufacturing in industrialised countries (6.1). With the turn away from work in academia and the changes in the nature of work, attention shifted to the realm of the market and consumption. One of the important contributions of Cultural Studies has been the focus on the role of the consumer in driving social and technological change and processes of identity formation. Yet, it is a major problem that work is largely marginalised in cultural research of everyday life, especially since, in most industrialised nations, we are working in new ways, in rapidly changing conditions and more than ever before. Research shows that in Australia there has been a steady increase in the average hours of paid work and Australians are working harder (cf. Watson, Buchanan, Campbell and Briggs; Edwards and Wajcman). In the 2008 Australian Work and Life Index (AWALI) Skinner and Pocock found around 55 per cent of employees frequently felt rushed or pressed for time and this was associated with long working hours, work overload and an overall poor work–life interaction (8). These trends have coincided with long-term changes in the type and location of work. In Australia, like many other developed countries, information-based occupations have taken over manufacturing jobs and there has been an increase in part-time and casual work (cf. Watson et al.). Many employees now conduct work outside of the traditional workplace, with the ABS reporting that in 2008, 24 per cent of employees worked at least some hours at home. Many social analysts have explained the rise of casual and flexible labour as related to the transition to global capitalism driven by the expansion of networked information processes (cf. Castells; Van Dijk). This shift is not simply that more workers are producing ideas and information but that the previously separated spheres of production and consumption have blurred (cf. Ritzer and Jurgenson). With this, entirely new industries have sprung up, predicated on the often unpaid for creative labour of individuals, including users of media technologies. A growing chorus of writers are now pointing out that a fragmented, polarised and complex picture is emerging of this so-called "new economy", with significant implications for the quality of work (cf. Edwards and Wajcman; Fudge and Owens; Huws). Indeed, some claim that new conditions of insecure and poor quality employment or "precarious work" are fast becoming the norm. Moreover, this longer-term pattern runs parallel to the production of a multitude of new mobile media technologies, first taken up by professionals and then by the mainstream, challenging the notion that activities are bound to any particular place or time. Reinvigorating Work in Social and Cultural Analysis There are moves to reposition social and cultural analysis to respond to these various trends. Work-life balance is an example of a research and policy area that has emerged since the 1990s. The boundary between the household and the outside world has also been subject to scrutiny by cultural researchers, and these critically examine the intersection between work and consumption, gender and care (cf. Nippert-Eng; Sorenson and Lie; Noble and Lupton, "Consuming" and "Mine"; Lally). These responses are examples of a shift away from what Urry has dubbed "structures and stable organisations" to a concern with flows, movements and the blurring of boundaries between life spheres (5). In a similar vein, researchers recently have proposed alternative ways to describe the changing times and places of employment. In their study of UK professionals, Felstead, Jewson and Walters proposed a model of "plural workscapes" to explain a major shift in the spatial organisation of work (23). Mobility theorists Sheller and Urry have called for the need to "develop a more dynamic conceptualisation of the fluidities and mobilities that have increasingly hybridised the public and private" (113). All of this literature has reinforced a growing concern that in the face of new patterns of production and consumption and with the rise of complex media environments, traditional models and measures of space and time are inadequate to account for contemporary work. Analyses that rely on conventional measures of work based on hourly units clearly point to an increase in the volume of work, the speed of work and to the collision (cf. Pocock) of work and life but fall down in accounting for the complex and often contradictory role of technology. Media technologies are "Janus-faced" as Michael Arnold has suggested, referring to the two-faced Roman god to foreground the contradictory effects at the centre of all technologies (232). Wajcman notes this paradox in her research on mobile media and time, pointing out that mobile phones are just as likely to "save" time as to "consume" it (15). It was precisely this problematic of the complex interactions of the space, time and technology of work that was at stake in my research on the daily use of ICT by professional workers. In the context of changes to the location, activity and meaning of work, and with the multiplying array of old and new media technologies used by workers, how can the boundary and scope of work be determined? What are the implications of these shifting grounds for the experience and quality of work? Officing: A Material Practices Account of Office Work In the remaining article I introduce some of the key ideas and principles of a material practices account developed in my PhD, Officing: Professionals' Daily ICT Use and the Changing Space and Time of Work. This research took place between 2006 and 2007 focusing in-depth on the daily technology practices of twenty professional workers in a municipal council in Sydney and a unit of a global telecommunication company taking part in a trial of a new smart phone. Officing builds on efforts to develop a more accurate account of the space and time of work bringing into play the complex and highly mediated environment in which work takes place. It extends more recent practice-based, actor-network and cultural approaches that have, for some time, been moving towards a more co-constitutive and process-oriented approach to media and technology in society. Turning first to "bricolage" from the French bricole meaning something small and handmade, bricolage refers to the ways that individuals and groups borrow from existing cultural forms and meanings to create new uses, meanings and identities. Initially proposed by Levi-Strauss and then taken up by de Certeau, bricolage has been a useful concept within subculture and lifestyle studies to reveal the creative work performed on signs and meaning systems in forming cultural identities (cf. O'Sullivan et al.). Bricolage is also an important concept for understanding how meanings and uses are inscribed into forms in use rather than being read or activated off their design. This is the process of appropriation, through which both the object and the person are mutually shaped and users gain a sense of control and ownership (cf. Noble and Lupton; Lally; Silverstone and Haddon). The concept of bricolage highlights the improvisational qualities of appropriation and its status as work. A bricoleur is thus a person who constructs new meanings and forms by drawing on and assembling a wide range of resources at hand, sourced from multiple spheres of life. One of the problems with how bricolage and appropriation has been applied to date, notwithstanding the priority given to the domestic sphere, is the tendency to grant individuals and collectives too much control to stabilise the meanings and purposes of technologies. This problem is evident in the research drawing on the framework of "domestication" (cf. Silverstone and Haddon). In practice, the sheer volume of technologically-related issues encountered on a daily basis and the accompanying sense of frustration indicates there is no inevitable drift towards stability, nor are problems merely aberrational or trivial. Instead, daily limits to agency and attempts to overcome these are points at which meanings as well as uses are re-articulated and potentially re-invented. This is where "articulation work" comes in. Initially put forward by Anselm Strauss in 1985, articulation work has become an established analytical tool for informing technology design processes in such fields as Computer-Supported Cooperative Work (CSCW) and Workplace Studies. In these, articulation work is narrowly defined to refer to the real time activities of cooperative work. It includes dealing with contingencies, keeping technologies and systems working and making adjustments to accommodate for problems (Suchman "Supporting", 407). In combination with naturalistic investigations, this concept has facilitated engagement with the increasingly complex technological and media environments of work. It has been a powerful tool for highlighting practices deemed unimportant but which are nevertheless crucial for getting work done. Articulation work, however, has the potential to be applied in a broader sense to explain the significance of the instability of technologies and the efforts to overcome these as transformative in themselves, part of the ongoing process of appropriation that goes well beyond individual tasks or technologies. With clear correspondences to actor-network theory, this expanded definition provides the basis for a new understanding of the office as a temporary and provisional condition of stability achieved through the daily creative and improvisational activities of workers. The office, then, is dependent on and inextricably bound up in its ongoing articulation and crucially, is not bound to a particular place or time. In the context of the large-scale transformations in work already discussed, this expanded definition of articulation work helps to; firstly, address how work is re-organised and re-rationalised through changes to the material conditions of work; secondly, identify the ongoing articulations that this entails and thirdly; understand the role of these articulations in the construction of the space and time of work. This expanded definition is achieved in the newly developed concept of officing. Officing describes a form of labour directed towards the production of a stable office platform. Significantly, one of the main characteristics of this work is that it often goes undetected by organisations as well as by the workers that perform it. As explained later, its "invisibility" is in part a function of its embodiment but also relates to the boundless nature of officing, taking place both inside and outside the workplace, in or out of work time. Officing is made up of a set of interwoven activities of three main types: connecting, synchronising and configuring. Connecting can be understood as aligning technical and social relations for the performance of work at a set time. Synchronising brings together and coordinates different times and temporal demands, for example, the time of "work" with "life" or the time "out in the field" with time "in the workplace". Configuring prepares the space of work, making a single technology or media environment work to some planned action or existing pattern of activity. To give an example of connecting: in the Citizens' Service Centre of the Council, Danielle's morning rituals involved a series of connections even before her work of advising customers begins: My day: get in, sit down, turn on the computer and then slowly open each software program that I will need to use…turn on the phone, key in my password, turn on the headphones and sit there and wait for the calls! (Humphry Officing, 123) These connections not only set up and initiate the performance of work but also mark Danielle's presence in her office. Through these activities, which in practice overlap and blur, the space and time of the office comes to appear as a somewhat separate and mostly invisible structure or infrastructure. The work that goes into making the office stable takes place around the boundary of work with implications for how this boundary is constituted. These efforts do not cluster around boundaries in any simple sense but become part of the process of boundary making, contributing to the construction of categories such as "work" and "life". So, for example, for staff in the smart phone trial, the phone had become their main source of information and communication. Turning their smart phone off, or losing connectivity had ramifications that cascaded throughout their lifeworld. On the one hand, this lead to the breakdown of the distinction between "work" and "life" and a sense of "ever-presence", requiring constant and vigilant "boundary work" (cf. Nippert-Eng). On the other hand, this same state also enabled workers to respond to demands in their own time and across multiple boundaries, giving workers a sense of flexibility, control and of being "in sync". Connecting, configuring and synchronising are activities performed by bodies, producing an embodied transformation. In the tradition of phenomenology, most notably in the works of Heidegger, Merleau-Ponty and more recently Ihde, embodiment is used to explain the relationship between subjects and objects. This concept has since been developed to be understood as not residing in the body but as spread through social, material and discursive arrangements (cf. Haraway, "Situated" and Simians; Henke; Suchman, "Figuring"). Tracing efforts towards making the office stable is thus a way of uncovering how the body, as a constitutive part of a larger arrangement or network, is formed through embodiment, how it gains its competencies, social meanings and ultimately, how workers gain a sense of what it means to be a professional. So, in the smart phone trial, staff managed their connections by replying immediately to their voice, text and data messages. This immediacy not only acted as proof of their presence in the office. It also signalled their commitment to their office: their active participation and value to the organisation and their readiness to perform when called on. Importantly, this embodied transformation also helps to explain how officing becomes an example of "invisible work" (cf. Star and Strauss). Acts of connecting, synchronising and configuring become constituted and forgotten in and through bodies, spaces and times. Through their repeated performance these acts become habits, a transparent means through which the environment of work is navigated in the form of skills and techniques, configurations and routines. In conclusion, researching work in contemporary societies means confronting its marginalisation within cultural research and developing ways to comprehend and measure the interaction of space, time and the ever-multiplying array of media technologies. Officing provides a way to do this by shifting to an understanding of the workplace as a contingent product of work itself. The strength of this approach is that it highlights the creative and ongoing work of individuals on their media infrastructures. It also helps to identify and describe work activities that are not neatly contained in a workplace, thus adding to their invisibility. The invisibility of these practices can have significant impacts on workers: magnifying feelings of time pressure and a need to work faster, longer and harder even as discrete technologies are utilised to save time. In this way, officing exposes some of the additional contributions to the changing experience and quality of work as well as to the construction of everyday domains. Officing supports an evaluation of claims of productivity and work-life balance in relation to new media technologies. In the smart phone trial, contrary to an assumed increase in productivity, mobility of work was achieved at the expense of productivity. Making the mobile office stable—getting it up and running, keeping it working in changing environments and meeting expectations of speed and connectivity—took up time, resulting in an overall productivity loss and demanding more "boundary work". In spite of their adaptability and flexibility, staff tended to overwork to counteract this loss. This represented a major shift in the burden of effort in the production of office forms away from the organisation and towards the individual. Finally, though not addressed here in any detail, officing could conceivably have practical uses for designing more sustainable office environments that better support the work process and the balance of work and life. Thus, by accounting more accurately for the resource requirements of work, organisations can reduce the daily effort, space and time taken up by employees on their work environments. In any case, what is clear, is the ongoing need to continue a cultural research agenda on work—to address the connections between transformations in work and the myriad material practices that individuals perform in going about their daily work. References Arnold, Michael. "On the Phenomenology of Technology: The 'Janus-Faces' of Mobile Phones." Information and Organization 13.4 (2003): 231–56. Australian Bureau of Statistics. "6275.0 - Locations of Work, Nov 2008." Australian Bureau of Statistics, 8 May 2009. 20 May 2009 ‹http://www.abs.gov.au/ausstats/abs@.nsf/mf/6275.0›. Bauman, Zygmunt. Freedom. Minneapolis: U of Minnesota P, 1989. Castells, Manuel. The Rise of the Network Society. Malden, Massachusetts: Blackwell, 1996. Chesters, Jennifer, Janeen Baxter, and Mark Western. "Paid and Unpaid Work in Australian Households: Towards an Understanding of the New Gender Division of Labour." Familes through Life - 10th Australian Institute of Families Studies Conference, 9-11th July 2008, Melbourne: AIFS, 2008. Delphy, Christine. Close to Home: A Materialist Analysis of Women's Oppression. Amherst MA: U of Massachusetts, 1984. Edwards, Paul, and Judy Wajcman. The Politics of Working Life. Oxford: Oxford UP, 2005. Felstead, Alan, Nick Jewson, and Sally Walters. Changing Places of Work. New York: Palgrave Macmillan, 2005. Folbre, Nancy. "Exploitation Comes Home: A Critique of the Marxian Theory of Family Labor." Cambridge Journal of Economics 6.4 (1982): 317-29. Haraway, Donna. "Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective." Feminist Studies 14.3 (1988): 575-99. –––. Simians, Cyborgs, and Women: The Reinvention of Nature. London, Free Association Books, 1991. Henke, Christopher. "The Mechanics of Workplace Order: Toward a Sociology of Repair." Berkeley Journal of Sociology 44 (2000): 55-81. Humphry, Justine. Officing: Professionals' Daily ICT Use and the Changing Space and Time of Work. Dissertation, University of Western Sydney. 2010. Lally, Elaine. At Home with Computers. Oxford, New York: Berg, 2002. Nippert-Eng, Christena E. Home and Work: Negotiating Boundaries through Everyday Life. Chicago: U of Chicago P, 1996. Noble, Greg. "Everyday Work." Interpreting Everyday Culture. Ed. Fran Martin. New York: Hodder Arnold, 2004. 87-102. Noble, Greg, and Deborah Lupton. "Consuming Work: Computers, Subjectivity and Appropriation in the University Workplace." The Sociological Review 46.4 (1998): 803-27. –––. "Mine/Not Mine: Appropriating Personal Computers in the Academic Workplace." Journal of Sociology 38.1 (2002): 5-23. O'Sullivan, Tim, John Hartley, Danny Saunders, Martin Montgomery, and John Fiske. Key Concepts in Communication and Cultural Studies. London: Routledge, 1994. Pocock, Barbara. The Work/Life Collision: What Work Is Doing to Australians and What to Do about It. Sydney: The Federation P, 2003. Ritzer, George, and Nathan Jurgenson. "Production, Consumption, Prosumption." Journal of Consumer Culture 10.1 (2010): 13-36. Sheller, Mimi, and John Urry. "Mobile Transformations of 'Public' and 'Private' Life." Theory, Culture & Society 20.3 (2003): 107-25. Silverstone, Roger, and Leslie Haddon. "Design and the Domestication of Information and Communication Technologies: Technical Change and Everyday Life." Communication by Design: The Politics of Information and Communication Technologies. Eds. Roger Silverstone and Robin Mansell. Oxford: U of Oxford P, 1996. 44-74. Skinner, Natalie, and Barbara Pocock. "Work, Life and Workplace Culture: The Australian Work and Life Index (AWALI) 2008." Adelaide: The Centre for Work and Life, Hawke Research Institute, University of South Australia 2008 ‹http://www.unisa.edu.au/hawkeinstitute/cwl/default.asp›.Sorenson, Knut H., and Merete Lie. Making Technology Our Own? Domesticating Technologies into Everyday Life. Oslo: Scandinavian UP, 1996.Star, Susan L. "The Sociology of the Invisible: The Primacy of Work in the Writings of Anselm Strauss." Social Organization and Social Process: Essays in Honor of Anselm Strauss. New York: Walter de Gruyter, 1991. 265-83. Star, Susan L., and Anselm Strauss. "Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work." Computer Supported Cooperative Work 8 (1999): 9-30. Strangleman, Timothy. "Sociological Futures and the Sociology of Work." Sociological Research Online 10.4 (2005). 5 Nov. 2005 ‹http://www.socresonline.org.uk/10/4/strangleman.html›.Strauss, Anselm. "Work and the Division of Labor." The Sociological Quarterly 26 (1985): 1-19. Suchman, Lucy A. "Figuring Personhood in Sciences of the Artificial." Department of Sociology, Lancaster University. 1 Nov. 2004. 18 Jun. 2005 ‹http://www.lancs.ac.uk/fass/sociology/papers/suchman-figuring-personhood.pdf›–––. "Supporting Articulation Work." Computerization and Controversy: Value Conflicts and Social Choices. Ed. Rob Kling. San Diego: Academic P, 1995. 407-423.Urry, John. Sociology beyond Societies: Mobilities for the Twenty-First Century. London: Routledge, 2000. Van Dijk, Jan. The Network Society: Social Aspects of New Media. London: Thousand Oaks, 2006. Wajcman, Judy. "Life in the Fast Lane? Towards a Sociology of Technology and Time." The British Journal of Sociology 59.1 (2008): 59-77.Watson, Ian, John Buchanan, Iain Campbell, and Chris Briggs. Fragmented Futures: New Challenges in Working Life. Sydney: Federation P, 2003.
APA, Harvard, Vancouver, ISO, and other styles
37

Goggin, Gerard. "SMS Riot: Transmitting Race on a Sydney Beach, December 2005." M/C Journal 9, no. 1 (March 1, 2006). http://dx.doi.org/10.5204/mcj.2582.

Full text
Abstract:
My message is this in regard to SMS messages and swarming crowds; this is ludicrous behaviour; it is unAustralian. We all share this wonderful country. (NSW Police Assistant Commissioners Mark Goodwin, quoted in Kennedy) The cops hate and fear the swarming packs of Lebanese who respond when some of their numbers are confronted, mobilising quickly via mobile phones and showing open contempt for Australian law. All this is the real world, as distinct from the world preferred by ideological academics who talk about “moral panic” and the oppression of Muslims. They will see only Australian racism as the problem. (Sheehan) The Politics of Transmission On 11 December 2005, as Sydney was settling into early summer haze, there was a race riot on the popular Cronulla beach in the city’s southern suburbs. Hundreds of people, young men especially, gathered for a weekend protest. Their target and pretext were visitors from the culturally diverse suburbs to the west, and the need to defend their women and beaches in the face of such unwelcome incursions and behaviours. In the ensuing days, there were violent raids and assaults criss-crossing back and forth across Sydney’s beaches and suburbs, involving almost farcical yet deadly earnest efforts to identify, respectively, people of “anglo” or “Middle Eastern” appearance (often specifically “Lebanese”) and to threaten or bash them. At the very heart of this state of siege and the fear, outrage, and sadness that gripped those living in Sydney were the politics of transmission. The spark that set off this conflagration was widely believed to have been caused by the transmission of racist and violent “calls to arms” via mobile text messages. Predictably perhaps media outlets sought out experts on text messaging and cell phone culture for commentary, including myself and most mainstream media appeared interested in portraying a fascination for texting and reinforcing its pivotal role in the riots. In participating in media interviews, I found myself torn between wishing to attest to the significance and importance of cell phone culture and texting, on the one hand (or thumb perhaps), while being extremely sceptical about its alleged power in shaping these unfolding events, on the other — not to mention being disturbed about the ethical implications of what had unfolded. In this article, I wish to discuss the subject of transmission and the power of mobile texting culture, something that attracted much attention elsewhere — and to which the Sydney riots offer a fascinating and instructive lesson. My argument runs like this. Mobile phone culture, especially texting, has emerged over the past decade, and has played a central role in communicative and cultural practice in many countries and contexts as scholars have shown (Glotz and Bertschi; Harper, Palen and Taylor). Among other features, texting often plays a significant, if not decisive, role in co-ordinated as well as spontaneous social and political organization and networks, if not, on occasion, in revolution. However, it is important not to over-play the role, significance and force of such texting culture in the exercise of power, or the formation of collective action and identities (whether mobs, crowds, masses, movements, or multitudes). I think texting has been figured in such a hyperbolic and technological determinist way, especially, and ironically, through how it has been represented in other media (print, television, radio, and online). The difficulty then is to identify the precise contribution of mobile texting in organized and disorganized social networks, without the antimonies conferred alternatively by dystopian treatments (such as moral panic) or utopian ones (such as the technological sublime) — something which I shall try to elucidate in what follows. On the Beach Again Largely caught unawares and initially slow to respond, the New South Wales state government responded with a massive show of force and repression. 2005 had been marked by the state and Federal enactment of draconian terror laws. Now here was an opportunity for the government to demonstrate the worth of the instruments and rationales for suppression of liberties, to secure public order against threats of a more (un)civil than martial order. Outflanking the opposition party on law-and-order rhetoric once again, the government immediately formulated new laws to curtail accused and offender’s rights (Brown). The police “locked” down whole suburbs — first Cronulla, then others — and made a show of policing all beaches north and south (Sydney Morning Herald). The race riots were widely reported in the international press, and, not for the first time (especially since the recent Redfern and Macquarie Fields), the city’s self-image of a cosmopolitan, multicultural nation (or in Australian Prime Minister John Howard’s prim and loaded terms, a nation “relaxed and comfortable”) looked like a mirage. Debate raged on why the riots occurred, how harmony could be restored and what the events signified for questions of race and identity — the latter most narrowly construed in the Prime Minister’s insistence that the riots did not reflect underlying racism in Australia (Dodson, Timms and Creagh). There were suggestions that the unrest was rather at base about the contradictions and violence of masculinity, some two-odd decades after Puberty Blues — the famous account of teenage girls growing up on the (Cronulla) Shire beaches. Journalists agonized about whether the media amounted to reporter or amplifier of tensions. In the lead-up to the riots, at their height, and in their wake, there was much emphasis on the role mobile text messages played in creating the riots and sustaining the subsequent atmosphere of violence and racial tension (The Australian; Overington and Warne-Smith). Not only were text messages circulating in the Sydney area, but in other states as well (Daily Telegraph). The volume of such text messages and emails also increased in the wake of the riot (certainly I received one personally from a phone number I did not recognise). New messages were sent to exhort Lebanese-Australians and others to fight back. Those decrying racism, such as the organizers of a rally, pointedly circulated text messages, hoping to spread peace. Media commentators, police, government officials, and many others held such text messages directly and centrally responsible for organizing the riot and for the violent scuffles that followed: The text message hate mail that inspired 5000 people to attend the rally at Cronulla 10 days ago demonstrated to the police the power of the medium. The retaliation that followed, when gangs marauded through Maroubra and Cronulla, was also co-ordinated by text messaging (Davies). It is rioting for a tech-savvy generation. Mobile phones are providing the call to arms for the tribes in the race war dividing Sydney. More than 5000 people turn up to Cronulla on Sunday … many were drawn to the rally, which turned into a mob, by text messages on their mobiles (Hayes and Kearney). Such accounts were crucial to the international framing of the events as this report from The Times in London illustrates: In the days leading up to the riot racist text messages had apparently been circulating calling upon concerned “white” Australians to rally at Cronulla to defend their beach and women. Following the attacks on the volunteer lifeguards, a mobile telephone text campaign started, backed up by frenzied discussions on weblogs, calling on Cronulla locals to rally to protect their beach. In response, a text campaign urged youths from western Sydney to be at Cronulla on Sunday to protect their friends (Maynard). There were calls upon the mobile companies to intercept and ban such messages, with industry spokespeople pointing out text messages were usually only held for twenty-four hours and were in many ways more difficult to intercept than it was to tap phone calls (Burke and Cubby). Mobs and Messages I think there are many reasons to suggest that the transmission of text messages did constitute a moral panic (what I’ve called elsewhere a “mobile panic”; see Goggin), pace columnist Paul Sheehan. Notably the wayward texting drew a direct and immediate response from the state government, with legislative changes that included provisions allowing the confiscation of cell phones and outlawing sending, receipt or keeping of racist or inflammatory text messages. For some days police proceeded to stop cars and board buses and demand to inspect mobiles, checking and reading text messages, arresting at least one person for being responsible for transmitting banned text messages. However, there is another important set of ideas adduced by commentators to explain how people came together to riot in Sydney, taking their cue from Howard Rheingold’s 2002 book Smart Mobs, a widely discussed and prophetic text on social revolution and new technologies. Rheingold sees text messaging as the harbinger of such new, powerful forms of collectivity, studying emergent uses around the world. A prime example he uses to illustrate the “power of the mobile many” is the celebrated overthrow of President Joseph Estrada of the Philippines in January 2001: President Joseph Estrada of the Philippines became the first head of state in history to lose power to a smart mob. More than 1 million Manila residents, mobilized and coordinated by waves of text messages, assembled … Estrada fell. The legend of “Generation Txt” was born (Rheingold 157-58). Rheingold is careful to emphasize the social as much as technical nature of this revolution, yet still sees such developments leading to “smart mobs”. As with his earlier, prescient book Virtual Community (Rheingold 1993) did for the Internet, so has Smart Mobs compellingly fused and circulated a set of ideas about cell phones and the pervasive, wearable and mobile technologies that are their successors. The received view of the overthrow of the Estrada government is summed up in a remark attributed to Estrada himself: “I was ousted by a coup d’text” (Pertierra et al. ch. 6). The text-toppling of Estrada is typically attributed to “Generation Txt”, underlining the power of text messaging and the new social category which marks it, and has now passed into myth. What is less well-known is that the overriding role of the cell phone in the Estrada overthrow has been challenged. In the most detailed study of text messaging and subjectivity in the Philippines, which reviewed accounts of the events of the Estrada overthrow, as well as conducting interviews with participants, Pertierra et al. discern in EDSA2 a “utopian vision of the mobile phone that is characteristic of ‘discourses of sublime technology’”: It focuses squarely on the mobile phone, and ignores the people who used it … the technology is said to possess a mysterious force, called “Text Power” ... it is the technology that does things — makes things happen — not the people who use it. (Pertierra et al. ch. 6) Given the recrudescence of the technological sublime in digital media (on which see Mosco) the detailed examination of precise details and forms of agency and coordination using cell phones is most instructive. Pertierra et al. confirm that the cell phone did play an important role in EDSA2 (the term given to the events surrounding the downfall of Estrada). That role, however, was not the one for which it has usually been praised in the media since the event — namely, that of crowd-drawer par excellence … less than half of our survey respondents who took part in People Power 2 noted that text messaging influenced them to go. If people did attend, it was because they were persuaded to by an ensemble of other reasons … (2002: ch. 6) Instead, they argue, the significance of the cell phone lay firstly, in the way it helped join people who disapproved of Pres. Estrada in a network of complex connectivity … Secondly, the mobile phone was instrumental as an organizational device … In the hands of activists and powerbrokers from politics, the military, business groups and civil society, the mobile phone becomes a “potent communications tool” … (Pertierra et al. 2002: ch. 6) What this revisionist account of the Estrada coup underscores is that careful research and analysis is required to understand how SMS is used and what it signifies. Indeed it is worth going further to step back from either the celebratory or minatory discourses on the cell phone and its powerful effects, and reframe this set of events as very much to do with the mutual construction of society and technology, in which culture is intimately involved. This involves placing both the technology of text messaging and the social and political forces manifested in this uprising in a much wider setting. For instance, in his account of the Estrada crisis Vicente L. Rafael terms the tropes of text messaging and activism evident in the discourses surrounding it as: a set of telecommunicative fantasies among middle-class Filipinos … [that] reveal certain pervasive beliefs of the middle classes … in the power of communication technologies to transmit messages at a distance and in their own ability to possess that power (Rafael 399). For Rafael, rather than possessing instrinsic politics in its own right, text messaging here is about a “media politics (understood in both senses of the phrase: the politics of media systems, but also the inescapable mediation of the political) [that] reveal the unstable workings of Filipino middle-class sentiments” (400). “Little Square of Light” Doubtless there are emergent cultural and social forms created in conjunction with new technologies, which unfreeze and open up (for a time) social relations. As my discussion of the Estrada “coup d’text” shows, however, the dynamics of media, politics and technology in any revolution or riot need to be carefully traced. A full discussion of mobile media and the Sydney uprising will need to wait for another occasion. However, it is worth noting that the text messages in question to which the initial riot had been attributed, were actually read out on one of the country’s highest-rating and most influential talk-radio programs. The contents of such messages had also been detailed in print media, especially tabloids, and been widely discussed (McLellan, Marr). What remains unknown and unclear, however, is the actual use of text messages and cell phones in the conceiving, co-ordination, and improvisational dynamics of the riots, and affective, cultural processing of what occurred. Little retrospective interpretation at all has emerged in the months since the riots, but it certainly felt as if the police and state’s over-reaction, and the arrival of the traditionally hot and lethargic Christmas — combined with the underlying structures of power and feeling to achieve the reinstitution of calm, or rather perhaps the habitual, much less invisible, expression of whiteness as usual. The policing of the crisis had certainly been fuelled by the mobile panic, but setting law enforcement the task of bringing those text messages to book was much like asking them to catch the wind. For analysts, as well as police, the novel and salience appearance of texting also has a certain lure. Yet in concentrating on the deadly power of the cell phone to conjure up a howling or smart mob, or in the fascination with the new modes of transmission of mobile devices, it is important to give credit to the formidable, implacable role of media and cultural representations more generally, in all this, as they are transmitted, received, interpreted and circulated through old as well as new modes, channels and technologies. References The Australian. “SMS Message Goes Out: Let’s March for Racial Tolerance.” The Australian. 17 September, 2005. 6. Brown, M. “Powers Tested in the Text”. Sydney Morning Herald. 20 December, 2005. 7. Burke, K. and Cubby, B. “Police Track Text Message Senders”. Sydney Morning Herald, 23-25 December, 2005. 7. Daily Telegraph. “Police Intercept Interstate Riot SMS — Race Riot: Flames of Fear.” Daily Telegraph. 15 December, 2005. 5. Davis, A. “Flying Bats Rang Alarm”. Sydney Morning Herald. 21 December, 2005. 1, 5. Dodson, L., Timms, A. and Creagh, S. “Tourism Starts Counting the Cost of Race Riots”, Sydney Morning Herald. 21 December, 2005. 1. Goggin, G. Cell Phone Culture: Mobile Technology in Everyday Life. London: Routledge, 2006. In press. Glotz, P., and Bertschi, S. (ed.) Thumb Culture: Social Trends and Mobile Phone Use, Bielefeld: Transcript Verlag. Harper, R., Palen, L. and Taylor, A. (ed.)_ _The Inside Text: Social, Cultural and Design Perspectives on SMS. Dordrecht: Springer. Hayes, S. and Kearney, S. “Call to Arms Transmitted by Text”. Sydney Morning Herald. 13 December, 2005. 4. Kennedy, L. “Police Act Swiftly to Curb Attacks”. Sydney Morning Herald. 13 December, 2005. 6. Maynard, R. “Battle on Beach as Mob Vows to Defend ‘Aussie Way of Life.’ ” The Times. 12 December 2005. 29. Marr, D. “One-Way Radio Plays by Its Own Rules.” Sydney Morning Herald. 13 December, 2005. 6. McLellan, A. “Solid Reportage or Fanning the Flames?” The Australian. 15 December, 2005. 16. Mosco, V. The Digital Sublime: Myth, Power, and Cyberspace. Cambridge, MA: MIT Press, 2004. Overington, C. and Warne-Smith, D. “Countdown to Conflict”. The Australian. 17 December, 2005. 17, 20. Pertierra, R., E.F. Ugarte, A. Pingol, J. Hernandez, and N.L. Dacanay, N.L. Txt-ing Selves: Cellphones and Philippine Modernity. Manila: De La Salle University Press, 2002. 1 January 2006 http://www.finlandembassy.ph/texting1.htm>. Rafael, V. L. “The Cell Phone and the Crowd: Messianic Politics in the Contemporary Philippines.” Public Culture 15 (2003): 399-425. Rheingold, H. Smart Mobs: The Next Social Revolution. Cambridge, MA: Perseus, 2002. Sheehan, P. “Nasty Reality Surfs In as Ugly Tribes Collide”. Sydney Morning Herald. 12 December, 2005. 13. Sydney Morning Herald. “Beach Wars 1: After Lockdown”. Editorial. Sydney Morning Herald. 20 December, 2005. 12. Citation reference for this article MLA Style Goggin, Gerard. "SMS Riot: Transmitting Race on a Sydney Beach, December 2005." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/02-goggin.php>. APA Style Goggin, G. (Mar. 2006) "SMS Riot: Transmitting Race on a Sydney Beach, December 2005," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/02-goggin.php>.
APA, Harvard, Vancouver, ISO, and other styles
38

Maxwell, Richard, and Toby Miller. "The Real Future of the Media." M/C Journal 15, no. 3 (June 27, 2012). http://dx.doi.org/10.5204/mcj.537.

Full text
Abstract:
When George Orwell encountered ideas of a technological utopia sixty-five years ago, he acted the grumpy middle-aged man Reading recently a batch of rather shallowly optimistic “progressive” books, I was struck by the automatic way in which people go on repeating certain phrases which were fashionable before 1914. Two great favourites are “the abolition of distance” and “the disappearance of frontiers”. I do not know how often I have met with the statements that “the aeroplane and the radio have abolished distance” and “all parts of the world are now interdependent” (1944). It is worth revisiting the old boy’s grumpiness, because the rhetoric he so niftily skewers continues in our own time. Facebook features “Peace on Facebook” and even claims that it can “decrease world conflict” through inter-cultural communication. Twitter has announced itself as “a triumph of humanity” (“A Cyber-House” 61). Queue George. In between Orwell and latter-day hoody cybertarians, a whole host of excitable public intellectuals announced the impending end of materiality through emergent media forms. Marshall McLuhan, Neil Postman, Daniel Bell, Ithiel de Sola Pool, George Gilder, Alvin Toffler—the list of 1960s futurists goes on and on. And this wasn’t just a matter of punditry: the OECD decreed the coming of the “information society” in 1975 and the European Union (EU) followed suit in 1979, while IBM merrily declared an “information age” in 1977. Bell theorized this technological utopia as post-ideological, because class would cease to matter (Mattelart). Polluting industries seemingly no longer represented the dynamic core of industrial capitalism; instead, market dynamism radiated from a networked, intellectual core of creative and informational activities. The new information and knowledge-based economies would rescue First World hegemony from an “insurgent world” that lurked within as well as beyond itself (Schiller). Orwell’s others and the Cold-War futurists propagated one of the most destructive myths shaping both public debate and scholarly studies of the media, culture, and communication. They convinced generations of analysts, activists, and arrivistes that the promises and problems of the media could be understood via metaphors of the environment, and that the media were weightless and virtual. The famous medium they wished us to see as the message —a substance as vital to our wellbeing as air, water, and soil—turned out to be no such thing. Today’s cybertarians inherit their anti-Marxist, anti-materialist positions, as a casual glance at any new media journal, culture-industry magazine, or bourgeois press outlet discloses. The media are undoubtedly important instruments of social cohesion and fragmentation, political power and dissent, democracy and demagoguery, and other fraught extensions of human consciousness. But talk of media systems as equivalent to physical ecosystems—fashionable among marketers and media scholars alike—is predicated on the notion that they are environmentally benign technologies. This has never been true, from the beginnings of print to today’s cloud-covered computing. Our new book Greening the Media focuses on the environmental impact of the media—the myriad ways that media technology consumes, despoils, and wastes natural resources. We introduce ideas, stories, and facts that have been marginal or absent from popular, academic, and professional histories of media technology. Throughout, ecological issues have been at the core of our work and we immodestly think the same should apply to media communications, and cultural studies more generally. We recognize that those fields have contributed valuable research and teaching that address environmental questions. For instance, there is an abundant literature on representations of the environment in cinema, how to communicate environmental messages successfully, and press coverage of climate change. That’s not enough. You may already know that media technologies contain toxic substances. You may have signed an on-line petition protesting the hazardous and oppressive conditions under which workers assemble cell phones and computers. But you may be startled, as we were, by the scale and pervasiveness of these environmental risks. They are present in and around every site where electronic and electric devices are manufactured, used, and thrown away, poisoning humans, animals, vegetation, soil, air and water. We are using the term “media” as a portmanteau word to cover a multitude of cultural and communications machines and processes—print, film, radio, television, information and communications technologies (ICT), and consumer electronics (CE). This is not only for analytical convenience, but because there is increasing overlap between the sectors. CE connect to ICT and vice versa; televisions resemble computers; books are read on telephones; newspapers are written through clouds; and so on. Cultural forms and gadgets that were once separate are now linked. The currently fashionable notion of convergence doesn’t quite capture the vastness of this integration, which includes any object with a circuit board, scores of accessories that plug into it, and a global nexus of labor and environmental inputs and effects that produce and flow from it. In 2007, a combination of ICT/CE and media production accounted for between 2 and 3 percent of all greenhouse gases emitted around the world (“Gartner Estimates,”; International Telecommunication Union; Malmodin et al.). Between twenty and fifty million tonnes of electronic waste (e-waste) are generated annually, much of it via discarded cell phones and computers, which affluent populations throw out regularly in order to buy replacements. (Presumably this fits the narcissism of small differences that distinguishes them from their own past.) E-waste is historically produced in the Global North—Australasia, Western Europe, Japan, and the US—and dumped in the Global South—Latin America, Africa, Eastern Europe, Southern and Southeast Asia, and China. It takes the form of a thousand different, often deadly, materials for each electrical and electronic gadget. This trend is changing as India and China generate their own media detritus (Robinson; Herat). Enclosed hard drives, backlit screens, cathode ray tubes, wiring, capacitors, and heavy metals pose few risks while these materials remain encased. But once discarded and dismantled, ICT/CE have the potential to expose workers and ecosystems to a morass of toxic components. Theoretically, “outmoded” parts could be reused or swapped for newer parts to refurbish devices. But items that are defined as waste undergo further destruction in order to collect remaining parts and valuable metals, such as gold, silver, copper, and rare-earth elements. This process causes serious health risks to bones, brains, stomachs, lungs, and other vital organs, in addition to birth defects and disrupted biological development in children. Medical catastrophes can result from lead, cadmium, mercury, other heavy metals, poisonous fumes emitted in search of precious metals, and such carcinogenic compounds as polychlorinated biphenyls, dioxin, polyvinyl chloride, and flame retardants (Maxwell and Miller 13). The United States’ Environmental Protection Agency estimates that by 2007 US residents owned approximately three billion electronic devices, with an annual turnover rate of 400 million units, and well over half such purchases made by women. Overall CE ownership varied with age—adults under 45 typically boasted four gadgets; those over 65 made do with one. The Consumer Electronics Association (CEA) says US$145 billion was expended in the sector in 2006 in the US alone, up 13% on the previous year. The CEA refers joyously to a “consumer love affair with technology continuing at a healthy clip.” In the midst of a recession, 2009 saw $165 billion in sales, and households owned between fifteen and twenty-four gadgets on average. By 2010, US$233 billion was spent on electronic products, three-quarters of the population owned a computer, nearly half of all US adults owned an MP3 player, and 85% had a cell phone. By all measures, the amount of ICT/CE on the planet is staggering. As investigative science journalist, Elizabeth Grossman put it: “no industry pushes products into the global market on the scale that high-tech electronics does” (Maxwell and Miller 2). In 2007, “of the 2.25 million tons of TVs, cell phones and computer products ready for end-of-life management, 18% (414,000 tons) was collected for recycling and 82% (1.84 million tons) was disposed of, primarily in landfill” (Environmental Protection Agency 1). Twenty million computers fell obsolete across the US in 1998, and the rate was 130,000 a day by 2005. It has been estimated that the five hundred million personal computers discarded in the US between 1997 and 2007 contained 6.32 billion pounds of plastics, 1.58 billion pounds of lead, three million pounds of cadmium, 1.9 million pounds of chromium, and 632000 pounds of mercury (Environmental Protection Agency; Basel Action Network and Silicon Valley Toxics Coalition 6). The European Union is expected to generate upwards of twelve million tons annually by 2020 (Commission of the European Communities 17). While refrigerators and dangerous refrigerants account for the bulk of EU e-waste, about 44% of the most toxic e-waste measured in 2005 came from medium-to-small ICT/CE: computer monitors, TVs, printers, ink cartridges, telecommunications equipment, toys, tools, and anything with a circuit board (Commission of the European Communities 31-34). Understanding the enormity of the environmental problems caused by making, using, and disposing of media technologies should arrest our enthusiasm for them. But intellectual correctives to the “love affair” with technology, or technophilia, have come and gone without establishing much of a foothold against the breathtaking flood of gadgets and the propaganda that proclaims their awe-inspiring capabilities.[i] There is a peculiar enchantment with the seeming magic of wireless communication, touch-screen phones and tablets, flat-screen high-definition televisions, 3-D IMAX cinema, mobile computing, and so on—a totemic, quasi-sacred power that the historian of technology David Nye has named the technological sublime (Nye Technological Sublime 297).[ii] We demonstrate in our book why there is no place for the technological sublime in projects to green the media. But first we should explain why such symbolic power does not accrue to more mundane technologies; after all, for the time-strapped cook, a pressure cooker does truly magical things. Three important qualities endow ICT/CE with unique symbolic potency—virtuality, volume, and novelty. The technological sublime of media technology is reinforced by the “virtual nature of much of the industry’s content,” which “tends to obscure their responsibility for a vast proliferation of hardware, all with high levels of built-in obsolescence and decreasing levels of efficiency” (Boyce and Lewis 5). Planned obsolescence entered the lexicon as a new “ethics” for electrical engineering in the 1920s and ’30s, when marketers, eager to “habituate people to buying new products,” called for designs to become quickly obsolete “in efficiency, economy, style, or taste” (Grossman 7-8).[iii] This defines the short lifespan deliberately constructed for computer systems (drives, interfaces, operating systems, batteries, etc.) by making tiny improvements incompatible with existing hardware (Science and Technology Council of the American Academy of Motion Picture Arts and Sciences 33-50; Boyce and Lewis). With planned obsolescence leading to “dizzying new heights” of product replacement (Rogers 202), there is an overstated sense of the novelty and preeminence of “new” media—a “cult of the present” is particularly dazzled by the spread of electronic gadgets through globalization (Mattelart and Constantinou 22). References to the symbolic power of media technology can be found in hymnals across the internet and the halls of academe: technologies change us, the media will solve social problems or create new ones, ICTs transform work, monopoly ownership no longer matters, journalism is dead, social networking enables social revolution, and the media deliver a cleaner, post-industrial, capitalism. Here is a typical example from the twilight zone of the technological sublime (actually, the OECD): A major feature of the knowledge-based economy is the impact that ICTs have had on industrial structure, with a rapid growth of services and a relative decline of manufacturing. Services are typically less energy intensive and less polluting, so among those countries with a high and increasing share of services, we often see a declining energy intensity of production … with the emergence of the Knowledge Economy ending the old linear relationship between output and energy use (i.e. partially de-coupling growth and energy use) (Houghton 1) This statement mixes half-truths and nonsense. In reality, old-time, toxic manufacturing has moved to the Global South, where it is ascendant; pollution levels are rising worldwide; and energy consumption is accelerating in residential and institutional sectors, due almost entirely to ICT/CE usage, despite advances in energy conservation technology (a neat instance of the age-old Jevons Paradox). In our book we show how these are all outcomes of growth in ICT/CE, the foundation of the so-called knowledge-based economy. ICT/CE are misleadingly presented as having little or no material ecological impact. In the realm of everyday life, the sublime experience of electronic machinery conceals the physical work and material resources that go into them, while the technological sublime makes the idea that more-is-better palatable, axiomatic; even sexy. In this sense, the technological sublime relates to what Marx called “the Fetishism which attaches itself to the products of labour” once they are in the hands of the consumer, who lusts after them as if they were “independent beings” (77). There is a direct but unseen relationship between technology’s symbolic power and the scale of its environmental impact, which the economist Juliet Schor refers to as a “materiality paradox” —the greater the frenzy to buy goods for their transcendent or nonmaterial cultural meaning, the greater the use of material resources (40-41). We wrote Greening the Media knowing that a study of the media’s effect on the environment must work especially hard to break the enchantment that inflames popular and elite passions for media technologies. We understand that the mere mention of the political-economic arrangements that make shiny gadgets possible, or the environmental consequences of their appearance and disappearance, is bad medicine. It’s an unwelcome buzz kill—not a cool way to converse about cool stuff. But we didn’t write the book expecting to win many allies among high-tech enthusiasts and ICT/CE industry leaders. We do not dispute the importance of information and communication media in our lives and modern social systems. We are media people by profession and personal choice, and deeply immersed in the study and use of emerging media technologies. But we think it’s time for a balanced assessment with less hype and more practical understanding of the relationship of media technologies to the biosphere they inhabit. Media consumers, designers, producers, activists, researchers, and policy makers must find new and effective ways to move ICT/CE production and consumption toward ecologically sound practices. In the course of this project, we found in casual conversation, lecture halls, classroom discussions, and correspondence, consistent and increasing concern with the environmental impact of media technology, especially the deleterious effects of e-waste toxins on workers, air, water, and soil. We have learned that the grip of the technological sublime is not ironclad. Its instability provides a point of departure for investigating and criticizing the relationship between the media and the environment. The media are, and have been for a long time, intimate environmental participants. Media technologies are yesterday’s, today’s, and tomorrow’s news, but rarely in the way they should be. The prevailing myth is that the printing press, telegraph, phonograph, photograph, cinema, telephone, wireless radio, television, and internet changed the world without changing the Earth. In reality, each technology has emerged by despoiling ecosystems and exposing workers to harmful environments, a truth obscured by symbolic power and the power of moguls to set the terms by which such technologies are designed and deployed. Those who benefit from ideas of growth, progress, and convergence, who profit from high-tech innovation, monopoly, and state collusion—the military-industrial-entertainment-academic complex and multinational commandants of labor—have for too long ripped off the Earth and workers. As the current celebration of media technology inevitably winds down, perhaps it will become easier to comprehend that digital wonders come at the expense of employees and ecosystems. This will return us to Max Weber’s insistence that we understand technology in a mundane way as a “mode of processing material goods” (27). Further to understanding that ordinariness, we can turn to the pioneering conversation analyst Harvey Sacks, who noted three decades ago “the failures of technocratic dreams [:] that if only we introduced some fantastic new communication machine the world will be transformed.” Such fantasies derived from the very banality of these introductions—that every time they took place, one more “technical apparatus” was simply “being made at home with the rest of our world’ (548). Media studies can join in this repetitive banality. Or it can withdraw the welcome mat for media technologies that despoil the Earth and wreck the lives of those who make them. In our view, it’s time to green the media by greening media studies. References “A Cyber-House Divided.” Economist 4 Sep. 2010: 61-62. “Gartner Estimates ICT Industry Accounts for 2 Percent of Global CO2 Emissions.” Gartner press release. 6 April 2007. ‹http://www.gartner.com/it/page.jsp?id=503867›. Basel Action Network and Silicon Valley Toxics Coalition. Exporting Harm: The High-Tech Trashing of Asia. Seattle: Basel Action Network, 25 Feb. 2002. Benjamin, Walter. “Central Park.” Trans. Lloyd Spencer with Mark Harrington. New German Critique 34 (1985): 32-58. Biagioli, Mario. “Postdisciplinary Liaisons: Science Studies and the Humanities.” Critical Inquiry 35.4 (2009): 816-33. Boyce, Tammy and Justin Lewis, eds. Climate Change and the Media. New York: Peter Lang, 2009. Commission of the European Communities. “Impact Assessment.” Commission Staff Working Paper accompanying the Proposal for a Directive of the European Parliament and of the Council on Waste Electrical and Electronic Equipment (WEEE) (recast). COM (2008) 810 Final. Brussels: Commission of the European Communities, 3 Dec. 2008. Environmental Protection Agency. Management of Electronic Waste in the United States. Washington, DC: EPA, 2007 Environmental Protection Agency. Statistics on the Management of Used and End-of-Life Electronics. Washington, DC: EPA, 2008 Grossman, Elizabeth. Tackling High-Tech Trash: The E-Waste Explosion & What We Can Do about It. New York: Demos, 2008. ‹http://www.demos.org/pubs/e-waste_FINAL.pdf› Herat, Sunil. “Review: Sustainable Management of Electronic Waste (e-Waste).” Clean 35.4 (2007): 305-10. Houghton, J. “ICT and the Environment in Developing Countries: Opportunities and Developments.” Paper prepared for the Organization for Economic Cooperation and Development, 2009. International Telecommunication Union. ICTs for Environment: Guidelines for Developing Countries, with a Focus on Climate Change. Geneva: ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector, 2008. Malmodin, Jens, Åsa Moberg, Dag Lundén, Göran Finnveden, and Nina Lövehagen. “Greenhouse Gas Emissions and Operational Electricity Use in the ICT and Entertainment & Media Sectors.” Journal of Industrial Ecology 14.5 (2010): 770-90. Marx, Karl. Capital: Vol. 1: A Critical Analysis of Capitalist Production, 3rd ed. Trans. Samuel Moore and Edward Aveling, Ed. Frederick Engels. New York: International Publishers, 1987. Mattelart, Armand and Costas M. Constantinou. “Communications/Excommunications: An Interview with Armand Mattelart.” Trans. Amandine Bled, Jacques Guot, and Costas Constantinou. Review of International Studies 34.1 (2008): 21-42. Mattelart, Armand. “Cómo nació el mito de Internet.” Trans. Yanina Guthman. El mito internet. Ed. Victor Hugo de la Fuente. Santiago: Editorial aún creemos en los sueños, 2002. 25-32. Maxwell, Richard and Toby Miller. Greening the Media. New York: Oxford University Press, 2012. Nye, David E. American Technological Sublime. Cambridge, Mass.: MIT Press, 1994. Nye, David E. Technology Matters: Questions to Live With. Cambridge, Mass.: MIT Press. 2007. Orwell, George. “As I Please.” Tribune. 12 May 1944. Richtel, Matt. “Consumers Hold on to Products Longer.” New York Times: B1, 26 Feb. 2011. Robinson, Brett H. “E-Waste: An Assessment of Global Production and Environmental Impacts.” Science of the Total Environment 408.2 (2009): 183-91. Rogers, Heather. Gone Tomorrow: The Hidden Life of Garbage. New York: New Press, 2005. Sacks, Harvey. Lectures on Conversation. Vols. I and II. Ed. Gail Jefferson. Malden: Blackwell, 1995. Schiller, Herbert I. Information and the Crisis Economy. Norwood: Ablex Publishing, 1984. Schor, Juliet B. Plenitude: The New Economics of True Wealth. New York: Penguin, 2010. Science and Technology Council of the American Academy of Motion Picture Arts and Sciences. The Digital Dilemma: Strategic Issues in Archiving and Accessing Digital Motion Picture Materials. Los Angeles: Academy Imprints, 2007. Weber, Max. “Remarks on Technology and Culture.” Trans. Beatrix Zumsteg and Thomas M. Kemple. Ed. Thomas M. Kemple. Theory, Culture [i] The global recession that began in 2007 has been the main reason for some declines in Global North energy consumption, slower turnover in gadget upgrades, and longer periods of consumer maintenance of electronic goods (Richtel). [ii] The emergence of the technological sublime has been attributed to the Western triumphs in the post-Second World War period, when technological power supposedly supplanted the power of nature to inspire fear and astonishment (Nye Technology Matters 28). Historian Mario Biagioli explains how the sublime permeates everyday life through technoscience: "If around 1950 the popular imaginary placed science close to the military and away from the home, today’s technoscience frames our everyday life at all levels, down to our notion of the self" (818). [iii] This compulsory repetition is seemingly undertaken each time as a novelty, governed by what German cultural critic Walter Benjamin called, in his awkward but occasionally illuminating prose, "the ever-always-the-same" of "mass-production" cloaked in "a hitherto unheard-of significance" (48).
APA, Harvard, Vancouver, ISO, and other styles
39

Jethani, Suneel. "Lists, Spatial Practice and Assistive Technologies for the Blind." M/C Journal 15, no. 5 (October 12, 2012). http://dx.doi.org/10.5204/mcj.558.

Full text
Abstract:
IntroductionSupermarkets are functionally challenging environments for people with vision impairments. A supermarket is likely to house an average of 45,000 products in a median floor-space of 4,529 square meters and many visually impaired people are unable to shop without assistance, which greatly impedes personal independence (Nicholson et al.). The task of selecting goods in a supermarket is an “activity that is expressive of agency, identity and creativity” (Sutherland) from which many vision-impaired persons are excluded. In response to this, a number of proof of concept (demonstrating feasibility) and prototype assistive technologies are being developed which aim to use smart phones as potential sensorial aides for vision impaired persons. In this paper, I discuss two such prototypic technologies, Shop Talk and BlindShopping. I engage with this issue’s list theme by suggesting that, on the one hand, list making is a uniquely human activity that demonstrates our need for order, reliance on memory, reveals our idiosyncrasies, and provides insights into our private lives (Keaggy 12). On the other hand, lists feature in the creation of spatial inventories that represent physical environments (Perec 3-4, 9-10). The use of lists in the architecture of assistive technologies for shopping illuminates the interaction between these two modalities of list use where items contained in a list are not only textual but also cartographic elements that link the material and immaterial in space and time (Haber 63). I argue that despite the emancipatory potential of assistive shopping technologies, their efficacy in practical situations is highly dependent on the extent to which they can integrate a number of lists to produce representations of space that are meaningful for vision impaired users. I suggest that the extent to which these prototypes may translate to becoming commercially viable, widely adopted technologies is heavily reliant upon commercial and institutional infrastructures, data sources, and regulation. Thus, their design, manufacture and adoption-potential are shaped by the extent to which certain data inventories are accessible and made interoperable. To overcome such constraints, it is important to better understand the “spatial syntax” associated with the shopping task for a vision impaired person; that is, the connected ordering of real and virtual spatial elements that result in a supermarket as a knowable space within which an assisted “spatial practice” of shopping can occur (Kellerman 148, Lefebvre 16).In what follows, I use the concept of lists to discuss the production of supermarket-space in relation to the enabling and disabling potentials of assistive technologies. First, I discuss mobile digital technologies relative to disability and impairment and describe how the shopping task produces a disabling spatial practice. Second, I present a case study showing how assistive technologies function in aiding vision impaired users in completing the task of supermarket shopping. Third, I discuss various factors that may inhibit the liberating potential of technology assisted shopping by vision-impaired people. Addressing Shopping as a Disabling Spatial Practice Consider how a shopping list might inform one’s experience of supermarket space. The way shopping lists are written demonstrate the variability in the logic that governs list writing. As Bill Keaggy demonstrates in his found shopping list Web project and subsequent book, Milk, Eggs, Vodka, a shopping list may be written on a variety of materials, be arranged in a number of orientations, and the writer may use differing textual attributes, such as size or underlining to show emphasis. The writer may use longhand, abbreviate, write neatly, scribble, and use an array of alternate spelling and naming conventions. For example, items may be listed based on knowledge of the location of products, they may be arranged on a list as a result of an inventory of a pantry or fridge, or they may be copied in the order they appear in a recipe. Whilst shopping, some may follow strictly the order of their list, crossing back and forth between aisles. Some may work through their list item-by-item, perhaps forward scanning to achieve greater economies of time and space. As a person shops, their memory may be stimulated by visual cues reminding them of products they need that may not be included on their list. For the vision impaired, this task is near impossible to complete without the assistance of a relative, friend, agency volunteer, or store employee. Such forms of assistance are often unsatisfactory, as delays may be caused due to the unavailability of an assistant, or the assistant having limited literacy, knowledge, or patience to adequately meet the shopper’s needs. Home delivery services, though readily available, impede personal independence (Nicholson et al.). Katie Ellis and Mike Kent argue that “an impairment becomes a disability due to the impact of prevailing ableist social structures” (3). It can be said, then, that supermarkets function as a disability producing space for the vision impaired shopper. For the vision impaired, a supermarket is a “hegemonic modern visual infrastructure” where, for example, merchandisers may reposition items regularly to induce customers to explore areas of the shop that they wouldn’t usually, a move which adds to the difficulty faced by those customers with impaired vision who work on the assumption that items remain as they usually are (Schillmeier 161).In addressing this issue, much emphasis has been placed on the potential of mobile communications technologies in affording vision impaired users greater mobility and flexibility (Jolley 27). However, as Gerard Goggin argues, the adoption of mobile communication technologies has not necessarily “gone hand in hand with new personal and collective possibilities” given the limited access to standard features, even if the device is text-to-speech enabled (98). Issues with Digital Rights Management (DRM) limit the way a device accesses and reproduces information, and confusion over whether audio rights are needed to convert text-to-speech, impede the accessibility of mobile communications technologies for vision impaired users (Ellis and Kent 136). Accessibility and functionality issues like these arise out of the needs, desires, and expectations of the visually impaired as a user group being considered as an afterthought as opposed to a significant factor in the early phases of design and prototyping (Goggin 89). Thus, the development of assistive technologies for the vision impaired has been left to third parties who must adopt their solutions to fit within certain technical parameters. It is valuable to consider what is involved in the task of shopping in order to appreciate the considerations that must be made in the design of shopping intended assistive technologies. Shopping generally consists of five sub-tasks: travelling to the store; finding items in-store; paying for and bagging items at the register; exiting the store and getting home; and, the often overlooked task of putting items away once at home. In this process supermarkets exhibit a “trichotomous spatial ontology” consisting of locomotor space that a shopper moves around the store, haptic space in the immediate vicinity of the shopper, and search space where individual products are located (Nicholson et al.). In completing these tasks, a shopper will constantly be moving through and switching between all three of these spaces. In the next section I examine how assistive technologies function in producing supermarkets as both enabling and disabling spaces for the vision impaired. Assistive Technologies for Vision Impaired ShoppersJason Farman (43) and Adriana de Douza e Silva both argue that in many ways spaces have always acted as information interfaces where data of all types can reside. Global Positioning System (GPS), Radio Frequency Identification (RFID), and Quick Response (QR) codes all allow for practically every spatial encounter to be an encounter with information. Site-specific and location-aware technologies address the desire for meaningful representations of space for use in everyday situations by the vision impaired. Further, the possibility of an “always-on” connection to spatial information via a mobile phone with WiFi or 3G connections transforms spatial experience by “enfolding remote [and latent] contexts inside the present context” (de Souza e Silva). A range of GPS navigation systems adapted for vision-impaired users are currently on the market. Typically, these systems convert GPS information into text-to-speech instructions and are either standalone devices, such as the Trekker Breeze, or they use the compass, accelerometer, and 3G or WiFi functions found on most smart phones, such as Loadstone. Whilst both these products are adequate in guiding a vision-impaired user from their home to a supermarket, there are significant differences in their interfaces and data architectures. Trekker Breeze is a standalone hardware device that produces talking menus, maps, and GPS information. While its navigation functionality relies on a worldwide radio-navigation system that uses a constellation of 24 satellites to triangulate one’s position (May and LaPierre 263-64), its map and text-to-speech functionality relies on data on a DVD provided with the unit. Loadstone is an open source software system for Nokia devices that has been developed within the vision-impaired community. Loadstone is built on GNU General Public License (GPL) software and is developed from private and user based funding; this overcomes the issue of Trekker Breeze’s reliance on trading policies and pricing models of the few global vendors of satellite navigation data. Both products have significant shortcomings if viewed in the broader context of the five sub-tasks involved in shopping described above. Trekker Breeze and Loadstone require that additional devices be connected to it. In the case of Trekker Breeze it is a tactile keypad, and with Loadstone it is an aftermarket screen reader. To function optimally, Trekker Breeze requires that routes be pre-recorded and, according to a review conducted by the American Foundation for the Blind, it requires a 30-minute warm up time to properly orient itself. Both Trekker Breeze and Loadstone allow users to create and share Points of Interest (POI) databases showing the location of various places along a given route. Non-standard or duplicated user generated content in POI databases may, however, have a negative effect on usability (Ellis and Kent 2). Furthermore, GPS-based navigation systems are accurate to approximately ten metres, which means that users must rely on their own mobility skills when they are required to change direction or stop for traffic. This issue with GPS accuracy is more pronounced when a vision-impaired user is approaching a supermarket where they are likely to encounter environmental hazards with greater frequency and both pedestrian and vehicular traffic in greater density. Here the relations between space defined and spaces poorly defined or undefined by the GPS device interact to produce the supermarket surrounds as a disabling space (Galloway). Prototype Systems for Supermarket Navigation and Product SelectionIn the discussion to follow, I look at two prototype systems using QR codes and RFID that are designed to be used in-store by vision-impaired shoppers. Shop Talk is a proof of concept system developed by researchers at Utah State University that uses synthetic verbal route directions to assist vision impaired shoppers with supermarket navigation, product search, and selection (Nicholson et al.). Its hardware consists of a portable computational unit, a numeric keypad, a wireless barcode scanner and base station, headphones for the user to receive the synthetic speech instructions, a USB hub to connect all the components, and a backpack to carry them (with the exception of the barcode scanner) which has been slightly modified with a plastic stabiliser to assist in correct positioning. Shop Talk represents the supermarket environment using two data structures. The first is comprised of two elements: a topological map of locomotor space that allows for directional labels of “left,” “right,” and “forward,” to be added to the supermarket floor plan; and, for navigation of haptic space, the supermarket inventory management system, which is used to create verbal descriptions of product information. The second data structure is a Barcode Connectivity Matrix (BCM), which associates each shelf barcode with several pieces of information such as aisle, aisle side, section, shelf, position, Universal Product Code (UPC) barcode, product description, and price. Nicholson et al. suggest that one of their “most immediate objectives for future work is to migrate the system to a more conventional mobile platform” such as a smart phone (see Mobile Shopping). The Personalisable Interactions with Resources on AMI-Enabled Mobile Dynamic Environments (PRIAmIDE) research group at the University of Deusto is also approaching Ambient Assisted Living (AAL) by exploring the smart phone’s sensing, communication, computing, and storage potential. As part of their work, the prototype system, BlindShopping, was developed to address the issue of assisted shopping using entirely off-the-shelf technology with minimal environmental adjustments to navigate the store and search, browse and select products (López-de-Ipiña et al. 34). Blind Shopping’s architecture is based on three components. Firstly, a navigation system provides the user with synthetic verbal instructions to users via headphones connected to the smart phone device being used in order to guide them around the store. This requires a RFID reader to be attached to the tip of the user’s white cane and road-marking-like RFID tag lines to be distributed throughout the aisles. A smartphone application processes the RFID data that is received by the smart phone via Bluetooth generating the verbal navigation commands as a result. Products are recognised by pointing a QR code reader enabled smart phone at an embossed code located on a shelf. The system is managed by a Rich Internet Application (RIA) interface, which operates by Web browser, and is used to register the RFID tags situated in the aisles and the QR codes located on shelves (López-de-Ipiña and 37-38). A typical use-scenario for Blind Shopping involves a user activating the system by tracing an “L” on the screen or issuing the “Location” voice command, which activates the supermarket navigation system which then asks the user to either touch an RFID floor marking with their cane or scan a QR code on a nearby shelf to orient the system. The application then asks the user to dictate the product or category of product that they wish to locate. The smart phone maintains a continuous Bluetooth connection with the RFID reader to keep track of user location at all times. By drawing a “P” or issuing the “Product” voice command, a user can switch the device into product recognition mode where the smart phone camera is pointed at an embossed QR code on a shelf to retrieve information about a product such as manufacturer, name, weight, and price, via synthetic speech (López-de-Ipiña et al. 38-39). Despite both systems aiming to operate with as little environmental adjustment as possible, as well as minimise the extent to which a supermarket would need to allocate infrastructural, administrative, and human resources to implementing assistive technologies for vision impaired shoppers, there will undoubtedly be significant establishment and maintenance costs associated with the adoption of production versions of systems resembling either prototype described in this paper. As both systems rely on data obtained from a server by invoking Web services, supermarkets would need to provide in-store WiFi. Further, both systems’ dependence on store inventory data would mean that commercial versions of either of these systems are likely to be supermarket specific or exclusive given that there will be policies in place that forbid access to inventory systems, which contain pricing information to third parties. Secondly, an assumption in the design of both prototypes is that the shopping task ends with the user arriving at home; this overlooks the important task of being able to recognise products in order to put them away or to use at a later time.The BCM and QR product recognition components of both respective prototypic systems associates information to products in order to assist users in the product search and selection sub-tasks. However, information such as use-by dates, discount offers, country of manufacture, country of manufacturer’s origin, nutritional information, and the labelling of products as Halal, Kosher, containing alcohol, nuts, gluten, lactose, phenylalanine, and so on, create further challenges in how different data sources are managed within the devices’ software architecture. The reliance of both systems on existing smartphone technology is also problematic. Changes in the production and uptake of mobile communication devices, and the software that they operate on, occurs rapidly. Once the fit-out of a retail space with the necessary instrumentation in order to accommodate a particular system has occurred, this system is unlikely to be able to cater to the requirement for frequent upgrades, as built environments are less flexible in the upgrading of their technological infrastructure (Kellerman 148). This sets up a scenario where the supermarket may persist as a disabling space due to a gap between the functional capacities of applications designed for mobile communication devices and the environments in which they are to be used. Lists and Disabling Spatial PracticeThe development and provision of access to assistive technologies and the data they rely upon is a commercial issue (Ellis and Kent 7). The use of assistive technologies in supermarket-spaces that rely on the inter-functional coordination of multiple inventories may have the unintended effect of excluding people with disabilities from access to legitimate content (Ellis and Kent 7). With de Certeau, we can ask of supermarket-space “What spatial practices correspond, in the area where discipline is manipulated, to these apparatuses that produce a disciplinary space?" (96).In designing assistive technologies, such as those discussed in this paper, developers must strive to achieve integration across multiple data inventories. Software architectures must be optimised to overcome issues relating to intellectual property, cross platform access, standardisation, fidelity, potential duplication, and mass-storage. This need for “cross sectioning,” however, “merely adds to the muddle” (Lefebvre 8). This is a predicament that only intensifies as space and objects in space become increasingly “representable” (Galloway), and as the impetus for the project of spatial politics for the vision impaired moves beyond representation to centre on access and meaning-making.ConclusionSupermarkets act as sites of hegemony, resistance, difference, and transformation, where the vision impaired and their allies resist the “repressive socialization of impaired bodies” through their own social movements relating to environmental accessibility and the technology assisted spatial practice of shopping (Gleeson 129). It is undeniable that the prototype technologies described in this paper, and those like it, indeed do have a great deal of emancipatory potential. However, it should be understood that these devices produce representations of supermarket-space as a simulation within a framework that attempts to mimic the real, and these representations are pre-determined by the industrial, technological, and regulatory forces that govern their production (Lefebvre 8). Thus, the potential of assistive technologies is dependent upon a range of constraints relating to data accessibility, and the interaction of various kinds of lists across the geographic area that surrounds the supermarket, locomotor, haptic, and search spaces of the supermarket, the home-space, and the internal spaces of a shopper’s imaginary. These interactions are important in contributing to the reproduction of disability in supermarkets through the use of assistive shopping technologies. The ways by which people make and read shopping lists complicate the relations between supermarket-space as location data and product inventories versus that which is intuited and experienced by a shopper (Sutherland). Not only should we be creating inventories of supermarket locomotor, haptic, and search spaces, the attention of developers working in this area of assistive technologies should look beyond the challenges of spatial representation and move towards a focus on issues of interoperability and expanded access of spatial inventory databases and data within and beyond supermarket-space.ReferencesDe Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California Press, 1984. Print.De Souza e Silva, A. “From Cyber to Hybrid: Mobile Technologies As Interfaces of Hybrid Spaces.” Space and Culture 9.3 (2006): 261-78.Ellis, Katie, and Mike Kent. Disability and New Media. New York: Routledge, 2011.Farman, Jason. Mobile Interface Theory: Embodied Space and Locative Media. New York: Routledge, 2012.Galloway, Alexander. “Are Some Things Unrepresentable?” Theory, Culture and Society 28 (2011): 85-102.Gleeson, Brendan. Geographies of Disability. London: Routledge, 1999.Goggin, Gerard. Cell Phone Culture: Mobile Technology in Everyday Life. London: Routledge, 2006.Haber, Alex. “Mapping the Void in Perec’s Species of Spaces.” Tattered Fragments of the Map. Ed. Adam Katz and Brian Rosa. S.l.: Thelimitsoffun.org, 2009.Jolley, William M. When the Tide Comes in: Towards Accessible Telecommunications for People with Disabilities in Australia. Sydney: Human Rights and Equal Opportunity Commission, 2003.Keaggy, Bill. Milk Eggs Vodka: Grocery Lists Lost and Found. Cincinnati, Ohio: HOW Books, 2007.Kellerman, Aharon. Personal Mobilities. London: Routledge, 2006.Kleege, Georgia. “Blindness and Visual Culture: An Eyewitness Account.” The Disability Studies Reader. 2nd edition. Ed. Lennard J. Davis. New York: Routledge, 2006. 391-98.Lefebvre, Henri. The Production of Space. Oxford, UK: Blackwell, 1991.López-de-Ipiña, Diego, Tania Lorido, and Unai López. “Indoor Navigation and Product Recognition for Blind People Assisted Shopping.” Ambient Assisted Living. Ed. J. Bravo, R. Hervás, and V. Villarreal. Berlin: Springer-Verlag, 2011. 25-32. May, Michael, and Charles LaPierre. “Accessible Global Position System (GPS) and Related Orientation Technologies.” Assistive Technology for Visually Impaired and Blind People. Ed. Marion A. Hersh, and Michael A. Johnson. London: Springer-Verlag, 2008. 261-88. Nicholson, John, Vladimir Kulyukin, and Daniel Coster. “Shoptalk: Independent Blind Shopping Through Verbal Route Directions and Barcode Scans.” The Open Rehabilitation Journal 2.1 (2009): 11-23.Perec, Georges. Species of Spaces and Other Pieces. Trans. and Ed. John Sturrock. London: Penguin Books, 1997.Schillmeier, Michael W. J. Rethinking Disability: Bodies, Senses, and Things. New York: Routledge, 2010.Sutherland, I. “Mobile Media and the Socio-Technical Protocols of the Supermarket.” Australian Journal of Communication. 36.1 (2009): 73-84.
APA, Harvard, Vancouver, ISO, and other styles
40

Fowles, Jib. "Television Violence and You." M/C Journal 3, no. 1 (March 1, 2000). http://dx.doi.org/10.5204/mcj.1828.

Full text
Abstract:
Introduction Television has become more and more restricted within the past few years. Rating systems and "family programming" have taken over the broadcast networks, relegating violent programming, often some of the most cutting edge work in television, to pay channels. There are very few people willing to stand up and say that viewers -- even young children -- should be able to watch whatever they want, and that viewing acts of violence can actually result in more mature, balanced adults. Jib Fowles is one of those people. His book, The Case For Television Violence, explores the long history of violent content in popular culture, and how its modern incarnation, television, fulfils the same function as epic tragedy and "penny dreadfuls" did -- the diverting of aggressive feelings into the cathartic action of watching. Fowles points out the flaws in studies linking TV violence to actual violence (why, for example, has there been a sharp decline in violent crime in the U.S. during the 1990s when, by all accounts, television violence has increased?), as well as citing overlooked studies that show no correlation between viewing and performing acts of violence. The book also demonstrates how efforts to censor TV violence are not only ineffective, but can lead to the opposite result: an increase in exposure to violent viewing as audiences forsake traditional broadcast programming for private programming through pay TV and videocassettes. The revised excerpt below describes one of the more heated topics of debate -- the V-Chip. Television Violence and You Although the antiviolence fervor crested in the US in the first half of the 1990s, it also continued into the second half. As Sissela Bok comments: "during the 1990s, much larger efforts by citizen advocacy groups, churches, professional organizations, public officials, and media groups have been launched to address the problems posed by media violence" (146). It continues as always. On the one side, the reformist position finds articulation time and again; on the other side, the public's incessant desire for violent entertainment is reluctantly (because there is no prestige or cachet to be had in it) serviced by television companies as they compete against each other for profits. We can contrast these two forces in the following way: the first, the antitelevision violence campaign, is highly focussed in its presentation, calling for the curtailment of violent content, but this concerted effort has underpinnings that are vague and various; the second force is highly diffused on the surface (the public nowhere speaks pointedly in favor of violent content), but its underpinnings are highly concentrated and functional, pertinent to the management of disapproved emotions. To date, neither force has triumphed decisively. The antiviolence advocates can be gratified by the righteousness of their cause and sense of moral superiority, but violent content continues as a mainstay of the medium's offerings and in viewers' attention. Over the longer term, equilibrium has been the result. If the equilibrium were upset, however, unplanned consequences would result. The attack on television violence is not simply unwarranted; it carries the threat of unfortunate dangers should it succeed. In the US, television violence is a successful site for the siphoning off of unwanted emotions. The French critic Michel Mourlet explains: "violence is a major theme in aesthetics. Violence is decompression: Arising out of a tension between the individual and the world, it explodes as the tension reaches its pitch, like an abscess burning. It has to be gone through before there can be any repose" (233). The loss or even diminishment of television violence would suggest that surplus psychic energy would have to find other outlets. What these outlets would be is open to question, but the possibility exists that some of them might be retrogressive, involving violence in more outright and vicious forms. It is in the nation's best interest not to curtail the symbolic displays that come in the form of television violence. Policy The official curbing of television violence is not an idle or empty threat. It has happened recently in Canada. In 1993, the Canadian Radio- Television and Telecommunications Commission, the equivalent of the Australian Broadcasting Authority or of the American FCC, banned any "gratuitous" violence, which was defined as violence not playing "an integral role in developing the plot, character, or theme of the material as a whole" (Scully 12). Violence of any sort cannot be broadcast before 9 p.m. Totally forbidden are any programs promoting violence against women, minorities, or animals. Detailed codes regulate violence in children's shows. In addition, the Canadian invention of the V-chip is to be implemented, which would permit parents to block out programming that exceeds preset levels for violence, sexuality, or strong language (DePalma). In the United States, the two houses of Congress have held 28 hearings since 1954 on the topic of television violence (Cooper), but none has led to the passage of regulatory legislation until the Telecommunications Act of 1996. According to the Act, "studies have shown that children exposed to violent video programming at a young age have a higher tendency for violent and aggressive behavior later in life than children not so exposed, and that children exposed to violent video programming are prone to assume that acts of violence are acceptable behavior" (Section 551). It then requires that newly manufactured television sets must "be equipped with a feature designed to enable viewers to block display of all programs with a common rating" (Telecommunications Act of 1996, section 551). The V-chip, the only available "feature" to meet the requirements, will therefore be imported from Canada to the United States. Utilising a rating system reluctantly and haltingly developed by the television industry, parents on behalf of their children would be able to black out offensive content. Censorship had passed down to the family level. Although the V-chip represents the first legislated regulation of television violence in the US, that country experienced an earlier episode of violence censorship whose outcome may be telling for the fate of the chip. This occurred in the aftermath of the 1972 Report to the Surgeon General on Television and Social Behavior, which, in highly equivocal language, appeared to give some credence to the notion that violent content can activate violent behavior in some younger viewers. Pressure from influential congressmen and from the FCC and its chairman, Richard Wiley, led the broadcasting industry in 1975 to institute what came to be known as the Family Viewing Hour. Formulated as an amendment to the Television Code of the National Association of Broadcasters, the stipulation decreed that before 9:00 p.m. "entertainment programming inappropriate for viewing by a general family audience should not be broadcast" (Cowan 113). The definition of "inappropriate programming" was left to the individual networks, but as the 1975-1976 television season drew near, it became clear to a production company in Los Angeles that the definitions would be strict. The producers of M*A*S*H (which aired at 8:30 p.m.) learned from the CBS censor assigned to them that three of their proposed programs -- dealing with venereal disease, impotence, and adultery -- would not be allowed (Cowan 125). The series Rhoda could not discuss birth control (131) and the series Phyllis would have to cancel a show on virginity (136). Television writers and producers began to rebel, and in late 1975 their Writers Guild brought a lawsuit against the FCC and the networks with regard to the creative impositions of the Family Viewing Hour. Actor Carroll O'Connor (as quoted in Cowan 179) complained, "Congress has no right whatsoever to interfere in the content of the medium", and writer Larry Gelbert voiced dismay (as quoted in Cowan 177): "situation comedies have become the theater of ideas, and those ideas have been very, very restricted". The judge who heard the case in April and May of 1976 took until November to issue his decision, but when it emerged it was polished and clear: the Family Viewing Hour was the result of "backroom bludgeoning" by the FCC and was to be rescinded. According to the judge, "the existence of threats, and the attempted securing of commitments coupled with the promise to publicize noncompliance ... constituted per se violations of the First Amendment" (Corn-Revere 201). The fate of the Family Viewing Hour may have been a sort of premoniton: The American Civil Liberties Union is currently bringing a similar case against proponents of the V-chip -- a case that may produce similar results. Whether or not the V-chip will withstand judicial scrutiny, there are several problematic aspects to the device and any possible successors. Its usage would appear to impinge on the providers of violent content, on the viewers of it, and indeed on the fundamental legal structure of the United States. To confront the first of these three problems, significant use of the V- chip by parents would measurably reduce the audience size for certain programmes containing symbolic violence. Little else could have greater impact on the American television system as it is currently constituted. A decrease in audience numbers quickly translates into a decrease in advertising revenues in an advertising system such as that of the United States. Advertisers may additionally shy away from a shunned programme because of its loss of popularity or because its lowered ratings have clearly stamped it as violent. The decline in revenues would make the programme less valuable in the eyes of network executives and perhaps a candidate for cancellation. The Hollywood production company would quickly take notice and begin tailoring its broadcast content to the new standards. Blander or at least different fare would be certain to result. Broadcast networks may begin losing viewers to bolder content on less fastidious cable networks and in particular to the channels that are not supported and influenced by advertising. Thus, we might anticipate a shift away from the more traditional and responsible channels towards the less so and away from advertising-supported channels to subscriber-supported channels. This shift would not transpire according to the traditional governing mechanism of television -- audience preferences. Those to whom the censored content had been destined would have played no role in its neglect. Neglect would have transpired because of the artificial intercession of controls. The second area to be affected by the V-chip, should its implementation prove successful, is viewership, in particular younger viewers. Currently, young viewers have great license in most households to select the content they want to watch; this license would be greatly reduced by the V-chip, which can block out entire genres. Screening for certain levels of violence, the parent would eliminate most cartoons and all action- adventure shows, whether the child desires some of these or not. A New York Times reporter, interviewing a Canadian mother who had been an early tester of a V-chip prototype, heard the mother's 12-year-old son protesting in the background, "we're not getting the V-chip back!" The mother explained to the reporter, "the kids didn't like the fact that they were not in control any longer" (as quoted in DePalma C14) -- with good reason. Children are losing the right to pick the content of which they are in psychological need. The V-chip represents another weapon in the generational war -- a device that allows parents to eradicate the compensational content of which children have learned to make enjoyable use. The consequences of all this for the child and the family would be unpleasant. The chances that the V-chip will increase intergenerational friction are high. Not only will normal levels of tension and animosity be denied their outlet via television fiction but also so will the new superheated levels. It is not a pleasant prospect. Third, the V-chip constitutes a strong challenge to traditional American First Amendment rights of free speech and a free press. Stoutly defended by post-World War II Supreme Courts, First Amendment rights can be voided "only in order to promote a compelling state interest, and then only if the government adopts the least restrictive means to further that interest" (Ballard 211). The few restrictions allowed concern such matters as obscenity, libel, national security, and the sometimes conflicting right to a fair trial. According to legal scholar Ian Ballard, there is no "compelling state interest" involved in the matter of television violence because "the social science evidence used to justify the regulation of televised violence is subject to such strong methodological criticism that the evidence is insufficient to support massive regulatory assault on the television entertainment industry" (185). Even if the goal of restricting television violence were acceptable, the V-chip is hardly "the least restrictive means" because it introduces a "chilling effect" on programme producers and broadcasters that "clearly infringes on fundamental First Amendment rights" (216). Moreover, states Ballard, "fear of a slippery slope is not unfounded" (216). If television violence can be censored, supposedly because it poses a threat to social order, then what topics might be next? It would not be long before challenging themes such a feminism or multiculturalism were deemed unfit for the same reason. Taking all these matters into consideration, the best federal policy regarding television violence would be to have no policy -- to leave the extent of violent depictions completely up to the dictates of viewer preferences, as expertly interpreted by the television industry. In this, I am in agreement with Ian Ballard, who finds that the best approach "is for the government to do nothing at all about television violence" (218). Citation reference for this article MLA style: Jib Fowles. "Television Violence and You." M/C: A Journal of Media and Culture 3.1 (2000). [your date of access] <http://www.uq.edu.au/mc/0003/television.php>. Chicago style: Jib Fowles, "Television Violence and You," M/C: A Journal of Media and Culture 3, no. 1 (2000), <http://www.uq.edu.au/mc/0003/television.php> ([your date of access]). APA style: Jib Fowles. (2000) Television Violence and You. M/C: A Journal of Media and Culture 3(1). <http://www.uq.edu.au/mc/0003/television.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
41

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
42

Maddox, Alexia, and Luke J. Heemsbergen. "Digging in Crypto-Communities’ Future-Making." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2755.

Full text
Abstract:
Introduction This article situates the dark as a liminal and creative space of experimentation where tensions are generative and people tinker with emerging technologies to create alternative futures. Darkness need not mean chaos and fear of violence – it can mean privacy and protection. We define dark as an experimental space based upon uncertainties rather than computational knowns (Bridle) and then demonstrate via a case study of cryptocurrencies the contribution of dark and liminal social spaces to future(s)-making. Cryptocurrencies are digital cash systems that use decentralised (peer-to-peer) networking to enable irreversible payments (Maurer, Nelms, and Swartz). Cryptocurrencies are often clones or variations on the ‘original’ Bitcoin payment systems protocol (Trump et al.) that was shared with the cryptographic community through a pseudonymous and still unknown author(s) (Nakamoto), creating a founder mystery. Due to the open creation process, a new cryptocurrency is relatively easy to make. However, many of them are based on speculative bubbles that mirror Bitcoin, Ethereum, and ICOs’ wealth creation. Examples of cryptocurrencies now largely used for speculation due to their volatility in holding value are rampant, with online clearing houses competing to trade hundreds of different assets from AAVE to ZIL. Many of these altcoins have little to no following or trading volume, leading to their obsolescence. Others enjoy immense popularity among dedicated communities of backers and investors. Consequently, while many cryptocurrency experiments fail or lack adoption and drop from the purview of history, their constant variation also contributes to the undertow of the future that pulls against more visible surface waves of computational progress. The article is structured to first define how we understand and leverage ‘dark’ against computational cultures. We then apply thematic and analytical tactics to articulate future-making socio-technical experiments in the dark. Based on past empirical work of the authors (Maddox "Netnography") we focus on crypto-cultures’ complex emancipatory and normative tensions via themes of construction, disruption, contention, redirection, obsolescence, and iteration. Through these themes we illustrate the mutation and absorption of dark experimental spaces into larger social structures. The themes we identify are not meant as a complete or necessarily serial set of occurrences, but nonetheless contribute a new vocabulary for students of technology and media to see into and grapple with the dark. Embracing the Dark: Prework & Analytical Tactics for Outside the Known To frame discussion of the dark here as creative space for alternative futures, we focus on scholars who have deeply engaged with notions of socio-technical darkness. This allows us to explore outside the blinders of computational light and, with a nod to Sassen, dig in the shadows of known categories to evolve the analytical tactics required for the study of emerging socio-technical conditions. We understand the Dark Web to usher shifting and multiple definitions of darkness, from a moral darkness to a technical one (Gehl). From this work, we draw the observation of how technologies that obfuscate digital tracking create novel capacities for digital cultures in spaces defined by anonymity for both publisher and user. Darknets accomplish this by overlaying open internet protocols (e.g. TCP/IP) with non-standard protocols that encrypt and anonymise information (Pace). Pace traces concepts of darknets to networks in the 1970s that were 'insulated’ from the internet’s predecessor ARPANET by air gap, and then reemerged as software protocols similarly insulated from cultural norms around intellectual property. ‘Darknets’ can also be considered in ternary as opposed to binary terms (Gehl and McKelvey) that push to make private that which is supposed to be public infrastructure, and push private platforms (e.g. a Personal Computer) to make public networks via common bandwidth. In this way, darknets feed new possibilities of communication from both common infrastructures and individual’s platforms. Enabling new potentials of community online and out of sight serves to signal what the dark accomplishes for the social when measured against an otherwise unending light of computational society. To this point, a new dark age can be welcomed insofar it allows an undecided future outside of computational logics that continually define and refine the possible and probable (Bridle). This argument takes von Neumann’s 1945 declaration that “all stable processes we shall predict. All unstable processes we shall control” (in Bridle 21) as a founding statement for computational thought and indicative of current society. The hope expressed by Bridle is not an absence of knowledge, but an absence of knowing the future. Past the computational prison of total information awareness within an accelerating information age (Castells) is the promise of new formations of as yet unknowable life. Thus, from Bridle’s perspective, and ours, darkness can be a place of freedom and possibility, where the equality of being in the dark, together, is not as threatening as current privileged ways of thinking would suggest (Bridle 15). The consequences of living in a constant glaring light lead to data hierarchies “leaching” (Bridle) into everything, including social relationships, where our data are relationalised while our relations are datafied (Maddox and Heemsbergen) by enforcing computational thinking upon them. Darkness becomes a refuge that acknowledges the power of unknowing, and a return to potential for social, equitable, and reciprocal relations. This is not to say that we envision a utopian life without the shadow of hierarchy, but rather an encouragement to dig into those shadows made visible only by the brightest of lights. The idea of digging in the shadows is borrowed from Saskia Sassen, who asks us to consider the ‘master categories’ that blind us to alternatives. According to Sassen (402), while master categories have the power to illuminate, their blinding power keeps us from seeing other presences in the landscape: “they produce, then, a vast penumbra around that center of light. It is in that penumbra that we need to go digging”. We see darkness in the age of digital ubiquity as rejecting the blinding ‘master category’ of computational thought. Computational thought defines social/economic/political life via what is static enough to predict or unstable enough to render a need to control. Otherwise, the observable, computable, knowable, and possible all follow in line. Our dig in the shadows posits a penumbra of protocols – both of computational code and human practice – that circle the blinding light of known digital communications. We use the remainder of this short article to describe these themes found in the dark that offer new ways to understand the movements and moments of potential futures that remain largely unseen. Thematic Resonances in the Dark This section considers cryptocultures of the dark. We build from a thematic vocabulary that has been previously introduced from empirical examples of the crypto-market communities which tinker with and through the darkness provided by encryption and privacy technologies (Maddox "Netnography"). Here we refine these future-making themes through their application to events surrounding community-generated technology aimed at disrupting centralised banking systems: cryptocurrencies (Maddox, Singh, et al.). Given the overlaps in collective values and technologies between crypto-communities, we find it useful to test the relevance of these themes to the experimental dynamics surrounding cryptocurrencies. We unpack these dynamics as construction, rupture and disruption, redirection, and the flip-sided relationship between obsolescence and iteration leading to mutation and absorption. This section provides a working example for how these themes adapt in application to a community dwelling at the edge of experimental technological possibilities. The theme of construction is both a beginning and a materialisation of a value field. It originates within the cyberlibertarians’ ideological stance towards using technological innovations to ‘create a new world in the shell of the old’ (van de Sande) which has been previously expressed through the concept of constructive activism (Maddox, Barratt, et al.). This libertarian ideology is also to be found in the early cultures that gave rise to cryptocurrencies. Through their interest in the potential of cryptography technologies related to social and political change, the Cypherpunks mailing list formed in 1992 (Swartz). The socio-cultural field surrounding cryptocurrencies, however, has always consisted of a diverse ecosystem of vested interests building collaborations from “goldbugs, hippies, anarchists, cyberpunks, cryptographers, payment systems experts, currency activists, commodity traders, and the curious” (Maurer, Nelms, and Swartz 262). Through the theme of construction we can consider architectures of collaboration, cooperation, and coordination developed by technically savvy populations. Cryptocurrencies are often developed as code by teams who build in mechanisms for issuance (e.g. ‘mining’) and other controls (Conway). Thus, construction and making of cryptocurrencies tend to be collective yet decentralised. Cryptocurrencies arose during a time of increasing levels of distrust in governments and global financial instability from the Global Financial Crisis (2008-2013), whilst gaining traction through their usefulness in engaging in illicit trade (Saiedi, Broström, and Ruiz). It was through this rupture in the certainties of ‘the old system’ that this technology, and the community developing it, sought to disrupt the financial system (Maddox, Singh, et al.; Nelms et al.). Here we see the utility of the second theme of rupture and disruption to illustrate creative experimentation in the liminal and emergent spaces cryptocurrencies afford. While current crypto crazes (e.g. NFTs, ICOs) have their detractors, Cohen suggests, somewhat ironically, that the momentum for change of the crypto current was “driven by the grassroots, and technologically empowered, movement to confront the ills perceived to be powered and exacerbated by market-based capitalism, such as climate change and income inequality” (Cohen 739). Here we can start to envision how subterranean currents that emerge from creative experimentations in the dark impact global social forces in multifaceted ways – even as they are dragged into the light. Within a disrupted environment characterised by rupture, contention and redirection is rife (Maddox "Disrupting"). Contention and redirection illustrate how competing agendas bump and grind to create a generative tension around a deep collective desire for social change. Contention often emerges within an environment of hacks and scams, of which there are many stories in the cryptocurrency world (see Bartlett for an example of OneCoin, for instance; Kavanagh, Miscione, and Ennis). Other aspects of contention emerge around how the technology works to produce (mint) cryptocurrencies, including concern over the environmental impact of producing cryptocurrencies (Goodkind, Jones, and Berrens) and the production of non-fungible tokens for the sale of digital assets (Howson). Contention also arises through the gendered social dynamics of brogramming culture skewing inclusive and diverse engagement (Bowles). Shifting from the ideal of inclusion to the actual practice of crypto-communities begs the question of whose futures are being made. Contention and redirections are also evidenced by ‘hard forks’ in cryptocurrency. The founder mystery resulted in the gifting of this technology to a decentralised and leaderless community, materialised through the distributed consensus processes to approve software updates to a cryptocurrency. This consensus system consequently holds within it the seeds for governance failures (Trump et al.), the first of which occurred with the ‘hard forking’ of Bitcoin into Bitcoin cash in 2017 (Webb). Hard forks occur when developers and miners no longer agree on a proposed change to the software: one group upgraded to the new software while the others operated on the old rules. The resulting two separate blockchains and digital currencies concretised the tensions and disagreements within the community. This forking resulted initially in a shock to the market value of, and trust in, the Bitcoin network, and the dilution of adoption networks across the two cryptocurrencies. The ongoing hard forks of Bitcoin Cash illustrate the continued contention occurring within the community as crypto-personalities pit against each other (Hankin; Li). As these examples show, not all experiments in cryptocurrencies are successful; some become obsolete through iteration (Arnold). Iteration engenders mutations in the cultural framing of socio-technical experiments. These mutations of meaning and signification then facilitate their absorption into novel futures, showing the ternary nature of how what happens in the dark works with what is known by the light. As a rhetorical device, cryptocurrencies have been referred to as a currency (a payment system) or a commodity (an investment or speculation vehicle; Nelms et al. 21). However, new potential applications for the underlying technologies continue emerge. For example, Ethereum, the second-most dominant cryptocurrency after Bitcoin, now offers smart contract technology (decentralised autonomous organisations, DAO; Kavanagh, Miscione, and Ennis) and is iterating technology to dramatically reduce the energy consumption required to mine and mint the non-fungible tokens (NFTs) associated with crypto art (Wintermeyer). Here we can see how these rhetorical framings may represent iterative shifts and meaning-mutation that is as pragmatic as it is cultural. While we have considered here the themes of obsolescence and iteration threaded through the technological differentiations amongst cryptocurrencies, what should we make of these rhetorical or cultural mutations? This cultural mutation, we argue, can be seen most clearly in the resurgence of Dogecoin. Dogecoin is a cryptocurrency launched in 2013 that takes its name and logo from a Shiba Inu meme that was popular several years ago (Potts and Berg). We can consider Dogecoin as a playful infrastructure (Rennie) and cultural product that was initially designed to provide a low bar for entry into the market. Its affordability is kept in place by the ability for miners to mint an unlimited number of coins. Dogecoin had a large resurgence of value and interest just after the meme-centric Reddit community Wallstreetbets managed to drive the share price of video game retailer GameStop to gain 1,500% (Potts and Berg). In this instance we see the mutation of a cryptocurrency into memecoin, or cultural product, for which the value is a prism to the wild fluctuations of internet culture itself, linking cultural bubbles to financial ones. In this case, technologies iterated in the dark mutated and surfaced as cultural bubbles through playful infrastructures that intersected with financial systems. The story of dogecoin articulates how cultural mutation articulates the absorption of emerging techno-potentials into larger structures. Conclusion From creative experiments digging in the dark shadows of global socio-economic forces, we can see how the future is formed beneath the surface of computational light. Yet as we write, cryptocurrencies are being absorbed by centralising and powerful entities to integrate them into global economies. Examples of large institutions hoarding Bitcoin include the crypto-counterbalancing between the Chinese state through its digital currency DCEP (Vincent) and Facebook through the Libra project. Vincent observes that the state-backed DCEP project is the antithesis of the decentralised community agenda for cryptocurrencies to enact the separation of state and money. Meanwhile, Facebook’s centralised computational control of platforms used by 2.8 billion humans provide a similarly perverse addition to cryptocurrency cultures. The penumbra fades as computational logic shifts its gaze. Our thematic exploration of cryptocurrencies highlights that it is only in their emergent forms that such radical creative experiments can dwell in the dark. They do not stay in the dark forever, as their absorption into larger systems becomes part of the future-making process. The cold, inextricable, and always impending computational logic of the current age suffocates creative experimentations that flourish in the dark. Therefore, it is crucial to tend to the uncertainties within the warm, damp, and dark liminal spaces of socio-technical experimentation. References Arnold, Michael. "On the Phenomenology of Technology: The 'Janus-Faces' of Mobile Phones." Information and Organization 13.4 (2003): 231-56. Bartlett, Jamie. "Missing Cryptoqueen: Why Did the FCA Drop Its Warning about the Onecoin Scam?" BBC News 11 Aug. 2020. 19 Feb. 2021 <https://www.bbc.com/news/technology-53721017>. Bowles, Nellie. "Women in Cryptocurrencies Push Back against ‘Blockchain Bros’." New York Times 25 Feb. 2018. 21 Apr. 2021 <https://www.nytimes.com/2018/02/25/business/cryptocurrency-women-blockchain-bros.html>. Bridle, James. New Dark Age: Technology, Knowledge and the End of the Future. London: Verso, 2018. Castells, Manuel. The Information Age: Economy, Society and Culture. 2nd ed. Oxford: Blackwell, 2000. Cohen, Boyd. "The Rise of Alternative Currencies in Post-Capitalism." Journal of Management Studies 54.5 (2017): 739-46. Conway, Luke. "The 10 Most Important Cryptocurrencies Other than Bitcoin." Investopedia Jan. 2021. 19 Feb. 2021 <https://www.investopedia.com/tech/most-important-cryptocurrencies-other-than-bitcoin/>. Gehl, Robert, and Fenwick McKelvey. "Bugging Out: Darknets as Parasites of Large-Scale Media Objects." Media, Culture & Society 41.2 (2019): 219-35. Goodkind, Andrew L., Benjamin A. Jones, and Robert P. Berrens. "Cryptodamages: Monetary Value Estimates of the Air Pollution and Human Health Impacts of Cryptocurrency Mining." Energy Research & Social Science 59 (2020): 101281. Hankin, Aaron. "What You Need to Know about the Bitcoin Cash ‘Hard Fork’." MarketWatch 13 Nov. 2018. 21 Apr. 2021 <https://www.marketwatch.com/story/what-you-need-to-know-about-the-bitcoin-cash-hard-fork-2018-11-13>. Howson, Peter. "NFTs: Why Digital Art Has Such a Massive Carbon Footprint." The Conversation April 2021. 21 Apr. 2021 <https://theconversation.com/nfts-why-digital-art-has-such-a-massive-carbon-footprint-158077>. Kavanagh, Donncha, Gianluca Miscione, and Paul J. Ennis. "The Bitcoin Game: Ethno-Resonance as Method." Organization (2019): 1-20. Li, Shine. "Bitcoin Cash (Bch) Hard Forks into Two New Blockchains Following Disagreement on Miner Tax." Blockchain.News Nov. 2020. 19 Feb. 2021 <https://blockchain.news/news/bitcoin-cash-bch-hard-forks-two-new-blockchains-disagreement-on-miner-tax>. Maddox, Alexia. "Disrupting the Ethnographic Imaginarium: Challenges of Immersion in the Silk Road Cryptomarket Community." Journal of Digital Social Research 2.1 (2020): 31-51. ———. "Netnography to Uncover Cryptomarkets." Netnography Unlimited: Understanding Technoculture Using Qualitative Social Media Research. Eds. Rossella Gambetti and Robert V. Kozinets. London: Routledge, 2021: 3-23. Maddox, Alexia, Monica J. Barratt, Matthew Allen, and Simon Lenton. "Constructive Activism in the Dark Web: Cryptomarkets and Illicit Drugs in the Digital ‘Demimonde’." Information Communication and Society 19.1 (2016): 111-26. Maddox, Alexia, and Luke Heemsbergen. "The Electrified Social: A Policing and Politics of the Dark." Continuum (forthcoming). Maddox, Alexia, Supriya Singh, Heather Horst, and Greg Adamson. "An Ethnography of Bitcoin: Towards a Future Research Agenda." Australian Journal of Telecommunications and the Digital Economy 4.1 (2016): 65-78. Maurer, Bill, Taylor C. Nelms, and Lana Swartz. "'When Perhaps the Real Problem Is Money Itself!': The Practical Materiality of Bitcoin." Social Semiotics 23.2 (2013): 261-77. Nakamoto, Satoshi. "Bitcoin: A Peer-to-Peer Electronic Cash System." Bitcoin.org 2008. 21 Apr. 2021 <https://bitcoin.org/bitcoin.pdf>. Nelms, Taylor C., et al. "Social Payments: Innovation, Trust, Bitcoin, and the Sharing Economy." Theory, Culture & Society 35.3 (2018): 13-33. Pace, Jonathan. "Exchange Relations on the Dark Web." Critical Studies in Media Communication 34.1 (2017): 1-13. Potts, Jason, and Chris Berg. "After Gamestop, the Rise of Dogecoin Shows Us How Memes Can Move Market." The Conversation Feb. 2021. 21 Apr. 2021 <https://theconversation.com/after-gamestop-the-rise-of-dogecoin-shows-us-how-memes-can-move-markets-154470>. Rennie, Ellie. "The Governance of Degenerates Part II: Into the Liquidityborg." Medium Nov. 2020. 21 Apr. 2021 <https://ellierennie.medium.com/the-governance-of-degenerates-part-ii-into-the-liquidityborg-463889fc4d82>. Saiedi, Ed, Anders Broström, and Felipe Ruiz. "Global Drivers of Cryptocurrency Infrastructure Adoption." Small Business Economics (Mar. 2020). Sassen, Saskia. "Digging in the Penumbra of Master Categories." British Journal of Sociology 56.3 (2005): 401-03. Swartz, Lana. "What Was Bitcoin, What Will It Be? The Techno-Economic Imaginaries of a New Money Technology." Cultural Studies 32.4 (2018): 623-50. Trump, Benjamin D., et al. "Cryptocurrency: Governance for What Was Meant to Be Ungovernable." Environment Systems and Decisions 38.3 (2018): 426-30. Van de Sande, Mathijs. "Fighting with Tools: Prefiguration and Radical Politics in the Twenty-First Century." Rethinking Marxism 27.2 (2015): 177-94. Vincent, Danny. "'One Day Everyone Will Use China's Digital Currency'." BBC News Sep. 2020. 19 Feb. 2021 <https://www.bbc.com/news/business-54261382>. Webb, Nick. "A Fork in the Blockchain: Income Tax and the Bitcoin/Bitcoin Cash Hard Fork." North Carolina Journal of Law & Technology 19.4 (2018): 283-311. Wintermeyer, Lawrence. "Climate-Positive Crypto Art: The Next Big Thing or NFT Overreach." Forbes 19 Mar. 2021. 21 Apr. 2021 <https://www.forbes.com/sites/lawrencewintermeyer/2021/03/19/climate-positive-crypto-art-the-next-big-thing-or-nft-overreach/>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography