Journal articles on the topic 'Video hosting websites'

To see the other types of publications on this topic, follow the link: Video hosting websites.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 journal articles for your research on the topic 'Video hosting websites.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pihlaja, Stephen. "Expressing pleasure and avoiding engagement in online adult video comment sections." Journal of Language and Sexuality 5, no. 1 (February 29, 2016): 94–112. http://dx.doi.org/10.1075/jls.5.1.04pih.

Full text
Abstract:
Online video pornography websites have grown into a key online industry and location for pornography consumption. While much work has been done investigating reception of online video generally, discourse analysis of comments and interaction around online pornography remains rare. This article focuses on comments on adult videos, comparing and contrasting the comments on adult videos with other online video sites. The goal is to identify and explain differences and similarities in the content of comments and interaction. The article therefore analyses 22,562 comments taken from the 100 most-viewed videos on the popular porn-hosting website, Pornhub. In contrast to studies of non-pornographic online video pages, analysis shows little interaction among users in comments sections and that offense is largely absent. Building on this analysis, I then discuss why offense does not arise in the comments. Findings suggest that the location of the comments at the point of pornography consumption affects the comment content, resulting in a discourse of solitary pleasure and fantasy rather than community engagement.
APA, Harvard, Vancouver, ISO, and other styles
2

Beech, Valerie, and Eric Kowalik. "From cradle to grave: The life cycle of a digital learning object." College & Research Libraries News 80, no. 10 (November 5, 2019): 560. http://dx.doi.org/10.5860/crln.80.10.560.

Full text
Abstract:
Most librarians have probably experienced finding that a website they liked has disappeared, perhaps a video on YouTube, a tutorial, or even just an informative webpage. Sometimes the URL has simply changed, and the item can be found again. Other times the item has truly been retired. Without trying to track down the original creator or hosting body, we may never know exactly what happened nor why. Since we also place links to some of these items on our library webpages, disappearing websites create broken links or “link rot.” Librarians are also creators of some of these disappearing websites.
APA, Harvard, Vancouver, ISO, and other styles
3

Pavlic, Jani, and Jernej Burkeljca. "FFmpeg based Coding Efficiency Comparison of H.264/AVC, H.265/HEVC and VP9 Video Coding Standards for Video Hosting Websites." International Journal of Computer Applications 182, no. 37 (January 17, 2019): 1–8. http://dx.doi.org/10.5120/ijca2019918381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haymes, A. T., and V. Harries. "‘How to stop a nosebleed’: an assessment of the quality of epistaxis treatment advice on YouTube." Journal of Laryngology & Otology 130, no. 8 (June 27, 2016): 749–54. http://dx.doi.org/10.1017/s0022215116008410.

Full text
Abstract:
AbstractObjective:Video hosting websites are increasingly being used to disseminate health education messages. This study aimed to assess the quality of advice contained within YouTube videos on the conservative management of epistaxis.Method:YouTube.com was searched using the phrase ‘how to stop a nosebleed’. The first 50 videos were screened. Objective advice scores and subjective production quality scores were attributed by independent raters.Results:Forty-five videos were analysed. The mean advice score was 2.0 out of 8 and the mean production quality score was 1.6 out of 3. There were no correlations between a video's advice score and its search results rank (ρ = −0.28, p = 0.068), its view count (ρ = 0.20, p = 0.19) or its number of ‘likes’ (ρ = 0.21, p = 0.18).Conclusion:The quality of information on conservative epistaxis management within YouTube videos is extremely variable. A high search rank is no indication of video quality. Many videos proffer inappropriate and dangerous ‘alternative’ advice. We do not recommend YouTube as a source for patient information.
APA, Harvard, Vancouver, ISO, and other styles
5

Helles, Rasmus, Stine Lomborg, and Signe Sophus Lai. "Infrastructures of tracking: Mapping the ecology of third-party services across top sites in the EU." New Media & Society 22, no. 11 (October 4, 2020): 1957–75. http://dx.doi.org/10.1177/1461444820932868.

Full text
Abstract:
Today, websites operate in a modular fashion, outsourcing the surveillance and datafication of users to outside companies, along with security functions, video hosting, and so on. These third-party services (TPSs) function as key enablers of the web, with respect to functionality and the monetization of user activity. Departing from critical data studies and media systems analysis, the article contributes to understanding TPS infrastructures by placing these in a wider context of markets, cultural differences and regulation. Through a study of top-150 websites from the 28 EU countries, the article demonstrates how the use of TPSs varies between different parts of the region and different types of sites, and traces this variation to issues of language, regulatory traditions and differences in online businesses. These insights may inform current debates about surveillance capitalism and big data, by linking different forms of commodification of users’ behavioural data to broader social and cultural structures.
APA, Harvard, Vancouver, ISO, and other styles
6

Chong, Woonkian, Simon Rudkin, and Junhui Zhang. "Gender differentials and implicit feedback on online video content: enhancing user interest evaluation." Industrial Management & Data Systems 119, no. 5 (June 10, 2019): 1128–46. http://dx.doi.org/10.1108/imds-12-2018-0551.

Full text
Abstract:
Purpose Exponential growth in online video content makes viewing choice and video promotion increasingly challenging. While explicit recommendation systems have value, they inherently distract the user from normal behaviour and are open to numerous biases. To enhance user interest evaluation accuracy, the purpose of this paper is to comprehensively examine the relationship between implicit feedback and online video content, and reviews gender differentials in the interest indicated by a comprehensive set of viewer responses. Design/methodology/approach This paper includes 200 useable observations based on an experiment of user interaction with the Youku platform (one of the largest video-hosting websites in China). Logistic regression was employed for its simple interpretation to test the proposed hypotheses. Findings The findings demonstrate gender differentials in cursor movement behaviour, explainable via well-studied splits in personality, biological factors, primitive behaviour and emotion management. This work offers a solution to the sparsity of work on implicit feedback, contributing to the literature that combines explicit and implicit feedback. Practical implications This study offers a launch point for further work on human–computer interaction, and highlights the importance of looking beyond individual metrics to embrace wider human traits in video site design and implementation. Originality/value This paper links implicit feedback to online video content for the first time, and demonstrates its value as an interest capturing tool. By reviewing gender differentials in the interest indicated by a comprehensive set of viewer responses, this paper indicates how user characteristics remain critical. Consequently, this work signposts highly fruitful directions for both practitioners and researchers.
APA, Harvard, Vancouver, ISO, and other styles
7

Fedorova, Marina. "Religious identity in the modern digital world." Социодинамика, no. 6 (June 2020): 66–79. http://dx.doi.org/10.25136/2409-7144.2020.6.33085.

Full text
Abstract:
The subject of this research is the religious identity of Russian youth in the conditions of modern digital society. The author analyzes the factors of transformation of identification processes, examines the characteristics of religious identity, as well as defines the specificity of religious discourse within the Internet environment. The author believes that the main cause of the changes in religious consciousness and identity becomes rapid digitalization of all spheres of social life. This problematic gains relevance during the COVID-19 pandemic, forced self-isolation and transition towards remote work using the information and communication technologies. The author assumes that religious identity should be viewed from the perspective of its inclusion into a broader phenomenon – cyberidentity. An original definition of cyberidentity is proposed. The key factors of its formation, such as social networks and messengers, computer gamed, Internet memes, etc. are determined. The article leans on the analysis of information from websites of religious organizations, different groups in social networks, messengers and video hosting. The main source form empirical data became the results of large-scale research of dynamics of value orientations of youth of Nizhny Novgorod Region that was carried out from 2006 to 2019. The author concludes that currently it may appear that secular trends are growing, while the interest of youth in religion declines. This is conferment by the data acquired from mass surveying, interviewing, and analyzing the content of social networks. However, secularization processes have contradictory, nonlinear and unpredictable character. Within the Internet space, the dialects of religion and secular not just being retained, but reflected in the categories of digital society. In the digital post-secular society, religious identity becomes a part of the more global identification processes. It sets particular goals for the traditional religions, which are forced to adapt to civilizational challenges.
APA, Harvard, Vancouver, ISO, and other styles
8

Saffi, Hillah, Thien Phu Do, Jakob Møller Hansen, David W. Dodick, and Messoud Ashina. "The migraine landscape on YouTube: A review of YouTube as a source of information on migraine." Cephalalgia 40, no. 12 (July 23, 2020): 1363–69. http://dx.doi.org/10.1177/0333102420943891.

Full text
Abstract:
Introduction YouTube is the most widely used video hosting website in the world; however, the quality and reliability of information is unknown. The aim of this study is to evaluate the content and distribution of the most popular videos on YouTube about migraine. Methods We searched for migraine-related videos on the online video hosting resource YouTube ( http://youtube.com/ ). Two authors screened the titles and video descriptions independently for all videos with a view count of ≥ 10,000 views. For each video we recorded descriptive data, the source/author and the primary purpose/content. Results We identified 351 eligible videos. In total, there was more than 3 days of content viewed more than 163 million times. Only 9% of these videos were authored by healthcare professionals. The majority (44%) of videos focused on complementary and alternative medicine. Discussion YouTube provides a wide array of easily accessible information on migraine, ranging from authoritative sources to potentially questionable content. If used uncritically, this may result in inadequate clinical management. Peer-reviewed information on migraine mechanisms and treatment is needed to provide the best available evidence for the public and patients. Ideally, a professional society or foundation such as the International Headache Society would develop, curate, and distribute content.
APA, Harvard, Vancouver, ISO, and other styles
9

Ghersi, Abdelhamid, Jad Mansour, Philippe Marchand, Abdallah Al Rubaie, Pascal Kouyoumdjian, and Remy Coulomb. "Surgical videos on the internet: Is this a reliable pedagogical tool in residency training?" SICOT-J 8 (2022): 39. http://dx.doi.org/10.1051/sicotj/2022039.

Full text
Abstract:
Introduction: Several open access platforms are currently available to help facilitate this online learning; however, whether the platforms are generalized or specialized, peers do not evaluate videos, and they may teach unverified techniques. The purpose of this study was to compare the quality of each website’s content using a specific measurement, analyzing the pedagogical quality of Femoroacetabular impingement (FAI) arthroscopic videos on YouTube versus VuMedi. Methods: A prospective study analyzing 20 arthroscopy videos of arthroscopic FAI surgery on two hosting platforms online: 10 on the generalist platform YouTube and 10 on a specialized platform VuMedi. Results: The average length of the YouTube videos was 503 ± 355.02 s (198–1430). The average number of views for the YouTube videos was 56,114.6 ± 116,832.61 (1149–383,694). The average length of the VuMedi videos was 797.5 ± 522.5 s (185–1927). The average number of views for the VuMedi video was 10,404.7 ± 10,071.2 (1625–37,115) The average LAP-VEGaS scores of the YouTube and VuMedi videos were 8.2 ± 3.47 (3–15) and 11.95 ± 2.64 (6–15), respectively (p < 0.0005). Discussion: The use of a specialized website makes it possible to obtain educational videos of better quality. Health professionals need to be aware of this when using it as a resource for learning. Therefore, it should be in the interest of educational institutions to participate in the sharing of videos on this platform or to create their own platform to improve the quality of the information provided and the overall pedagogical experience. Level of evidence: II
APA, Harvard, Vancouver, ISO, and other styles
10

Ekaterina K., Reva, and Mezhina Victoria A. "Features of Providing Content on YouTube about Extreme Situations: Genres and Formats." Humanitarian Vector 15, no. 5 (May 2020): 110–15. http://dx.doi.org/10.21209/1996-7853-2020-15-5-110-115.

Full text
Abstract:
The relevance of the study of YouTube is due to the fact that today video hosting is a concentration of video materials of various thematic areas and channels producing content. This article presents the results of a study of the genres and formats used on the media platform YouTube to reflect information about extreme situations of a natural and man-made nature. Video hosting YouTube has become a platform not only for the distribution of user content, but also a modern communication channel for broadcasting the content of traditional media. It is this factor that allows you to identify genre and format ways of providing information. To compile a list of extreme and emergency situations for 2015–2019, State reports on the state of protection of the population and territory of the Russian Federation from natural and man-made emergencies posted on the website of the Russian Emergencies Ministry were studied. Then, keywords were searched on the video hosting site YouTube. Due to the fact that the study is part of a major scientific project aimed at studying the influence of psychotraumatizing factors on the speech function of a person in real extreme situations, one of the selection criteria was the presence of an emotional component in the video materials. The chronological framework of the study in five years, a wide range of YouTube channels, a body of video materials collected by a continuous sampling method, the use of typological and genre analysis made it possible to obtain representative conclusions about the genre-format specifics of video materials on socially significant topics.The results obtained show that the largest number of videos belong to the information group of genres. The analytical ones include the genre of journalistic investigation. Amateur YouTube channels use selfie shooting, shooting with voiceover commentary, a conversation with an eyewitness or victim, etc. Keywords: media, television, media, YouTube, video hosting, video content, extreme situations
APA, Harvard, Vancouver, ISO, and other styles
11

Uhl, Carolyn A., Katlin J. Rhyner, Cheryl A. Terrance, and Noël R. Lugo. "An examination of nonconsensual pornography websites." Feminism & Psychology 28, no. 1 (February 2018): 50–68. http://dx.doi.org/10.1177/0959353517720225.

Full text
Abstract:
Nonconsensual pornography, sometimes referred to as “revenge porn,” refers to the distribution of sexually explicit photographs or videos without the consent of the individual in the image. These images, along with accompanying personal information, are often disseminated by a former romantic or sexual partner with the intent to harm. Websites exist that have a reputation for hosting and promoting revenge porn. However, it is unclear to what extent these websites function for the purpose of explicitly harming victims by providing a victim's personal information. To address this question, a content analysis was performed on 134 photographs from seven different websites that originated within the United States. Descriptions of photos posted, content of victims' personal information included within the post, victim and distributor demographics, and viewers' comments were coded and analyzed. Website layouts and policies were also documented. Key findings were that nearly 92% of victims featured on included websites were women. Moreover, when a reason was given for posting the photo, it was correlated with having a greater number of views, being more likely to allow commenting on photos, and being more likely to include a victim's name. Implications are discussed.
APA, Harvard, Vancouver, ISO, and other styles
12

Amarasekara, Inoka, and Will J. Grant. "Exploring the YouTube science communication gender gap: A sentiment analysis." Public Understanding of Science 28, no. 1 (July 5, 2018): 68–84. http://dx.doi.org/10.1177/0963662518786654.

Full text
Abstract:
YouTube has become the second most popular web search engine (see Alexa.com ) and the primary website for individuals and organisations to freely distribute video content. Popularity statistics indicate that Science, Technology, Engineering and Mathematics–related content is of significant interest to YouTube audiences, yet analysis of the 391 most popular science, engineering and mathematics–themed channels reveals a conspicuous absence of female communicators, with the hosts of just 32 of these channels presenting as female. To help understand potential causes of this gap, analysis was conducted on popularity indicators and audience sentiments of 450 videos from 90 Science, Technology, Engineering and Mathematics–related channels. Female hosted channels were found to accumulate more comments per view, and significantly higher proportions of appearance, hostile, critical/negative and sexist/sexual commentary.
APA, Harvard, Vancouver, ISO, and other styles
13

Nasir, Muhammad, Salahuddin Salahuddin, Rusli Rusli, and Anita Fauziah. "PELATIHAN PENGELOLAAN WEBSITE JURUSAN BAGI STAF PENGAJAR DAN STAF ADMINISTRASI." Jurnal Vokasi 3, no. 2 (October 15, 2019): 78. http://dx.doi.org/10.30811/vokasi.v3i2.1398.

Full text
Abstract:
Sebuah website, atau dikenal juga dengan situs web, adalah sekumpulan halaman web yang ditampilkan dalam sebuah domain. Website disimpan di dalam server hosting yang dapat diakses lewat jaringan seperti jaringan Internet atau lewat jaringan area lokal lewat alamat Internet yang juga dikenal dengan nama Uniform Resource Locator (URL). Website yang dapat diakses tersebut secara kolektif disebut World Wide Web (WWW). Halaman web merupakan dokumen berisi teks yang ditulis (paling sederhana) dalam format Hyper Text Markup Language (HTML). Halaman web dapat memanggil elemen-elemen lain yang biasa ditampilkan dalam sebuah web, seperti elemen gambar, video, dan sebagainya. Website di lingkungan Jurusan Teknik Mesin (JTM) dibawah kendali dan pengawasan Pusat Teknologi Informasi dan Komunikasi Politeknik Negeri Lhokseumawe. Admin yang ada di lingkungan Jurusan termasuk di lingkungan JTM hanya sebagai admin pengelola web, bukan pembuat web. Jadi aksesnya terbatas pada hal-hal yang bersifat umum, seperti membuat berita, membuat agenda dan membuat pengumuman. Untuk melaksanakan tugas tersebut, admin di unit-unit sudah dilengkapi dengan fasilitas atau form upload yang memadai dan mudah dioperasikan, sehingga cukup melengkapi informasi di kolom-kolom yang telah ditentukan, maka informasi yang dibuat akan langsung terupload ke website. Isi atau konten pada website diserahkan sepenuhnya kepada admin pengelola, maka tugas admin adalah melengkapi, menghias dan mempercantik tampilan web yang dikelola. Dengan mengikuti pelatihan ini dosen dan staf administrasi yang nantinya menjadi admin dapat mengelola website masing-masing sesuai dengan kebutuhannya
APA, Harvard, Vancouver, ISO, and other styles
14

Fomin, Andrey Gennad'evich, and Elizaveta Aleksandrovna Mona. "Conceptual Metaphor as a Means of Terrorist Suggestion (on the Material of the Islamic State Video Messages)." Russian Journal of Linguistics 23, no. 3 (December 15, 2019): 698–713. http://dx.doi.org/10.22363/2312-9182-2019-23-3-698-713.

Full text
Abstract:
Manipulative verbal influence is an immanent feature of modern international communication. Successful realization of the suggestive aspect allows the speaker to exert influence on the recipient’s worldview and ingrain certain ideological attitudes in their mind. This situation is characteristic of various types of discourse: political, advertising and media. However, the most dangerous for political stability and safety is utilization of persuasive linguistic devices by extremist groups and terrorist organizations. Thus, research in this field has become extremely relevant. The article presents linguistic analysis of such manifestations of destructive manipulation in the Islamic State (IS) speech, found in their official video messages. The analysis was carried out on the material of the official IS video messages, obtained through the selective sampling method on the video hosting website YouTube. Within the framework of the research we distinguish, classify and subject to a thorough linguistic analysis of conceptual metaphors which are used by the terrorists. The data obtained enables us to make a conclusion regarding the key role of conceptual metaphor in realization of the IS speaker’s communicative intention, which presupposes attracting the recipient’s attention to their activities and creating a radicalized ideological attitude in the minds of the audience. Furthermore, we prove that the metaphor is deliberately used by the terrorists to successfully fulfill their pragmatic intention, which involves manipulating the recipient. The provisions developed as part of the study and the results of the analysis can be further applied in modelling the mechanisms to confront and counteract terrorist suggestion in cyberspace and mass media.
APA, Harvard, Vancouver, ISO, and other styles
15

Dukov, E. V. "“Stars” from the Tube." Observatory of Culture, no. 3 (June 28, 2015): 28–36. http://dx.doi.org/10.25281/2072-3156-2015-0-3-28-36.

Full text
Abstract:
“Stars” from the Tube (by Evgeny Dukov) deals with the new socio-cultural trend - individual artistic industry. It developed on the basis of appearance in the Internet of the Blog website (1990-s) and the YouTube video hosting (2000-s). Arisen independently of one another, they began to play a very important role in contemporary musical life: the bloggers became conductors of the new musical content that they would “catch” in the Internet; the technical capabilities of YouTube made saturation of that content simple, even for novice users. All this has led to the emergence of a new type of “stars”; they “break out” without any assistance of show business professionals, without competitions and festivals, but always with some initial aid of bloggers. The Internet audience finds something interesting for themselves in the creative work of the “stars”, which makes music critics, sociologists, and other specialists solve the problem of artistic preferences of the modern (mostly young) Internet audience. However, the bloggers themselves usually remain in the shadows. They unselfishly open to the web community and promote in the Internet any phenomenon which, from their point of view, can claim the status of artistic.
APA, Harvard, Vancouver, ISO, and other styles
16

Kohn, Kurt. "Pedagogic Corpora for Content and Language Integrated Learning. Insights from the BACKBONE Project." EuroCALL Review 20, no. 2 (September 29, 2012): 3. http://dx.doi.org/10.4995/eurocall.2012.11374.

Full text
Abstract:
BACKBONE is a European LLP/Languages project (1) (Jan 2009 - Feb 2011), whose overall objective is to provide foreign language teachers in CLIL settings with innovative language learning solutions. To achieve this goal, pedagogic corpora of spoken interviews are combined with corpus-related e-learning activities in blended learning scenarios. The seven BACKBONE corpora contain video interviews in English, German, French, Polish, Spanish and Turkish as well as in European manifestations of English as a Lingua Franca (ELF). The interviews have been transcribed and pedagogically annotated with regard to thematic and linguistic features; additional enrichment resources include ready-made language learning modules as well as suggestions and instructions for exploratory and communicative learning activities. The BACKBONE search interface provides free online access to the interviews and enrichment resources. It supports pedagogically motivated searches using thematic and linguistic categories as well as lexical searches with words and phrases. 24 CLIL-related pilot courses have been implemented and evaluated in secondary, higher and vocational education; they demonstrate how BACKBONE search results can be used to facilitate individual and collaborative learning in Moodle-based blended learning activities. A suite of pedagogic corpus tools covering transcription, annotation, management of enrichment resources and corpus search is available under a GNU General Public License. The customization and flexibility these tools offer enables teachers to cater to diverse language learning and teaching needs in CLIL contexts or in connection with lesser taught languages and varieties. To facilitate exploitation, the BACKBONE website serves as a ‘one-stop-shop’ for an ensemble of teacher support facilities including web support for the development and hosting of “guest” corpora and courses.
APA, Harvard, Vancouver, ISO, and other styles
17

Rybina, O., D. Shepilov, and K. Pysarenko. "THE POWER OF "LIKE". THE INFLUENCE OF MARKETING IN SOCIAL NETWORKS ON ATTRACTING CLIENTS." Vìsnik Sumsʹkogo deržavnogo unìversitetu, no. 1 (2020): 118–23. http://dx.doi.org/10.21272/1817-9215.2020.1-12.

Full text
Abstract:
The paper considers marketing communications in social networks that allow to constantly maintain two-way feedback from consumers. Authors understand social media marketing as the use of existing platforms to raise brand awareness among consumers by using the principles of these platforms. Forms of platform promotion are defined: traditional and social (organic). The paper analyzes and systematizes the most popular social networks, which include: Facebook, Whatsapp, Youtube, Instagram, Tik Tok, Twitter, LinkedIn, Pinterest, Snapchat. The considered social networks are divided into: social networks, professional networks, video hosting, knowledge sharing media, micro-blogs and user forums. The paper presents the TOP social networks in the world as of 2019. The paper highlights and substantiates the benefits of marketing in social media, namely: brand building, customer loyalty, conversion, customer service, awareness raising and branding; customer base growth; attracting traffic, leads and sales, etc. As social networks promote active communication between companies and consumers, stimulate interaction among users - the factors that influence customer engagement are identified in the work; it was investigated which content on the brand's page on social networks attracts the majority and makes you want to visit again. It is justified that when using SMM (SocialMediaMarketing) you need to pay more attention to the published information, as this is one of the main factors influencing customers. The paper emphasizes the importance of openness as the main factor in creating a trusting relationship "brand-consumer", which in turn shapes the behavior of the buyer in reality. SMM has been proven to be a powerful media platform for customer communication, brand building, sales growth and website traffic, as the brand demonstrates its openness to communication through social media. It is substantiated that with the help of social networks brands remain in trend.
APA, Harvard, Vancouver, ISO, and other styles
18

Cobanoglu, Cihan, Muhittin Cavusoglu, and Gozde Turktarhan. "A beginner’s guide and best practices for using crowdsourcing platforms for survey research: The Case of Amazon Mechanical Turk (MTurk)." Journal of Global Business Insights 6, no. 1 (March 2021): 92–97. http://dx.doi.org/10.5038/2640-6489.6.1.1177.

Full text
Abstract:
Introduction Researchers around the globe are utilizing crowdsourcing tools to reach respondents for quantitative and qualitative research (Chambers & Nimon, 2019). Many social science and business journals are receiving studies that utilize crowdsourcing tools such as Amazon Mechanical Turk (MTurk), Qualtrics, MicroWorkers, ShortTask, ClickWorker, and Crowdsource (e.g., Ahn, & Back, 2019; Ali et al., 2021; Esfahani, & Ozturk, 2019; Jeong, & Lee, 2017; Zhang et al., 2017). Even though the use of these tools presents a great opportunity for sharing large quantities of data quickly, some challenges must also be addressed. The purpose of this guide is to present the basic ideas behind the use of crowdsourcing for survey research and provide a primer for best practices that will increase their validity and reliability. What is crowdsourcing research? Crowdsourcing describes the collection of information, opinions, or other types of input from a large number of people, typically via the internet, and which may or may not receive (financial) compensation (Hargrave, 2019; Oxford Dictionary, n.d.). Within the behavioral science realm, crowdsourcing is defined as the use of internet services for hosting research activities and for creating opportunities for a large population of participants. Applications of crowdsourcing techniques have evolved over the decades, establishing the strong informational power of crowds. The advent of Web 2.0 has expanded the possibilities of crowdsourcing, with new online tools such as online reviews, forums, Wikipedia, Qualtrics, or MTurk, but also other platforms such as Crowdflower and Prolific Academic (Peer et al., 2017; Sheehan, 2018). Crowdsourcing platforms in the age of Web 2.0 use remote labor recruited via the internet to assist employers complete tasks that cannot be left to machines. Key characteristics of crowdsourcing include payment for workers, their recruitment from any location, and the completion of tasks (Behrend et al., 2011). They also allow for a relatively quick collection of data compared to data collection in the field, and participants are rewarded with an incentive—often financial compensation. Crowdsourcing not only offers a large participation pool but also a streamlined process for the study design, participant recruitment, and data collection as well as integrated participant compensation system (Buhrmester et al., 2011). Also, compared to other traditional marketing firms, crowdsourcing makes it easier to detect possible sampling biases (Garrow et al., 2020). Due to advantages such as reduced costs, diversity of participants, and flexibility, crowdsourcing platforms have surged in popularity for researchers. Advantages MTurk is one of the most popular crowdsourcing platforms among researchers, allowing Requesters to submit tasks for Workers to complete (Cummings & Sibona, 2017). MTurk has been used as an online crowdsourcing platform for the recruitment of human subjects for research purposes (Paolacci & Chandler, 2014). Research has also shown MTurk to be a reliable and cost-effective tool, capable of providing representative data for research in the behavioral sciences (e.g., Crump et al., 2013; Goodman et al., 2013; Mason & Suri, 2012; Rand, 2012; Simcox & Fiez, 2014). In addition to its use in social science studies, the platform has been used in marketing, hospitality and tourism, psychology, political science, communication, and sociology contexts (Sheehan, 2018). To illustrate, between 2012 and 2017, more than 40% of the studies published in the Journal of Consumer Research used crowdsourcing websites for their data collection (Goodman & Paolacci, 2017). Disadvantages Although researchers have assessed crowdsourcing platforms as reliable and cost-effective for data collection in the behavioral sciences, they are not exempt of flaws. One disadvantage is the possibility of unsatisfactory data quality. In fact, the virtual setting of the survey implies that the investigator is physically separated from the participant, and this lack of monitoring could lead to data quality issues (Sheehan, 2018). In addition, participants in survey research on crowdsourcing platforms are not always who they claim to be, creating issues of trust with the data provided and, ultimately, the quality of the research findings (McGonagle, 2015; Smith et al., 2016). A recurrent concern with MTurk workers, for instance, is their assessment as experienced survey takers (Chandler et al., 2015). This experience is mainly acquired through completion of dozens of surveys per day, especially when they are faced with similar items and scales. Smith et al. (2016) identified two types of problems performing data collection using MTurk; namely, cheaters and speeders. As compared to Qualtrics—which has a strict screening and quality-control processes to ensure that participants are who they claim to be—MTurk appears to be less exigent regarding the workers. However, a downside for data collection with Qualtrics is more expensive fees—about $5.00 per questionnaire on Qualtrics, against $0.50 to $1.50 on MTurk (Ford, 2017). Hence, few researchers were able to conduct surveys and compare respondent pools with Qualtrics or other traditional marketing research firms (Garrow et al., 2020). Another challenge using MTurk arises when trying to collect a desired number of responses from a population targeted to a specific city or area (Ross et al., 2010). The issues inherent to the selection process of MTurk have been the subject of investigations in several studies (e.g., Berinsky et al., 2012; Chandler et al., 2014; 2015; Harms & DeSimone, 2015; Paolacci et al., 2010; Rand, 2012). Feitosa et al. (2015) pointed out that international respondents may still identify themselves as U.S. respondents with the use of fake addresses and accounts. They found that 5% to 10% of participants identifying themselves as U.S. respondents were actually from overseas locations. Moreover, Babin et al. (2016) assessed that the use of trap questions allowed researchers to uncover that many respondents change their genders, ages, careers, or income within the course of a single survey. The issues of (a) experienced workers for the quality control of questions and (b) speeders, which, for MTurk can be attributed to the platform being the main source of revenue for a given respondent, remain the inherent issues of crowdsourcing platforms used for research purposes. Best practices Some best practices can be recommended in the use of crowdsourcing platforms for data collection purposes. Workers IDs can be matched with IDs from previous studies, thus allowing researchers to exclude responses from workers who had answered previous similar studies (Goodman & Paolacci, 2017). Furthermore, proceed to a manual assignment of qualification on MTurk prior to data collection (Litman et al., 2015; Park & Park, 2020). When dealing with experienced workers, both using multiple attention checks and optimizing the survey in a way to have the participants exposed to the stimuli for a sufficient length of time to better address the questions are also recommended (Sheehan, 2018). In this sense, shorter surveys are preferred to longer ones, which affect the participant’s concentration, and may, in turn, adversely impact the quality of their answers. Most importantly, pretest the survey to make sure that all parts are working as expected. Researchers should also keep in mind that in the context of MTurk, the primary method for measurement is the web interface. Thus, to avoid method biases, researchers should ponder whether or not method factors emerge in the latent measurement models (Podsakoff et al., 2012). As such, time-lagged research designs may be preferred as predictor and criterion variables can be measured at different points in time or administered in different platforms, such as Qualtrics vs MTurk (Cheung et al., 2017). In general, the use of crowdsourcing platforms including MTurk may be appropriate according to the research question; and the quality of data is reliant on the quality-control strategies used by researchers to enhance data quality. Trade-offs between various validity types need to be prioritized according to the research objectives (Cheung et al., 2017). From our experience using crowdsourcing tools for our own research as the editorial team members of several journals and chair of several conferences, we provide the best practices as outlined below: MTurk Worker (Respondent) Selection: Researchers should consider their study population before using MTurk for data collection. The MTurk platform should be used for the appropriate study population. For example, if the study targets restaurant owners or company CEOs, MTurk workers may not be suitable for the study. However, if the target population is diners, hotel guests, grocery shoppers, online shoppers, students, or hourly employees, utilizing a sample from MTurk would be suitable. Researchers should use the selection tool in the software. For example, if you target workers only from one country, exclude responses that came from an internet protocol (IP) address outside the targeted country and report the results in the method section. Researchers should consider the demographics of workers on MTurk which must reflect the study targeted population. For example, if the study focuses on baby boomers use of technology, then the MTurk sample should include only baby boomers. Similarly, the gender balance, racial composition, and income of people on MTurk should mirror the targeted population. Researchers should use multiple screening tools that identify quality respondents and avoid problematic response patterns. For example, MTurk provides the approval rate for the respondents. This refers to how many times a respondent is rejected for various reasons (i.e., wrong code entered). We recommend using a 90% or higher approval rate. Researchers should include screening questions in different places with different type of questions to make sure that the respondents are appropriate for your study. One way is to use knowledge-based questions about the subject. For example, rather than asking “How experienced are you with accounting practices?”, a supplemental question such as “Which of the following is a component of an income statement?” should be integrated into the study in a different section of the survey. Survey Validity: Researchers should conduct a pilot survey from MTurk workers to identify and fix any potential data quality and programming problems before the entire data set is collected. Researcher can estimate time required to complete the survey from the pilot study. This average time should be used in calculating incentive payment for the workers in such a way that the payment should equate or exceed minimum wage in the targeted country. Researchers should build multiple validity-check tools into the survey. One of them is to ask attention check questions such as “please click on ‘strongly agree’ in this question” or “What is 2+2? Please choose 5” (Cobanoglu et al., 2016) Even though these attention questions are good and should be implemented, experienced survey takers or bots easily identify them and answer them correctly, but then give random answers to other questions. Instead, we recommend building in more involved validity check questions. One of the best is asking the same question in different places and in different forms. For example, asking the age of the respondent in the beginning of the survey and then asking them the year of their birth at the end of the survey is an effective way to check that they are replying to the survey honestly. Exclude all those who answered the same question differently. Report the results of these validity checks in the methodology. Cavusoglu (2019) found that almost 20% of the surveys were eliminated due to the failure of the validity check questions which were embedded in different places and in different forms in his survey. Researchers should be aware of internet bot, which is a software that runs automated tasks. Some respondents use a bot to reply to the surveys. To avoid this, use Captcha verification, which forces respondents to perform random tasks such as moving the bar to a certain area, clicking in boxes that has cars, or checking boxes to verify the person taking the survey is not a bot. Whenever appropriate, researchers should use time limit options offered by online survey tools such as Qualtrics to control the time that a survey taker must spend to advance to the next question. We found that this is a great tool, especially when you want the respondents to watch a video, read a scenario, or look at a picture before they respond to other questions. Researchers should collect data in different days and times during the week to collect a more diverse and representative sample. Data Cleaning: Researchers should be aware that some respondents do not read questions. They simply select random answers or type nonsense text. To exclude them from the study, manually inspect the data. Exclude anyone who filled out the survey too quickly. We recommend excluding all responses filled out less than 40% of the average time to take the survey. For example, if it takes 10 minutes to fill out a survey, we exclude everyone who fills out this survey in 4 minutes or less. After we separated these two groups, we compared them and found that the speeders’ (aka cheaters) data was significantly different than the regular group. Researchers should always collect more data than needed. Our rule of thumb is to collect 30% more data than needed. For example, if 500 clean data responses are wanted, collect at least 650 data. The targeted number of data will still be available after cleaning the data. Report the process of cleaning data in the method section of your article, showing the editor and reviewers that you have taken steps to increase the validity and reliability of the survey responses. Calculating a response rate for the samples using MTurk is not possible. However, it is possible to calculate active response rate (Ali et al., 2021). It can be calculated as the raw response numbers deducted from all screening and validity check question results. For example, if you have 1000 raw responses and you eliminated 100 responses for coming from IP address outside of the United States, another 100 surveys for failing the validity check questions, then your active response rate would be 800/1000= 80%.
APA, Harvard, Vancouver, ISO, and other styles
19

Fedorova, Marina, and Mira Borisovna Rotanova. "In this article, the authors address the problem of the correlation of laughing culture and religious experience. The complex dialectics of the relationship between religion and cultural laughter originates in the ritual activity of early forms of religions. The authors, tracing the main stages of the development of the laughing culture, dwell in detail on the current stage of socio-cultural development associated with the design of the digital space. The main methodological approach in the analysis of religious experience in cyberspace is the hermeneutical-phenomenological method of M. Eliade, implying that every person has religious feelings. The empirical basis of the study was the results of a sociological study of the dynamics of the value consciousness of young people, conducted from 2006 to 2019, as well as the information content of websites, groups in social networks, messenger channels and video hosting. В As a result of the study, the authors conclude that a special laughing culture is developing in modern digital society: a cybersmech culture that performs a number of important social functions. Cybersmech culture can rightfully be considered popular. It is characterized by genre and style originality: thus, visual genres appear, expressed in comic media objects (for example, memes). Cybersmech culture is becoming one of the factors in the formation of religious experience in the digital environment. This is expressed in the active gamerization of religious relations observed in the Internet space, the production of new myths, "religious making", changing the boundaries of the Sacred and the mundane in a digital society." Философия и культура, no. 3 (March 2022): 23–37. http://dx.doi.org/10.7256/2454-0757.2022.3.34926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Namala, Vasu, and S. Anbu Karuppusamy. "Efficient feature based video retrieval and indexing using pattern change with invariance algorithm." Journal of Intelligent & Fuzzy Systems, August 25, 2022, 1–15. http://dx.doi.org/10.3233/jifs-221905.

Full text
Abstract:
The amount of audio visual content kept in networked repositories has increased dramatically in recent years. Many video hosting websites exist, such as YouTube, Metacafe, and Google Video. Currently, indexing and categorising these videos is a time-consuming task. The system either asks the user to provide tags for the videos they submit, or manual labelling is used. The aim of this research is to develop a classifier that can accurately identify videos. Every video has content that is either visual, audio, or text. Researchers categorised the videos based on any of these three variables. With the Pattern Change with Size Invariance (PCSI) algorithm, this study provides a hybrid model that takes into account all three components of the video: audio, visual, and textual content. This study tries to classify videos into broad categories such as education, sports, movies, and amateur videos. Key feature extraction and pattern matching would be used to accomplish this. A fuzzy logic and ranking system would be used to assign the tag to the video. The proposed system is tested only on a virtual device in addition a legitimate distributed cluster for the aim of reviewing real-time performance, especially once the amount and duration of films are considerable. The efficiency of video retrieval is measured with metrics like accuracy, precision, and recall is over 99% success.
APA, Harvard, Vancouver, ISO, and other styles
21

Chou, David W., Steven D. Pletcher, David Bruss, C. Kwang Sung, Rodney C. Diaz, Jonathan Liang, and Megan L. Durr. "Otolaryngology Residency Interviews in a Socially Distanced World: Strategies to Recruit and Assess Applicants." Otolaryngology–Head and Neck Surgery, September 1, 2020, 019459982095796. http://dx.doi.org/10.1177/0194599820957961.

Full text
Abstract:
Due to concerns surrounding travel during the COVID-19 pandemic, the 2020-2021 otolaryngology residency application cycle will be conducted virtually for the first time. Residency programs should consider the logistics of video interviews, drawing on experiences of other programs that have successfully performed virtual interviews in the past. The lack of in-person interviews will create challenges in assessing applicants, and we recommend that programs develop structured and targeted questions and even consider having candidates answer standardized questions prior to the virtual interview day. From an applicant perspective, gauging the intangibles of individual residency programs, such as resident camaraderie, program culture, and program location, will be difficult. To address this, programs should consider hosting informal virtual gatherings, create videos that highlight the resident experience, and ensure that program websites are up-to-date. Ultimately, adaptability, resilience, and innovation will allow residency programs to achieve a successful 2021 otolaryngology match.
APA, Harvard, Vancouver, ISO, and other styles
22

Vayndorf-Sysoeva, M. E., and V. V. Pchelyakova. "Prospects for Using the Digital Footprint in Educational and Scientific Processes." Vestnik of Minin University 9, no. 3 (September 6, 2021). http://dx.doi.org/10.26795/2307-1281-2021-9-3-1.

Full text
Abstract:
Introduction. Analysis of the digital footprint of a student and / or a researcher is a promising area for optimizing the individual development path.Materials and Methods. Various approaches to the interpretation and use of the digital footprint are considered. A model of the use of a trace is given, depending on the didactic task being solved, the choice of which determines the use of a specific digital tool from the cloud. The work uses various methods: analysis of articles and publications on the selected topic, systematization of the knowledge gained, classification and interpretation of terms and concepts.Results. The authors considered the features of the analysis of digital traces in such environments, programs, applications, websites, electronic resources such as a scientific electronic library, a search query service, social networks, international databases of scientific publications, citation services, services for managing joint projects, websites for Internet seminars (webinars), Moodle learning environment, video hosting, etc.Discussion and Conclusions. The study of digital footprints is a promising area. The advantages of this approach include: the ability to declare oneself as a research scientist; active search for like-minded people on the Internet; understanding the area of scientific interest; the possibility of receiving feedback, incl. advice from the professional community.
APA, Harvard, Vancouver, ISO, and other styles
23

Poell, Thomas, David Nieborg, and José Van Dijck. "PLATFORM POWER & PUBLIC VALUE." AoIR Selected Papers of Internet Research, February 2, 2020. http://dx.doi.org/10.5210/spir.v2018i0.10501.

Full text
Abstract:
This paper offers an analytical framework to critically examine the power relations that structure the online platform ecosystem. Following a relational understanding of power, it focuses on the connections between the five leading platform corporations - Alphabet-Google, Apple, Facebook, Amazon, and Microsoft (GAFAM) - and the many other digital properties (i.e. platforms, websites, and apps) that populate the online ecosystem. Exploring these connections, we notice that a growing number of digital properties are integrated with, and increasingly dependent on the infrastructural services offered by the GAFAM platforms. These services include: advertising networks, login services, cloud hosting, app stores, payment systems, data analytics, video hosting, geospatial and navigation services, search functionalities, and operating systems. Such infrastructural services allow a wide variety of companies to make their products and services available online, attract and target users, analyze their activities, and generate revenue. It is through the ubiquitous integration and consistent use of these infrastructural services that platform power emerges and is consolidated. To demonstrate how such power relations can be analyzed, the paper highlights two key infrastructural services: app stores and ad networks. For each service it discusses two levels of analysis that can be pursued to gain insight in the workings of platform power. Ultimately a systematically analysis of the key infrastructural services will need to be developed to arrive at a refined taxonomy of platform power relations. Such taxonomy is essential to establish guidelines for governing the platform ecosystem in correspondence with key public values.
APA, Harvard, Vancouver, ISO, and other styles
24

Kaustubh J. Dalvi, Digvijay Y. Khalate, Suprit S. Halgunaki, Sandip S. Jadhav, Prof. T. A. Dhumal, and Kapil S. Chandekar. "Review of Case Study of Q. Finder - Real-Time Interface to Fetch Questions from YT Live Stream." International Journal of Advanced Research in Science, Communication and Technology, June 15, 2022, 49–51. http://dx.doi.org/10.48175/ijarsct-4769.

Full text
Abstract:
Nowadays, all over the planet embedding live streaming YouTube video in our own responsive web site. Embedding videos is simply like making backlinks to your website. Like in SEO (Search Engine Optimization), embedding your videos in a very website behaves specifically sort of a back link and so facultative your videos to urge placed in program results and find a lot of views. A lot of number of views our videos receive, our video quality and complete image increase too. Not solely video quality, your product and website quality too increase so increasing your sales and profits. Video embedding is the method of adding a video player to our web site victimization of an internet video platform. There are several web sites that are building their own social media platforms, so it is as easy as copying and pasting a link. Video inserting works by adding associate degree embed code from your video hosting platform to the code of your web site. It permits you to integrate live streaming on our website. Ranking is to be provided for live chat of the live video stream. Relevance ranking is the process of sorting the chats so that those Questions which are most likely to be relevant to the topic are shown at the top of the chat window with the answer.
APA, Harvard, Vancouver, ISO, and other styles
25

Salikin, Hairus, Agung Tri Wahyuningsih, and Sofya Poerwanta. "Indonesian Beauty Vloggers’ Use of English and Its Influence towards its Viewers’ Purchase Intention." International Journal of Current Science Research and Review 06, no. 01 (January 3, 2023). http://dx.doi.org/10.47191/ijcsrr/v6-i1-02.

Full text
Abstract:
Vlog or video blog is now booming along with the existence of YouTube. In Indonesia, YouTube is a third rank of most visiting website in Indonesia (https://www.alexa.com/topsites/countries/ID). This social media platform is advantageously employed to filming the actions which are easily accessed by public and it offers free video hosting which means vloggers may post unlimited videos without paying web hosting fees. Some vloggers perform videos for fun while others display for revenue generating through advertisements. Westenberg (cited in Subramani & Rajagopalan, 2003:302) mentions that YouTubers are influential in encouraging trial and adoption of new products and services. In line with Westenberg’s idea, Edward (2011:11) adds that “interactive advertising can be targeted in more sophisticated ways than print ads, we must recognize that power of social media as means of persuasion is far beyond that of another vehicle in which to serve advertising.” These two complementary propositions interest the researchers to conduct a deeper investigation about some vlogs on YouTube with the other variable of parameter, English use. The use of English gives efficacious consequence on advertisements. Biswal (2009:32) strongly mentioned that the use of two languages attracts consumers. Thus, capturing the four Indonesian beauty vloggers, assorted by the two who frequently insert some English codes and the other two who rarely interpolate them, as the object of research, this current investigation examines its use and influence towards viewers’ purchase intention. Questionnaire as helpful instrument is going to be delivered to viewers to see their purchase intention based on the indicators proposed by Schiffman and Kanuk (2009). The result shows that English codes do not significantly influence the viewers’ purchase intention. Viewers prefer beauty vlogs which are variously performed (not monotonous), humorously presented, and politely language-used. Besides, the content of the vlogs should be novel and honest.
APA, Harvard, Vancouver, ISO, and other styles
26

Suratno, Tri. "PEMANFAATAN SISTEM INFORMASI DAN TEKNOLOGI INFORMASI UNTUK MENUNJANG E-AGRIBISNIS." Jurnal Ilmiah Sosio-Ekonomika Bisnis 16, no. 1 (February 17, 2013). http://dx.doi.org/10.22437/jiseb.v16i1.2772.

Full text
Abstract:
Tulisan ini bertujuan untuk mengetahui pemanfaatan sistem informasi dan teknologi informasi dalam menunjang ecommerce atau dalam bidang pertanian disebut e-agribisnis. Penggunaan e-agribusiness dalam dunia pertanian digunakan untuk kegiatan pertanian yang memanfaatkan sistem informasi dan teknologi informasi. Untuk membuat aplikasi e-agribusiness dapat memanfaatkan aplikasi web yang open source, sehingga untuk pembuatan program e-agribusiness tidak membutuhkan biaya yang relatif besar, aplikasi web yang digunakan berupa sistem manajemen konten, seperti joomla, drupal, wordpress dan lain.lain. Dalam sistem manajemen konten ini, pengguna dapat menambah, mengedit, mengelola, dan memasukan konten-konten yang ada seperti teks, grafis, video, dokumen, bahkan dapat melayout ulang web yang dibuat. Setelah membuat web menggunakan sistem manajemen konten, selanjutnya menentukan nama domain dan hosting. Domain adalah sebuah alamat, yang dapat diakses oleh pengunjung situs. Misalnya www.google.com, www.deptan.com domain berfungsi sebagai alamat dan sekaligus sebagai brand (merek) dari sebuah perusahaan, sehingga apabila nama domain mudah di ingat dan di kenal, akan mempengaruhi pengguna mengunjungi situs. Hosting berfungsi sebagai tempat menyimpan semua data-data yang berhubungan dengan website. Hosting terhubung dengan internet selama 24 jam sehingga pengguna yang ingin melihat website dapat mengunjunginya kapan saja. Dalam menerapkan e-agribusiness diharapkan dapat menggunakan aplikasi web yang sudah ada seperti sistem manajemen konten, sehingga pengguna yang mengelola e-agribusiness dapat membangun e-agribusiness sendiri. Kata Kunci : Sistem, teknologi, Informasi, e-agribusiness, e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
27

Riaz, Mohammad, Rachel Phing HO, Benjie Tang, and Afshin Alijani. "SP2.1.9Augmented terminal feedback influences cognitive ability of surgical trainees: a randomised controlled trial." British Journal of Surgery 108, Supplement_7 (October 1, 2021). http://dx.doi.org/10.1093/bjs/znab361.029.

Full text
Abstract:
Abstract Introduction Formative assessments in the form of Global assessment (GAS) and procedural based assessment (PBA) are the current methods used for feedback in British laparoscopic surgical training. Video error signature feedback (VESF) has been proposed as an alternative approach to enhance motor skills in laparoscopic training through influencing cognitive approach. Methods Twenty laparoscopic novice students were randomised into Current standard feedback (CSF) and VESF groups. Both groups tied laparoscopic double square knots in four sequential stages. Standard human reliability assessment method (HRA) was utilised to assess unedited video recordings for errors. A validated scoring system by expert trainers assessed proficiency gain. Similar assessment was performed for both groups. Unedited video recordings of the VESF group were annotated for errors at each stage and provided as feedback through video hosting website. CSF group received assessment sheet as their feedback, comparable to current practice. Error numbers, time execution and proficiency gain were the outcomes. Inter-rater reliability among trainers for error detection was established. Results A total of 6490 movements were studied with 1613 errors detected. VESF group committed significantly less errors as compared to the CSF group [1011/1613 (63%) vs 602/1613 (37%), p &lt; 0.01]. VESF group gained proficiency earlier. Time execution was similar. Inter-rater reliability for error detection was high (p = 0.96). Discussion VESF effects cognitive framework of a laparoscopic task in trainee’s mind, ultimately reducing errors. This work demonstrated the practical application of video error signature feedback by demonstrating a simple laparoscopic task and analysing its learning process through novice brains.
APA, Harvard, Vancouver, ISO, and other styles
28

Lima, Ana Marina, and Beatriz Casais. "Consumer reactions towards femvertising: a netnographic study." Corporate Communications: An International Journal ahead-of-print, ahead-of-print (April 29, 2021). http://dx.doi.org/10.1108/ccij-02-2021-0018.

Full text
Abstract:
PurposeThis paper identifies consumer reactions towards female empowerment in advertising in order to explore the supporting arguments for criticisms of lack of authenticity and the figuring of sexist stereotypes.Design/methodology/approachThe authors conducted a multi-case study research with content analysis of 905 coded online comments in a video hosting website towards four femvertising campaigns.FindingsResults indicate that femvertising plays an important role in the emotional connection between women and brands, but consumers may react negatively to femvertising when brands do not show knowledge about the real feminist values, maintaining sexist stereotypes. Consumers also blame companies of hypocrite and exploitation to sell products if there is not authenticity and brand-cause fit.Originality/valueFemvertising appears as a consequence of cultural changes and corporate social responsibility in order to engage women consumers. This paper contributes with explanations to sustain the dichotomic reactions towards femvertising, showing evidence of why some people react favourably and other people react negatively.
APA, Harvard, Vancouver, ISO, and other styles
29

Organisciak, Peter, Kathleen Reed, and Alicia Hibbert. "Shortcuts and Dead Ends: Control Issues With Online User-Generated Content." Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI, October 22, 2013. http://dx.doi.org/10.29173/cais391.

Full text
Abstract:
Increasingly, internet users are creating and sharing content through a variety of socially-based websites. This includes sharing images, videos, stories, diary-like text, and personal information with others. With all of this information being created, what happens to user content once it has been uploaded to a site and effectively removed from the user's hands? We set out to explore this question within some of the popular user content hosting sites on the Internet. In doing so, we discovered a flawed paradigm wherein sites offer little guarantees as to service, but limit the precautionary measures that users can take themselves.De plus en plus, les internautes créent et partagent du contenu sur des sites web sociaux, notamment des images, des vidéos, des histoires, des entrées de journaux « intime » et des renseignements personnels. Par contre, qu'arrive-t-il lorsque le contenu de l'utilisateur est placé sur un site, hors du contrôle du créateur? Nous avons décidé d'explorer cette question sur certains sites sociaux populaires. Les résultats démontrent un paradigme imparfait où les sites offrent peu de garanties de service, mais limitent les mesures de précaution que peuvent prendre les utilisateurs.
APA, Harvard, Vancouver, ISO, and other styles
30

Cowley, Laura Elizabeth, C. Verity Bennett, Isabelle Brown, Alan Emond, and Alison Mary Kemp. "Mixed-methods process evaluation of SafeTea: a multimedia campaign to prevent hot drink scalds in young children and promote burn first aid." Injury Prevention, October 22, 2020, injuryprev—2020–043909. http://dx.doi.org/10.1136/injuryprev-2020-043909.

Full text
Abstract:
ObjectivesSafeTea is a multifaceted intervention delivered by community practitioners to prevent hot drink scalds to young children and improve parents’ knowledge of appropriate burn first aid. We adapted SafeTea for a national multimedia campaign, and present a mixed-methods process evaluation of the campaign.MethodsWe used social media, a website hosting downloadable materials and media publicity to disseminate key messages to parents/caregivers of young children and professionals working with these families across the UK. The SafeTea campaign was launched on National Burns Awareness Day (NBAD), October 2019, and ran for 3 months. Process evaluation measurements included social media metrics, Google Analytics, and quantitative and qualitative results from a survey of professionals who requested hard copies of the materials via the website.ResultsFindings were summarised under four themes: ‘reach’, ‘engagement’, ‘acceptability’ and ‘impact/behavioural change’. The launch on NBAD generated widespread publicity. The campaign reached a greater number of the target audience than anticipated, with over 400 000 views of the SafeTea educational videos. Parents and professionals engaged with SafeTea and expressed positive opinions of the campaign and materials. SafeTea encouraged parents to consider how to change their behaviours to minimise the risks associated with hot drinks. Reach and engagement steadily declined after the first month due to reduced publicity and social media promotion.ConclusionThe SafeTea campaign was successful in terms of reach and engagement. The launch on NBAD was essential for generating media interest. Future campaigns could be shorter, with more funding for additional social media content and promotion.
APA, Harvard, Vancouver, ISO, and other styles
31

Pace, Steven. "Revisiting Mackay Online." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1527.

Full text
Abstract:
IntroductionIn July 1997, the Mackay campus of Central Queensland University hosted a conference with the theme Regional Australia: Visions of Mackay. It was the first academic conference to be held at the young campus, and its aim was to provide an opportunity for academics, business people, government officials, and other interested parties to discuss their visions for the development of Mackay, a regional community of 75,000 people situated on the Central Queensland coast (Danaher). I delivered a presentation at that conference and authored a chapter in the book that emerged from its proceedings. The chapter entitled “Mackay Online” explored the potential impact that the Internet could have on the Mackay region, particularly in the areas of regional business, education, health, and entertainment (Pace). Two decades later, how does the reality compare with that vision?Broadband BluesAt the time of the Visions of Mackay conference, public commercial use of the Internet was in its infancy. Many Internet services and technologies that users take for granted today were uncommon or non-existent then. Examples include online video, video-conferencing, Voice over Internet Protocol (VoIP), blogs, social media, peer-to-peer file sharing, payment gateways, content management systems, wireless data communications, smartphones, mobile applications, and tablet computers. In 1997, most users connected to the Internet using slow dial-up modems with speeds ranging from 28.8 Kbps to 33.6 Kbps. 56 Kbps modems had just become available. Lamenting these slow data transmission speeds, I looked forward to a time when widespread availability of high-bandwidth networks would allow the Internet’s services to “expand to include electronic commerce, home entertainment and desktop video-conferencing” (Pace 103). Although that future eventually arrived, I incorrectly anticipated how it would arrive.In 1997, Optus and Telstra were engaged in the rollout of hybrid fibre coaxial (HFC) networks in Sydney, Melbourne, and Brisbane for the Optus Vision and Foxtel pay TV services (Meredith). These HFC networks had a large amount of unused bandwidth, which both Telstra and Optus planned to use to provide broadband Internet services. Telstra's Big Pond Cable broadband service was already available to approximately one million households in Sydney and Melbourne (Taylor), and Optus was considering extending its cable network into regional Australia through partnerships with smaller regional telecommunications companies (Lewis). These promising developments seemed to point the way forward to a future high-bandwidth network, but that was not the case. A short time after the Visions of Mackay conference, Telstra and Optus ceased the rollout of their HFC networks in response to the invention of Asynchronous Digital Subscriber Line (ADSL), a technology that increases the bandwidth of copper wire and enables Internet connections of up to 6 Mbps over the existing phone network. ADSL was significantly faster than a dial-up service, it was broadly available to homes and businesses across the country, and it did not require enormous investment in infrastructure. However, ADSL could not offer speeds anywhere near the 27 Mbps of the HFC networks. When it came to broadband provision, Australia seemed destined to continue playing catch-up with the rest of the world. According to data from the Organisation for Economic Cooperation and Development (OECD), in 2009 Australia ranked 18th in the world for broadband penetration, with 24.1 percent of Australians having a fixed-line broadband subscription. Statistics like these eventually prompted the federal government to commit to the deployment of a National Broadband Network (NBN). In 2009, the Kevin Rudd Government announced that the NBN would combine fibre-to-the-premises (FTTP), fixed wireless, and satellite technologies to deliver Internet speeds of up to 100 Mbps to 90 percent of Australian homes, schools, and workplaces (Rudd).The rollout of the NBN in Mackay commenced in 2013 and continued, suburb by suburb, until its completion in 2017 (Frost, “Mackay”; Garvey). The rollout was anything but smooth. After a change of government in 2013, the NBN was redesigned to reduce costs. A mixed copper/optical technology known as fibre-to-the-node (FTTN) replaced FTTP as the preferred approach for providing most NBN connections. The resulting connection speeds were significantly slower than the 100 Mbps that was originally proposed. Many Mackay premises could only achieve a maximum speed of 40 Mbps, which led to some overcharging by Internet service providers, and subsequent compensation for failing to deliver services they had promised (“Optus”). Some Mackay residents even complained that their new NBN connections were slower than their former ADSL connections. NBN Co representatives claimed that the problems were due to “service providers not buying enough space in the network to provide the service they had promised to customers” (“Telcos”). Unsurprisingly, the number of complaints about the NBN that were lodged with the Telecommunications Industry Ombudsman skyrocketed during the last six months of 2017. Queensland complaints increased by approximately 40 percent when compared with the same period during the previous year (“Qld”).Despite the challenges presented by infrastructure limitations, the rollout of the NBN was a boost for the Mackay region. For some rural residents, it meant having reliable Internet access for the first time. Frost, for example, reports on the experiences of a Mackay couple who could not get an ADSL service at their rural home because it was too far away from the nearest telephone exchange. Unreliable 3G mobile broadband was the only option for operating their air-conditioning business. All of that changed with the arrival of the NBN. “It’s so fast we can run a number of things at the same time”, the couple reported (“NBN”).Networking the NationOne factor that contributed to the uptake of Internet services in the Mackay region after the Visions of Mackay conference was the Australian Government’s Networking the Nation (NTN) program. When the national telecommunications carrier Telstra was partially privatised in 1997, and further sold in 1999, proceeds from the sale were used to fund an ambitious communications infrastructure program named Networking the Nation (Department of Communications, Information Technology and the Arts). The program funded projects that improved the availability, accessibility, affordability, and use of communications facilities and services throughout regional Australia. Eligibility for funding was limited to not-for-profit organisations, including local councils, regional development organisations, community groups, local government associations, and state and territory governments.In 1998, the Mackay region received $930,000 in Networking the Nation funding for Mackay Regionlink, a project that aimed to provide equitable community access to online services, skills development for local residents, an affordable online presence for local business and community organisations, and increased external awareness of the Mackay region (Jewell et al.). One element of the project was a training program that provided basic Internet skills to 2,168 people across the region over a period of two years. A second element of the project involved the establishment of 20 public Internet access centres in locations throughout the region, such as libraries, community centres, and tourist information centres. The centres provided free Internet access to users and encouraged local participation and skill development. More than 9,200 users were recorded in these centres during the first year of the project, and the facilities remained active until 2006. A third element of the project was a regional web portal that provided a free easily-updated online presence for community organisations. The project aimed to have every business and community group in the Mackay region represented on the website, with hosting fees for the business web pages funding its ongoing operation and development. More than 6,000 organisations were listed on the site, and the project remained financially viable until 2005.The availability, affordability and use of communications facilities and services in Mackay increased significantly during the period of the Regionlink project. Changes in technology, services, markets, competition, and many other factors contributed to this increase, so it is difficult to ascertain the extent to which Mackay Regionlink fostered those outcomes. However, the large number of people who participated in the Regionlink training program and made use of the public Internet access centres, suggests that the project had a positive influence on digital literacy in the Mackay region.The Impact on BusinessThe Internet has transformed regional business for both consumers and business owners alike since the Visions of Mackay conference. When Mackay residents made a purchase in 1997, their choice of suppliers was limited to a few local businesses. Today they can shop online in a global market. Security concerns were initially a major obstacle to the growth of electronic commerce. Consumers were slow to adopt the Internet as a place for doing business, fearing that their credit card details would be vulnerable to hackers once they were placed online. After observing the efforts that finance and software companies were making to eliminate those obstacles, I anticipated that it would only be a matter of time before online transactions became commonplace:Consumers seeking a particular product will be able to quickly find the names of suitable suppliers around the world, compare their prices, and place an order with the one that can deliver the product at the cheapest price. (Pace 106)This expectation was soon fulfilled by the arrival of online payment systems such as PayPal in 1998, and online shopping services such as eBay in 1997. eBay is a global online auction and shopping website where individuals and businesses buy and sell goods and services worldwide. The eBay service is free to use for buyers, but sellers are charged modest fees when they make a sale. It exemplifies the notion of “friction-free capitalism” articulated by Gates (157).In 1997, regional Australian business owners were largely sceptical about the potential benefits the Internet could bring to their businesses. Only 11 percent of Australian businesses had some form of web presence, and less than 35 percent of those early adopters felt that their website was significant to their business (Department of Industry, Science and Tourism). Anticipating the significant opportunities that the Internet offered Mackay businesses to compete in new markets, I recommended that they work “towards the goal of providing products and services that meet the needs of international consumers as well as local ones” (107). In the two decades that have passed since that time, many Mackay businesses have been doing just that. One prime example is Big on Shoes (bigonshoes.com.au), a retailer of ladies’ shoes from sizes five to fifteen (Plane). Big on Shoes has physical shopfronts in Mackay and Moranbah, an online store that has been operating since 2009, and more than 12,000 followers on Facebook. This speciality store caters for women who have traditionally been unable to find shoes in their size. As the store’s customer base has grown within Australia and internationally, an unexpected transgender market has also emerged. In 2018 Big on Shoes was one of 30 regional businesses featured in the first Facebook and Instagram Annual Gift Guide, and it continues to build on its strengths (Cureton).The Impact on HealthThe growth of the Internet has improved the availability of specialist health services for people in the Mackay region. Traditionally, access to surgical services in Mackay has been much more limited than in metropolitan areas because of the shortage of specialists willing to practise in regional areas (Green). In 2003, a senior informant from the Royal Australasian College of Surgeons bluntly described the Central Queensland region from Mackay to Gladstone as “a black hole in terms of surgery” (Birrell et al. 15). In 1997 I anticipated that, although the Internet would never completely replace a visit to a local doctor or hospital, it would provide tools that improve the availability of specialist medical services for people living in regional areas. Using these tools, doctors would be able to “analyse medical images captured from patients living in remote locations” and “diagnose patients at a distance” (Pace 108).These expectations have been realised in the form of Queensland Health’s Telehealth initiative, which permits medical specialists in Brisbane and Townsville to conduct consultations with patients at the Mackay Base Hospital using video-conference technology. Telehealth reduces the need for patients to travel for specialist advice, and it provides health professionals with access to peer support. Averill (7), for example, reports on the experience of a breast cancer patient at the Mackay Base Hospital who was able to participate in a drug trial with a Townsville oncologist through the Telehealth network. Mackay health professionals organised the patient’s scans, administered blood tests, and checked her lymph nodes, blood pressure and weight. Townsville health professionals then used this information to advise the Mackay team about her ongoing treatment. The patient expressed appreciation that the service allowed her to avoid the lengthy round-trip to Townsville. Prior to being offered the Telehealth option, she had refused to participate in the trial because “the trip was just too much of a stumbling block” (Averill 7).The Impact on Media and EntertainmentThe field of media and entertainment is another aspect of regional life that has been reshaped by the Internet since the Visions of Mackay conference. Most of these changes have been equally apparent in both regional and metropolitan areas. Over the past decade, the way individuals consume media has been transformed by new online services offering user-generated video, video-on-demand, and catch-up TV. These developments were among the changes I anticipated in 1997:The convergence of television and the Internet will stimulate the creation of new services such as video-on-demand. Today television is a synchronous media—programs are usually viewed while they are being broadcast. When high-quality video can be transmitted over the information superhighway, users will be able to watch what they want, when and where they like. […] Newly released movies will continue to be rented, but probably not from stores. Instead, consumers will shop on the information superhighway for movies that can be delivered on demand.In the mid-2000s, free online video-sharing services such as YouTube and Vimeo began to emerge. These websites allow users to freely upload, view, share, comment on, and curate online videos. Subscription-based streaming services such as Netflix and Amazon Prime have also become increasingly popular since that time. These services offer online streaming of a library of films and television programs for a fee of less than 20 dollars per month. Computers, smart TVs, Blu-ray players, game consoles, mobile phones, tablets, and other devices provide a multitude of ways of accessing streaming services. Some of these devices cost less than 100 dollars, while higher-end electronic devices include the capability as a bundled feature. Netflix became available in Mackay at the time of its Australian launch in 2015. The growth of streaming services greatly reduced the demand for video rental shops in the region, and all closed down as a result. The last remaining video rental store in Mackay closed its doors in 2018 after trading for 26 years (“Last”).Some of the most dramatic transformations that have occurred the field of media and entertainment were not anticipated in 1997. The rise of mobile technology, including wireless data communications, smartphones, mobile applications, and tablet computers, was largely unforeseen at that time. Some Internet luminaries such as Vinton Cerf expected that mobile access to the Internet via laptop computers would become commonplace (Lange), but this view did not encompass the evolution of smartphones, and it was not widely held. Similarly, the rise of social media services and the impact they have had on the way people share content and communicate was generally unexpected. In some respects, these phenomena resemble the Black Swan events described by Nassim Nicholas Taleb (xvii)—surprising events with a major effect that are often inappropriately rationalised after the fact. They remind us of how difficult it is to predict the future media landscape by extrapolating from things we know, while failing to take into consideration what we do not know.The Challenge for MackayIn 1997, when exploring the potential impact that the Internet could have on the Mackay region, I identified a special challenge that the community faced if it wanted to be competitive in this new environment:The region has traditionally prospered from industries that control physical resources such as coal, sugar and tourism, but over the last two decades there has been a global ‘shift away from physical assets and towards information as the principal driver of wealth creation’ (Petre and Harrington 1996). The risk for Mackay is that its residents may be inclined to believe that wealth can only be created by means of industries that control physical assets. The community must realise that its value-added information is at least as precious as its abundant natural resources. (110)The Mackay region has not responded well to this challenge, as evidenced by measures such as the Knowledge City Index (KCI), a collection of six indicators that assess how well a city is positioned to grow and advance in today’s technology-driven, knowledge-based economy. A 2017 study used the KCI to conduct a comparative analysis of 25 Australian cities (Pratchett, Hu, Walsh, and Tuli). Mackay rated reasonably well in the areas of Income and Digital Access. But the city’s ratings were “very limited across all the other measures of the KCI”: Knowledge Capacity, Knowledge Mobility, Knowledge Industries and Smart Work (44).The need to be competitive in a technology-driven, knowledge-based economy is likely to become even more pressing in the years ahead. The 2017 World Energy Outlook Report estimated that China’s coal use is likely to have peaked in 2013 amid a rapid shift toward renewable energy, which means that demand for Mackay’s coal will continue to decline (International Energy Agency). The sugar industry is in crisis, finding itself unable to diversify its revenue base or increase production enough to offset falling global sugar prices (Rynne). The region’s biggest tourism drawcard, the Great Barrier Reef, continues to be degraded by mass coral bleaching events and ongoing threats posed by climate change and poor water quality (Great Barrier Reef Marine Park Authority). All of these developments have disturbing implications for Mackay’s regional economy and its reliance on coal, sugar, and tourism. Diversifying the local economy through the introduction of new knowledge industries would be one way of preparing the Mackay region for the impact of new technologies and the economic challenges that lie ahead.ReferencesAverill, Zizi. “Webcam Consultations.” Daily Mercury 22 Nov. 2018: 7.Birrell, Bob, Lesleyanne Hawthorne, and Virginia Rapson. The Outlook for Surgical Services in Australasia. Melbourne: Monash University Centre for Population and Urban Research, 2003.Cureton, Aidan. “Big Shoes, Big Ideas.” Daily Mercury 8 Dec. 2018: 12.Danaher, Geoff. Ed. Visions of Mackay: Conference Papers. Rockhampton: Central Queensland UP, 1998.Department of Communications, Information Technology and the Arts. Networking the Nation: Evaluation of Outcomes and Impacts. Canberra: Australian Government, 2005.Department of Industry, Science and Tourism. Electronic Commerce in Australia. Canberra: Australian Government, 1998.Frost, Pamela. “Mackay Is Up with Switch to Speed to NBN.” Daily Mercury 15 Aug. 2013: 8.———. “NBN Boost to Business.” Daily Mercury 29 Oct. 2013: 3.Gates, Bill. The Road Ahead. New York: Viking Penguin, 1995.Garvey, Cas. “NBN Rollout Hit, Miss in Mackay.” Daily Mercury 11 Jul. 2017: 6.Great Barrier Reef Marine Park Authority. Reef Blueprint: Great Barrier Reef Blueprint for Resilience. Townsville: Great Barrier Reef Marine Park Authority, 2017.Green, Anthony. “Surgical Services and Referrals in Rural and Remote Australia.” Medical Journal of Australia 177.2 (2002): 110–11.International Energy Agency. World Energy Outlook 2017. France: IEA Publications, 2017.Jewell, Roderick, Mary O’Flynn, Fiorella De Cindio, and Margaret Cameron. “RCM and MRL—A Reflection on Two Approaches to Constructing Communication Memory.” Constructing and Sharing Memory: Community Informatics, Identity and Empowerment. Eds. Larry Stillman and Graeme Johanson. Newcastle: Cambridge Scholars Publishing, 2007. 73–86.Lange, Larry. “The Internet: Where’s It All Going?” Information Week 17 Jul. 1995: 30.“Last Man Standing Shuts Doors after 26 Years of Trade.” Daily Mercury 28 Aug. 2018: 7.Lewis, Steve. “Optus Plans to Share Cost Burden.” Australian Financial Review 22 May 1997: 26.Meredith, Helen. “Time Short for Cable Modem.” Australian Financial Review 10 Apr. 1997: 42Nassim Nicholas Taleb. The Black Swan: The Impact of the Highly Improbable. New York: Random House, 2007.“Optus Offers Comp for Slow NBN.” Daily Mercury 10 Nov. 2017: 15.Organisation for Economic Cooperation and Development. “Fixed Broadband Subscriptions.” OECD Data, n.d. <https://data.oecd.org/broadband/fixed-broadband-subscriptions.htm>.Pace, Steven. “Mackay Online.” Visions of Mackay: Conference Papers. Ed. Geoff Danaher. Rockhampton: Central Queensland University Press, 1998. 111–19.Petre, Daniel and David Harrington. The Clever Country? Australia’s Digital Future. Sydney: Lansdown Publishing, 1996.Plane, Melanie. “A Shoe-In for Big Success.” Daily Mercury 9 Sep. 2017: 6.Pratchett, Lawrence, Richard Hu, Michael Walsh, and Sajeda Tuli. The Knowledge City Index: A Tale of 25 Cities in Australia. Canberra: University of Canberra neXus Research Centre, 2017.“Qld Customers NB-uN Happy Complaints about NBN Service Double in 12 Months.” Daily Mercury 17 Apr. 2018: 1.Rudd, Kevin. “Media Release: New National Broadband Network.” Parliament of Australia Press Release, 7 Apr. 2009 <https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:"media/pressrel/PS8T6">.Rynne, David. “Revitalising the Sugar Industry.” Sugar Policy Insights Feb. 2019: 2–3.Taylor, Emma. “A Dip in the Pond.” Sydney Morning Herald 16 Aug. 1997: 12.“Telcos and NBN Co in a Crisis.” Daily Mercury 27 Jul. 2017: 6.
APA, Harvard, Vancouver, ISO, and other styles
32

Jefferson, Emily, Jenny Johnston, Gordon Milligan, and Phil Quinlan. "Developing a new Governance Approval Process to support federated discovery and meta-analysis of data across the UK through the CO-CONNECT project." International Journal of Population Data Science 7, no. 3 (August 25, 2022). http://dx.doi.org/10.23889/ijpds.v7i3.1799.

Full text
Abstract:
Objectives To develop a new approval process for federated data custodians to install and support a new platform which enables researchers to run from one website, instantaneous, aggregate-level queries to determine the number of patients in each dataset which meet their research criteria. To agree security controls across data custodians which protect patient confidentiality whilst also providing this new automated capability for researchers and reducing the burden on each data custodian to manually provide the information. ApproachThe COVID - Curated and Open aNalysis aNd rEsearCh plaTform (CO-CONNECT) has integrated a Cohort Discovery Tool into the Health Data Research (HDR) UK Innovation Gateway website and is connecting >50 different federated datasets. The underpinning architecture is novel, without precedent at such a scale in the UK. We found that although each data custodian recognised the benefits of the platform, many were unclear of the process to formally approve this new model. We have worked across data custodians to co-develop the required new processes and document the security controls. ResultsWe found vast differences in technical knowledge and infrastructures across different data custodians, especially across small research groups hosting data on consented research cohorts verses larger organisations who host and manage routinely collected data. A model for approvals evolved for these 2 separate groups: Consented research cohorts: a 2-stage process of a pre-assessment for the need for a DPIA and/or completed DPIA. All returned a positive outcome which deemed no personal identifiable information was being used. Unconsented population level data: 4 different documents were required each being approved by different committees within each data custodian: DPIA, Data Access Application, Security Risk Assessment, Disclosure Control Assessment. As the model was novel to many data custodians, we developed many different explainer videos and detailed step by step instructions. ConclusionWe recommend a new approvals process for new technologies/models is developed to support initiatives which are not covered by the traditional data access request process. Increased investment in teams which approve data governance and IT security applications which have been overwhelmed by the increased demand for their services to review COVID-19 related projects would be welcomed.
APA, Harvard, Vancouver, ISO, and other styles
33

Vasylenko, Valeriia. "Peculiarities of using web 2.0 technologies as the main tool of image sociocommunication technologies." Scientific journal “Library Science. Record Studies. Informology”, no. 1 (May 23, 2022). http://dx.doi.org/10.32461/2409-9805.1.2022.257262.

Full text
Abstract:
The purpose of the article is to define the features of the use of Web 2.0 technologies as the main tool of image socio-communication technologies of higher education institutions. The methodology of the research is based on the general scientific and special methods of cognition such as analysis, synthesis,logical method, monitoring, and the method of visualization of the research results. The scientific novelty is because Web 2.0 technologies are a modern tool for establishing social interaction between participants in the educational process. The peculiarities of using Web 2.0 technologies as the main tool of image sociocommunication technologies are determined. Conclusions. The prospects for the use of Web 2.0 technologies as the main tool for image socio-communication technologies of the university are determined: the presence of its own page in the encyclopedia "Wikipedia", which is intended to popularize the institution of higher education and inform the target audience of different countries of the world (submission of the text of articles in different languages); issuance of the university website for a search query in top search engines, which ensures credibility among potential consumers of educational services, advertising and promotion of educational services, as well as establishing information and communication relations with representatives of the target audience; corporate portal with internal communication systems as an opportunity to form an effective internal image of the university through the implementation of information openness and effective communication between participants in the educational process; interactive distancelearning using an electronic library and cloud services for teachers and students as an Internet platform to meet the information needs of scientists and teachers at a qualitatively new level, as well as the possibility of providing educational services to students with disabilities; information resources of social networks and the video hosting service "YouTube" as a tool that, due to its prevalence and popularity, can influence the consciousness of a significant number of the population, form and maintain an effective, sustainable and competitive image of the institution in them. The choice of presented SCT Web 2.0 is determined by the possibility of forming an effective image of the university, taking into account the information needs of the target audience.Key words: image, higher education institution, Web 2.0 technologies.
APA, Harvard, Vancouver, ISO, and other styles
34

"Preface." Journal of Physics: Conference Series 2145, no. 1 (December 1, 2021): 011001. http://dx.doi.org/10.1088/1742-6596/2145/1/011001.

Full text
Abstract:
The 16th SIAM PHYSICS CONGRESS (SPC2021) B Chatthong1,a, C Buranachai1,b, P Kalasuwan1,c, S Rakkapao1,d, C Putson1,e, B Soonthornthum2,3,f,g and S Aukkaravittayapun2,3,f,h 1Division of Physical Science, Faculty of Science, Prince of Songkla University, Songkhla, Thailand 2Thai Physics Society, Chiang Mai, Thailand 3National Astronomical Research Institute, Chiang Mai, Thailand Email: aboonyarit.ch@psu.ac.th, bchittanon.b@psu.ac.th, cpruet.k@psu.ac.th, dsuttida.r@psu.ac.th, echatchai.p@psu.ac.th, fthaiphysoc@gmail.com, gboonrucksar@narit.or.th, hsuparerk.a@narit.or.th The 16th Siam Physics Congress (SPC2021) was successfully held 100% online during May 24-25, 2021. Initially, the Thai Physics Society and Prince of Songkla University had planned to co-host the SPC2021 in Songkhla province in Southern part of Thailand via hybrid form. Unfortunately, due to the rise of coronavirus (COVID-19) pandemic cases in Thailand, the organizing committee had considered that physical conference would no longer be possible, and made 100% online decision. This is to keep up to the highest standard of health regulation and self-practice (from WHO) in avoiding the extremely serious pandemic. Consequently, the Thai Physics Society and Prince of Songkla University had facilitated and hosted the SPC2021 as national teleconference during May 24-25, 2021. This year, we had 185 research abstracts and papers submitted for both oral and poster online presentations. There were 1 plenary speaker, 25 invited speakers, 76 oral presentations, 83 poster presentations, and 99 full papers submitted for possible publication in all 21 tracks(topics). The scientific program was announced on the SPC2021 website (https://spc2021.sci.psu.ac.th/) and also distributed via email to all participants. The SPC2021 oral sessions were held via Zoom video conference. Participants can join online sessions either by using their individual Zoom account. The Zoom’s chat channel as well as professional management such as co-hosting the Zoom room from the host-side were employed to alleviate some glitches (e.g. delayed or unclear signals due to slow internet connection from the client-side). In addition, the chat channel was also used for exchanging contact details for further detailed discussion about the presentation. The online opening ceremony and plenary talk was live-broadcasted via Faculty of Science, Prince of Songkla University official Facebook page and YouTube account. After the online opening ceremony, a plenary talk entitled “Exploring the Universe with neutrinos and gravitational waves” by Professor Takaaki Kajita, 2015 Nobel Laureate in Physics from Institute for Cosmic Ray Research, The University of Tokyo, Tokyo, Japan, was given to the audience of approximately 200 participants. The oral presentations were arranged into 3 parallel Zoom rooms in total of 16 sessions. Each invited speaker was allowed 30-minute presentation while regular presenter had 15 minutes including questions and answers. The online audience-size of each room varied between 30 and 60 people. The poster presentations were uploaded onto the SPC2021 Indico website (https://indico.cern.ch/event/973315/), where only registered participants could access. In addition, all participants can login, access all abstracts as well as presentation materials, and submit the full paper. List of Editorial Materials, Logos are available in this pdf.
APA, Harvard, Vancouver, ISO, and other styles
35

Williams, Deborah Kay. "Hostile Hashtag Takeover: An Analysis of the Battle for Februdairy." M/C Journal 22, no. 2 (April 24, 2019). http://dx.doi.org/10.5204/mcj.1503.

Full text
Abstract:
We need a clear, unified, and consistent voice to effect the complete dismantling, the abolition, of the mechanisms of animal exploitation.And that will only come from what we say and do, no matter who we are.— Gary L. Francione, animal rights theoristThe history of hashtags is relatively short but littered with the remnants of corporate hashtags which may have seemed a good idea at the time within the confines of the boardroom. It is difficult to understand the rationale behind the use of hashtags as an effective communications tactic in 2019 by corporations when a quick stroll through their recent past leaves behind the much-derided #qantasluxury (Glance), #McDstories (Hill), and #myNYPD (Tran).While hashtags have an obvious purpose in bringing together like-minded publics and facilitating conversation (Kwye et al. 1), they have also regularly been the subject of “hashtag takeovers” by activists and other interested parties, and even by trolls, as the Ecological Society of Australia found in 2015 when their seemingly innocuous #ESA15 hashtag was taken over with pornographic images (news.com.au). Hashtag takeovers have also been used as a dubious marketing tactic, where smaller and less well-known brands tag their products with trending hashtags such as #iphone in order to boost their audience (Social Garden). Hashtags are increasingly used as a way for activists or other interested parties to disrupt a message. It is, I argue, predictable that any hashtag related to an even slightly controversial topic will be subject to some form of activist hashtag takeover, with varying degrees of success.That veganism and the dairy industry should attract such conflict is unsurprising given that the two are natural enemies, with vegans in particular seeming to anticipate and actively engage in the battle for the opposing hashtag.Using a comparative analysis of the #Veganuary and #Februdairy hashtags and how they have been used by both pro-vegan and pro-dairy social media users, this article illustrates that the enthusiastic and well-meaning social media efforts of farmers and dairy supporters have so far been unable to counteract those of well-organised and equally passionate vegan activists. This analysis compares tweets in the first week of the respective campaigns, concluding that organisations, industries and their representatives should be extremely wary of engaging said activists who are not only highly-skilled but are also highly-motivated. Grassroots, ideology-driven activism is a formidable opponent in any public space, let alone when it takes place on the outspoken and unstructured landscape of social media which is sometimes described as the “wild West” (Fitch 5) where anything goes and authenticity and plain-speaking is key (Macnamara 12).I Say Hashtag, You Say Bashtag#Februdairy was launched in 2018 to promote the benefits of dairy. The idea was first mooted on Twitter in 2018 by academic Dr Jude Capper, a livestock sustainability consultant, who called for “28 days, 28 positive dairy posts” (@Bovidiva; Howell). It was a response to the popular Veganuary campaign which aimed to “inspire people to try vegan for January and throughout the rest of the year”, a campaign which had gained significant traction both online and in the traditional media since its inception in 2014 (Veganuary). Hopes were high: “#Februdairy will be one month of dairy people posting, liking and retweeting examples of what we do and why we do it” (Yates). However, the #Februdairy hashtag has been effectively disrupted and has now entered the realm of a bashtag, a hashtag appropriated by activists for their own purpose (Austin and Jin 341).The Dairy Industry (Look Out the Vegans Are Coming)It would appear that the dairy industry is experiencing difficulties in public perception. While milk consumption is declining, sales of plant-based milks are increasing (Kaiserman) and a growing body of health research has questioned whether dairy products and milk in particular do in fact “do a body good” (Saccaro; Harvard Milk Study). In the 2019 review of Canada’s food guide, its first revision since 2007, for instance, the focus is now on eating plant-based foods with dairy’s former place significantly downgraded. Dairy products no longer have their own distinct section and are instead placed alongside other proteins including lentils (Pippus).Nevertheless, the industry has persevered with its traditional marketing and public relations activities, choosing to largely avoid addressing animal welfare concerns brought to light by activists. They have instead focused their message towards countering concerns about the health benefits of milk. In the US, the Milk Processing Education Program’s long-running celebrity-driven Got Milk campaign has been updated with Milk Life, a health focused campaign, featuring images of children and young people living an active lifestyle and taking part in activities such as skateboarding, running, and playing basketball (Milk Life). Interestingly, and somewhat inexplicably, Milk Life’s home page features the prominent headline, “How Milk Can Bring You Closer to Your Loved Ones”.It is somewhat reflective of the current trend towards veganism that tennis aces Serena and Venus Williams, both former Got Milk ambassadors, are now proponents for the plant-based lifestyle, with Venus crediting her newly-adopted vegan diet as instrumental in her recovery from an auto-immune disease (Mango).The dairy industry’s health focus continues in Australia, as well as the use of the word love, with former AFL footballer Shane Crawford—the face of the 2017 campaign Milk Loves You Back, from Lion Dairy and Drinks—focusing on reminding Australians of the reputed nutritional benefits of milk (Dawson).Dairy Australia meanwhile launched their Legendairy campaign with a somewhat different focus, promoting and lauding Australia’s dairy families, and with a message that stated, in a nod to the current issues, that “Australia’s dairy farmers and farming communities are proud, resilient and innovative” (Dairy Australia). This campaign could be perceived as a morale-boosting exercise, featuring a nation-wide search to find Australia’s most legendairy farming community (Dairy Australia). That this was also an attempt to humanise the industry seems obvious, drawing on established goodwill felt towards farmers (University of Cambridge). Again, however, this strategy did not address activists’ messages of suffering animals, factory farms, and newborn calves being isolated from their grieving mothers, and it can be argued that consumers are being forced to make the choice between who (or what) they care about more: animals or the people making their livelihoods from them.Large-scale campaigns like Legendairy which use traditional channels are of course still vitally important in shaping public opinion, with statistics from 2016 showing 85.1% of Australians continue to watch free-to-air television (Roy Morgan, “1 in 7”). However, a focus and, arguably, an over-reliance on traditional platforms means vegans and animal activists are often unchallenged when spreading their message via social media. Indeed, when we consider the breakdown in age groups inherent in these statistics, with 18.8% of 14-24 year-olds not watching any commercial television at all, an increase from 7% in 2008 (Roy Morgan, “1 in 7”), it is a brave and arguably short-sighted organisation or industry that relies primarily on traditional channels to spread their message in 2019. That these large-scale campaigns do little to address the issues raised by vegans concerning animal welfare leaves these claims largely unanswered and momentum to grow.This growth in momentum is fuelled by activist groups such as the People for the Ethical Treatment of Animals (PETA) who are well-known in this space, with 5,494,545 Facebook followers, 1.06 million Twitter followers, 973,000 Instagram followers, and 453,729 You Tube subscribers (People for the Ethical Treatment of Animals). They are also active on Pinterest, a visual-based platform suited to the kinds of images and memes particularly detrimental to the dairy industry. Although widely derided, PETA’s reach is large. A graphic video posted to Facebook on February 13 2019 and showing a suffering cow, captioned “your cheese is not worth this” was shared 1,244 times, and had 4.6 million views in just over 24 hours (People for the Ethical Treatment of Animals). With 95% of 12-24 year olds in Australia now using social networking sites (Statista), it is little wonder veganism is rapidly growing within this demographic (Bradbury), with The Guardian labelling the rise of veganism unstoppable (Hancox).Activist organisations are joined by prominent and charismatic vegan activists such as James Aspey (182,000 Facebook followers) and Earthling Ed (205,000 Facebook followers) in distributing information and images that are influential and often highly graphic or disturbing. Meanwhile Instagram influencers and You Tube lifestyle vloggers such as Ellen Fisher and FreeLee share information promoting vegan food and the vegan lifestyle (with 650,320 and 785,903 subscribers respectively). YouTube video Dairy Is Scary has over 5 million views (Janus) and What the Health, a follow-up documentary to Cowspiracy: The Sustainability Secret, promoting veganism, is now available on Netflix, which itself has 9.8 million Australian subscribers (Roy Morgan, “Netflix”). BOSH’s plant-based vegan cookbook was the fastest selling cookbook of 2018 (Chiorando).Additionally, the considerable influence of celebrities such as Miley Cyrus, Beyonce, Alicia Silverstone, Zac Efron, and Jessica Chastain, to name just a few, speaking publicly about their vegan lifestyle, encourages veganism to become mainstream and increases its widespread acceptance.However not all the dairy industry’s ills can be blamed on vegans. Rising costs, cheap imports, and other pressures (Lockhart, Donaghy and Gow) have all placed pressure on the industry. Nonetheless, in the battle for hearts and minds on social media, the vegans are leading the way.Qualitative research interviewing new vegans found converting to veganism was relatively easy, yet some respondents reported having to consult multiple resources and required additional support and education on how to be vegan (McDonald 17).Enter VeganuaryUsing a month, week or day to promote an idea or campaign, is a common public relations and marketing strategy, particularly in health communications. Dry July and Ocsober both promote alcohol abstinence, Frocktober raises funds for ovarian cancer, and Movember is an annual campaign raising awareness and funds for men’s health (Parnell). Vegans Matthew Glover and Jane Land were discussing the success of Movember when they raised the idea of creating a vegan version. Their initiative, Veganuary, urging people to try vegan for the month of January, launched in 2014 and since then 500,000 people have taken the Veganuary pledge (Veganuary).The Veganuary website is the largest of its kind on the internet. With vegan recipes, expert advice and information, it provides all the answers to Why go vegan, but it is the support offered to answer How to go vegan that truly sets Veganuary apart. (Veganuary)That Veganuary participants would use social media to discuss and share their experiences was a foregone conclusion. Twitter, Facebook, and Instagram are all utilised by participants, with the official Veganuary pages currently followed/liked by 159,000 Instagram followers, receiving 242,038 Facebook likes, and 45,600 Twitter followers (Veganuary). Both the Twitter and Instagram sites make effective use of hashtags to spread their reach, not only using #Veganuary but also other relevant hashtags such as #TryVegan, #VeganRecipes, and the more common #Vegan, #Farm, and #SaveAnimals.Februdairy Follows Veganuary, But Only on the CalendarCalling on farmers and dairy producers to create counter content and their own hashtag may have seemed like an idea that would achieve an overall positive response.Agricultural news sites and bloggers spread the word and even the BBC reported on the industry’s “fight back” against Veganuary (BBC). However the hashtag was quickly overwhelmed with anti-dairy activists mobilising online. Vegans issued a call to arms across social media. The Vegans in Australia Facebook group featured a number of posts urging its 58,949 members to “thunderclap” the Februdairy hashtag while the Project Calf anti-dairy campaign declared that Februdairy offered an “easy” way to spread their information (Sandhu).Februdairy farmers and dairy supporters were encouraged to tell their stories, sharing positive photographs and videos, and they did. However this content was limited. In this tweet (fig. 1) the issue of a lack of diverse content was succinctly addressed by an anti-Februdairy activist.Fig. 1: Content challenges. (#Februdairy, 2 Feb. 2019)MethodUtilising Twitter’s advanced search capability, I was able to search for #Veganuary tweets from 1 to 7 January 2019 and #Februdairy tweets from 1 to 7 February 2019. I analysed the top tweets provided by Twitter in terms of content, assessed whether the tweet was pro or anti Veganuary and Februdairy, and also categorised its content in terms of subject matter.Tweets were analysed to assess whether they were on message and aligned with the values of their associated hashtag. Veganuary tweets were considered to be on message if they promoted veganism or possessed an anti-dairy, anti-meat, or pro-animal sentiment. Februdairy tweets were assessed as on message if they promoted the consumption of dairy products, expressed sympathy or empathy towards the dairy industry, or possessed an anti-vegan sentiment. Tweets were also evaluated according to their clarity, emotional impact and coherence. The overall effectiveness of the hashtag was then evaluated based on the above criteria as well as whether they had been hijacked.Results and FindingsOverwhelmingly, the 213 #Veganuary tweets were on message. That is they were pro-Veganuary, supportive of veganism, and positive. The topics were varied and included humorous memes, environmental facts, information about the health benefits of veganism, as well as a strong focus on animals. The number of non-graphic tweets (12) concerning animals was double that of tweets featuring graphic or shocking imagery (6). Predominantly the tweets were focused on food and the sharing of recipes, with 44% of all pro #Veganuary tweets featuring recipes or images of food. Interestingly, a number of well-known corporations tweeted to promote their vegan food products, including Tesco, Aldi, Iceland, and M&S. The diversity of veganism is reflected in the tweets. Organisations used the hashtag to promote their products, including beauty and shoe products, social media influencers promoted their vegan podcasts and blogs, and, interestingly, the Ethiopian Embassy of the United Kingdom tweeted their support.There were 23 (11%) anti-Veganuary tweets. Of these, one was from Dr. Jude Capper, the founder of Februdairy. The others expressed support for farming and farmers, and a number were photographs of meat products, including sausages and fry-ups. One Australian journalist tweeted in favour of meat, stating it was yummy murder. These tweets could be described as entertaining and may perhaps serve as a means of preaching to the converted, but their ability to influence and persuade is negligible.Twitter’s search tool provided access to 141 top #Februdairy tweets. Of these 82 (52%) were a hijack of the hashtag and overtly anti-Februdairy. Vegan activists used the #Februdairy hashtag to their advantage with most of their tweets (33%) featuring non-graphic images of animals. They also tweeted about other subject matters, including environmental concerns, vegan food and products, and health issues related to dairy consumption.As noted by the activists (see fig. 1 above), most of the pro-Februdairy tweets were images of milk or dairy products (41%). Images of farms and farmers were the next most used (26%), followed by images of cows (17%) (see fig. 2). Fig. 2: An activist makes their anti-Februdairy point with a clear, engaging image and effective use of hashtags. (#Februdairy, 6 Feb. 2019)The juxtaposition between many of the tweets was also often glaring, with one contrasting message following another (see fig. 3). Fig. 3: An example of contrasting #Februdairy tweets with an image used by the activists to good effect, making their point known. (#Februdairy, 2 Feb. 2019)Storytelling is a powerful tool in public relations and marketing efforts. Yet, to be effective, high-quality content is required. That many of the Februdairy proponents had limited social media training was evident; images were blurred, film quality was poor, or they failed to make their meaning clear (see fig. 4). Fig. 4: A blurred photograph, reflective of some of the low-quality content provided by Februdairy supporters. (#Februdairy, 3 Feb. 2019)This image was tweeted in support of Februdairy. However the image and phrasing could also be used to argue against Februdairy. We can surmise that the tweeter was suggesting the cow was well looked after and seemingly content, but overall the message is as unclear as the image.While some pro-Februdairy supporters recognised the need for relevant hashtags, often their images were of a low-quality and not particularly engaging, a requirement for social media success. This requirement seems to be better understood by anti-Februdairy activists who used high-quality images and memes to create interest and gain the audience’s attention (see figs. 5 and 6). Fig. 5: An uninspiring image used to promote Februdairy. (#Februdairy, 6 Feb. 2019) Fig. 6: Anti-Februdairy activists made good use of memes, recognising the need for diverse content. (#Februdairy, 3 Feb. 2019)DiscussionWhat the #Februdairy case makes clear, then, is that in continuing its focus on traditional media, the dairy industry has left the battle online to largely untrained, non-social media savvy supporters.From a purely public relations perspective, one of the first things we ask our students to do in issues and crisis communication is to assess the risk. “What can hurt your organisation?” we ask. “What potential issues are on the horizon and what can you do to prevent them?” This is PR101 and it is difficult to understand why environmental scanning and resulting action has not been on the radar of the dairy industry long before now. It seems they have not fully anticipated or have significantly underestimated the emerging issue that public perception, animal cruelty, health concerns, and, ultimately, veganism has had on their industry and this is to their detriment. In Australia in 2015–16 the dairy industry was responsible for 8 per cent (A$4.3 billion) of the gross value of agricultural production and 7 per cent (A$3 billion) of agricultural export income (Department of Agriculture and Water Resources). When such large figures are involved and with so much at stake, it is hard to rationalise the decision not to engage in a more proactive online strategy, seeking to engage their publics, including, whether they like it or not, activists.Instead there are current attempts to address these issues with a legislative approach, lobbying for the introduction of ag-gag laws (Potter), and the limitation of terms such as milk and cheese (Worthington). However, these measures are undertaken while there is little attempt to engage with activists or to effectively counter their claims with a widespread authentic public relations campaign, and reflects a failure to understand the nature of the current online environment, momentum, and mood.That is not to say that the dairy industry is not operating in the online environment, but it does not appear to be a priority, and this is reflected in their low engagement and numbers of followers. For instance, Dairy Australia, the industry’s national service body, has a following of only 8,281 on Facebook, 6,981 on Twitter, and, crucially, they are not on Instagram. Their Twitter posts do not include hashtags and unsurprisingly they have little engagement on this platform with most tweets attracting no more than two likes. Surprisingly they have 21,013 subscribers on YouTube which featured professional and well-presented videos. This demonstrates some understanding of the importance of effective storytelling but not, as yet, trans-media storytelling.ConclusionSocial media activism is becoming more important and recognised as a legitimate voice in the public sphere. Many organisations, perhaps in recognition of this as well as a growing focus on responsible corporate behaviour, particularly in the treatment of animals, have adjusted their behaviour. From Unilever abandoning animal testing practices to ensure Dove products are certified cruelty free (Nussbaum), to Domino’s introducing vegan options, companies who are aware of emerging trends and values are changing the way they do business and are reaping the benefits of engaging with, and catering to, vegans. Domino’s sold out of vegan cheese within the first week and vegans were asked to phone ahead to their local store, so great was the demand. From their website:We knew the response was going to be big after the demand we saw for the product on social media but we had no idea it was going to be this big. (Domino’s Newsroom)As a public relations professional, I am baffled by the dairy industry’s failure to adopt a crisis-based strategy rather than largely rely on the traditional one-way communication that has served them well in the previous (golden?) pre-social media age. However, as a vegan, persuaded by the unravelling of the happy cow argument, I cannot help but hope this realisation continues to elude them.References@bovidiva. “Let’s Make #Februdairy Happen This Year. 28 Days, 28 Positive #dairy Posts. From Cute Calves and #cheese on Crumpets, to Belligerent Bulls and Juicy #beef #burgers – Who’s In?” Twitter post. 15 Jan. 2018. 1 Feb. 2019 <https://twitter.com/bovidiva/status/952910641840447488?lang=en>.Austin, Lucinda L., and Yan Jin. Social Media and Crisis Communication. New York: Routledge, 2018.Bradbury, Tod. “Data Shows Major Rise in Veganism among Young People.” Plant Based News 12 Oct. 2018. 10 Feb. 2019 <https://www.plantbasednews.org>.BBC. “Februdairy: The Dairy Industry Fights Back against Veganuary.” BBC.com 8 Feb. 2018. 1 Feb. 2019 <https://www.bbc.com/news/newsbeat-42990941>.Campaign Brief. “Shane Crawford Stars in ‘Milk Loves You Back’ Work for Lion Dairy & Drinks via AJF Partnership.” Campaign Brief Australia 1 Jun. 2017. 12 Feb. 2019 <http://www.campaignbrief.com/2017/06/shane-crawford-stars-in-milk-l.html>.Chiorando, Maria. “BOSH!’s Vegan Cookbook Is Fastest Selling Cookery Title of 2018.” Plant Based News 26 April 2018. 18 Feb. 2019 <https://www.plantbasednews.org/post/bosh-s-vegan-cookbook-is-fastest-selling-cookery-title-of-2018>.Cowspiracy: The Sustainability Secret. Dir. Kip Anderson, and Keegan Kuhn. Appian Way, A.U.M. Films, First Spark Media, 2014.Dairy Australia. “About Legendairy Capital.” Legendairy.com.au, 2019. 12 Feb. 2019 <http://www.legendairy.com.au/dairy-talk/capital-2017/about-us>.Dawson, Abigail. “Lion Dairy & Drinks Launches Campaign to Make Milk Matter Again.” Mumbrella 1 Jun. 2017. 10 Feb 2019 <https://mumbrella.com.au/lion-dairy-drinks-launches-campaign-make-milk-matter-448581>.Department of Agriculture and Water Resources. “Dairy Industry.” Australian Government. 21 Sep. 2018. 20 Feb. 2019 <http://www.agriculture.gov.au/abares/research-topics/surveys/dairy>.Domino’s Newsroom. “Meltdown! Domino’s Set to Run Out of Vegan Cheese!” Domino’s Australia 18 Jan. 2018. 10 Feb. 2019 <https://newsroom.dominos.com.au/home/2018/1/17/meltdown-dominos-set-to-run-out-of-vegan-cheese>.Fitch, Kate. “Making Friends in the Wild West: Singaporean Public Relations Practitioners’ Perceptions of Working in Social Media.” PRism 6.2 (2009). 10 Feb. 2019 <http://www.prismjournal.org/fileadmin/Praxis/Files/globalPR/FITCH.pdf>.Francione, Gary L. “Animal Rights: The Abolitionist Approach.” Animal Rights: The Abolitionist Approach 10 Feb. 2019. <https://www.abolitionistapproach.com/quotes/>.Glance, David. “#QantasLuxury: A Qantas Social Media Disaster in Pyjamas.” The Conversation 23 Nov. 2011. 10 Feb. 2019 <http://theconversation.com/qantasluxury-a-qantas-social-media-disaster-in-pyjamas-4421>.Hancox, Dan. “The Unstoppable Rise of Veganism: How a Fringe Movement Went Mainstream.” The Guardian 1 Apr. 2018. 10 Feb. 2019 <https://www.theguardian.com/lifeandstyle/2018/apr/01/vegans-are-coming-millennials-health-climate-change-animal-welfare>.“Harvard Milk Study: It Doesn’t Do a Body Good.” HuffPost Canada 25 Jul. 2013. 12 Feb. 2019 <https://www.huffingtonpost.ca/2013/07/05/harvard-milk-study_n_3550063.html>.Hill, Kashmir. “#McDStories: When a Hashtag Becomes a Bashtag.” Forbes.com 24 Jan. 2012. 10 Feb. 2019 <https://www.forbes.com/sites/kashmirhill/2012/01/24/mcdstories-when-a-hashtag-becomes-a-bashtag/#1541ef39ed25>.Howell, Madeleine. “Goodbye Veganuary, Hello Februdairy: How the Dairy Industry Is Taking the Fight to Its Vegan Critics.” The Telegraph 9 Feb. 2018. 10 Feb. 2019 <https://www.telegraph.co.uk/food-and-drink/features/goodbye-veganuary-hello-februdairy-dairy-industry-taking-fight/>.Janus, Erin. “DAIRY IS SCARY! The Industry Explained in 5 Minutes.” Video. 27 Dec. 2015. 12 Feb. 2019 <https://www.youtube.com/watch?v=UcN7SGGoCNI&t=192s>.Kaiserman, Beth. “Dairy Industry Struggles in a Sea of Plant-Based Milks.” Forbes.com 31 Jan. 2019. 20 Feb. 2019 <https://www.forbes.com/sites/bethkaiserman/2019/01/31/dairy-industry-plant-based-milks/#7cde005d1c9e>.Kwye, Su Mon, et al. “On Recommending Hashtags in Twitter Networks.” Proceedings of the Social Informatics: 4th International Conference, SocInfo. 5-7 Dec. 2012. Lausanne: Research Collection School of Information Systems. 337-50. 12 Feb. 2019 <https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=2696&context=sis_research>.Lockhart, James, Danny Donaghy, and Hamish Gow. “Milk Price Cuts Reflect the Reality of Sweeping Changes in Global Dairy Market.” The Conversation 12 May 2016. 12 Feb. 2019 <https://theconversation.com/milk-price-cuts-reflect-the-reality-of-sweeping-changes-in-global-dairy-market-59251>.Macnamara, Jim. “‘Emergent’ Media and Public Communication: Understanding the Changing Mediascape.” Public Communication Review 1.2 (2010): 3–17.Mango, Alison. “This Drastic Diet Change Helped Venus Williams Fight Her Autoimmune Condition.” Health.com 12 Jan. 2017. 10 Feb. 2019 <https://www.health.com/nutrition/venus-williams-raw-vegan-diet>.McDonald, Barbara. “Once You Know Something, You Can’t Not Know It. An Empirical Look at Becoming Vegan.” Foodethics.univie.ac.at, 2000. 12 Feb. 2019 <https://foodethics.univie.ac.at/fileadmin/user_upload/inst_ethik_wiss_dialog/McDonald__B._2000._Vegan_...__An_Empirical_Look_at_Becoming_Vegan..pdf>.Milk Life. “What Is Milk Life?” 20 Feb. 2019 <https://milklife.com/what-is-milk-life>.News.com.au. “Twitter Trolls Take over Conference Hashtag with Porn.” News.com.au 30 Nov. 2015. 12 Feb. 2019 <https://www.news.com.au/national/twitter-trolls-take-over-ecology-conference-hashtag-with-porn/news-story/06a76d7ab53ec181776bdb11d735e422>.Nussbaum, Rachel. “Tons of Your Favorite Drugstore Products Are Officially Cruelty-Free Now.” Glamour.com 9 Oct. 2018. 21 Feb. 2019 <https://www.glamour.com/story/dove-cruelty-free-peta>.Parnell, Kerry. “Charity Theme Months Have Taken over the Calendar.” Daily Telegraph.com 26 Sep. 2015. 18 Feb. 2019 <https://www.dailytelegraph.com.au/rendezview/charity-theme-months-have-taken-over-the-calendar/news-story/1f444a360ee04b5ec01154ddf4763932>.People for the Ethical Treatment of Animals. “This Cow Was Suffering on Dairy Farm and the Owner Refused to Help Her.” Facebook post. 13 Feb. 2019. 15 Feb. 2019 <https://www.facebook.com/official.peta>.Pippus, Anna. “Progress! Canada’s New Draft Food Guide Favors Plant-Based Protein and Eliminates Dairy as a Food Group.” Huffington Post 7 Dec. 2017. 10 Feb. 2019 <https://www.huffingtonpost.com/entry/progress-canadas-new-food-guide-will-favor-plant_us_5966eb4ce4b07b5e1d96ed5e>.Potter, Will. “Ag-Gag Laws: Corporate Attempts to Keep Consumers in the Dark.” Griffith Journal of Law and Human Dignity (2017): 1–32.Roy Morgan. “Netflix Set to Surge beyond 10 Million Users.” Roy Morgan 3 Aug. 2018. 20 Feb. 2019 <http://www.roymorgan.com/findings/7681-netflix-stan-foxtel-fetch-youtube-amazon-pay-tv-june-2018-201808020452>.———. “1 in 7 Australians Now Watch No Commercial TV, Nearly Half of All Broadcasting Reaches People 50+, and Those with SVOD Watch 30 Minutes Less a Day.” Roy Morgan 1 Feb. 2016. 10 Feb. 2019 <http://www.roymorgan.com/findings/6646-decline-and-change-commercial-television-viewing-audiences-december-2015-201601290251>.Saccaro, Matt. “Milk Does Not Do a Body Good, Says New Study.” Mic.com 29 Oct. 2014. 12 Feb. 2019 <https://mic.com/articles/102698/milk-does-not-do-a-body-good#.o7MuLnZgV>.Sandhu, Serina. “A Group of Vegan Activists Is Trying to Hijack the ‘Februdairy’ Month by Encouraging People to Protest at Dairy Farms.” inews.co.uk 5 Feb. 2019. 18 Feb. 2019 <https://inews.co.uk/news/uk/vegan-activists-hijack-februdairy-protest-dairy-farms-farmers/>.Social Garden. “Hashtag Blunders That Hurt Your Social Media Marketing Efforts.” Socialgarden.com.au 30 May 2014. 10 Feb. 2019 <https://socialgarden.com.au/social-media-marketing/hashtag-blunders-that-hurt-your-social-media-marketing-efforts/>.Statista: The Statista Portal. Use of Social Networking Sites in Australia as of March 2017 by Age. 2019. 10 Feb. 2019 <https://www.statista.com/statistics/729928/australia-social-media-usage-by-age/>.Tran, Mark. “#myNYPD Twitter Callout Backfires for New York Police Department.” The Guardian 23 Apr. 2014. 10 Feb. 2019 <https://www.theguardian.com/world/2014/apr/23/mynypd-twitter-call-out-new-york-police-backfires>.University of Cambridge. “Farming Loved But Misunderstood, Survey Shows.” Cam.uc.uk 23 Aug. 2012. 10 Feb. 2019 <https://www.cam.ac.uk/research/news/farming-loved-but-misunderstood-survey-shows>.Veganuary. “About Veganuary.” 2019. 21 Feb. 2019 <https://veganuary.com/about/>.———. “Veganuary: Inspiring People to Try Vegan!” 2019. 10 Feb. 2019 <https://veganuary.com/>.What the Health. Dir. Kip Anderson, and Keegan Kuhn. A.U.M. Films, 2017.Worthington, Brett. “Federal Government Pushes to Stop Plant-Based Products Labelled as ‘Meat’ or ‘Milk’.” ABC News 11 Oct. 2018. 20 Feb. 2019 <https://www.abc.net.au/news/2018-10-11/federal-government-wants-food-standards-reviewed/10360200>.Yates, Jack. “Farmers Plan to Make #Februdairy Month of Dairy Celebration.” Farmers Weekly 20 Jan. 2018. 10 Feb. 2019 <https://www.fwi.co.uk/business/farmers-plan-make-februdairy-month-dairy-celebration>.
APA, Harvard, Vancouver, ISO, and other styles
36

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Lindsay, Julie, Vanessa Crouch, and Katrina Cutcliffe. "Disrupting the traditional academic development model: Technology Demonstrators." ASCILITE Publications, November 18, 2022, e22167. http://dx.doi.org/10.14742/apubs.2022.167.

Full text
Abstract:
Technology Demonstrators (TechDems) is an initiative at UniSQ for collective oversight of educational technology use in learning and teaching. It is an evolving Community of Practice (CoP) inspired by the work of Treyner-Wenger (2015) on groups of­ people who engage in a process of collective learning. Generating excitement around new ideas including technologies is not hard but sustaining interest and supporting skill development and appropriate edtech purchases that lead to shifting current practice is a challenge. TechDems addresses the challenge of changemaking by providing the means for interaction, sharing and collaboration. TechDems aligns with the theory and practice of Connectivism and Collaborativism. As such it is disruptive by not providing a ‘sit and get’ approach to academic development but encouraging ongoing participation and contribution. With regards to Connectivism Siemens (2005) states, “The pipe is more important than the content in the pipe” implying that learning and knowledge are contextual and new information is constantly being acquired through technology-infused networked participation and connected practices. Other influences include Collaborativism (Harasim, 2017) ??that builds on constructivist learning theory and the use of the internet for collaborative knowledge creation, and Learning Collaboratives (Lindsay, 2016) that foster confidence and autonomy, extended local and global communities and collaboration that leads to co-creation. Aligned with CoP ideals, Learning Collaboratives disrupt expectations around how we learn and how we affect change within learning and teaching which is not in isolation. Underlying the purpose and activity of TechDems is the recognition that it is imperative to explore and discover innovative ways to facilitate leading edge, digitally-infused teaching through what we call the four pillars: technology, pedagogy, research and evaluation. TechDems is unique in that it provides a hub for all participants and encourages distributed and socially constructed, individual and group driven, learning systems prioritising transparency, sharing, and collaboration when learning virtually and with technology. By flipping traditional models and focusing on needs that are user driven, TechDem Learning and Teaching Quality Partners work relationally with academics on a range of activities. Piloting and evaluating new educational technologies, such as Engageli, allows participants to work collaboratively whilst learning the new platform and creating socially embedded decisions with regards to how and if the tool will be adopted. Hosting internationally blended events, such as a hybrid learning workshop with German university JLU-Giessen, demonstrates how learning technologies can be used to create global learning, networks, and understandings. SIGS, such as the Student Engagement SIG, or the Student Portfolio SIG are participant led allowing members to share their passions, projects, and frustrations. In addition, TechDems promotes ‘Champions’ as leaders within the academic environment; hosts academic ‘ThinkPiece’ video vignettes of shared practice; collaborates with diverse stakeholder such as ICT, Schools, and other stakeholders; and provides a regular newsletter and dynamic website for enhanced communication and access to learning artefacts. In each of these examples from TechDem practice, the traditional linear model of professional learning is disrupted to enhance collectivism and collaborativism. As evidence of best practice TechDems are driving change through a focus on the needs of stakeholders in conjunction with institutional strategies for student success. The approach provides three key opportunities for change: connection to ‘experts’; opportunities to share practice and learning; and, increases in the use of pedagogically appropriate technologies for learning. Others can learn from and emulate the range and scope of ongoing projects and CoP activities. Feedback from participants in the program continue to indicate positive impacts on their teaching and learning, as a result the TechDems are initiating ongoing research into the effectiveness of edtech tools and associated pedagogies in learning.
APA, Harvard, Vancouver, ISO, and other styles
38

Kadivar, Jamileh. "Government Surveillance and Counter-Surveillance on Social and Mobile Media: The Case of Iran (2009)." M/C Journal 18, no. 2 (April 29, 2015). http://dx.doi.org/10.5204/mcj.956.

Full text
Abstract:
Human history has witnessed varied surveillance and counter-surveillance activities from time immemorial. Human beings could not surveille others effectively and accurately without the technology of their era. Technology is a tool that can empower both people and governments. The outcomes are different based on the users’ intentions and aims. 2,500 years ago, Sun Tzu noted that ‘If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy’. His words still ring true. To be a good surveiller and counter-surveiller it is essential to know both sides, and in order to be good at these activities access to technology is vital. There is no doubt that knowledge is power, and without technology to access the information, it is impossible to be powerful. As we become more expert at technology, we will learn what makes surveillance and counter-surveillance more effective, and will be more powerful.“Surveillance” is one of the most important aspects of living in the convergent media environment. This essay illustrates government surveillance and counter-surveillance during the Iranian Green Movement (2009) on social and mobile media. The Green Movement refers to a non-violent movement that arose after the disputed presidential election on June 2009. After that Iran was facing its most serious political crisis since the 1979 revolution. Claims of vote fraud triggered massive street protests. Many took to the streets with “Green” signs, chanting slogans such as ‘the government lied’, and ‘where is my vote?’ There is no doubt that social and mobile media has played an important role in Iran’s contemporary politics. According to Internet World Stats (IWS) Internet users in 2009 account for approximately 48.5 per cent of the population of Iran. In 2009, Iran had 30.2 million mobile phone users (Freedom House), and 72 cellular subscriptions for every 100 people (World Bank). Today, while Iran has the 19th-largest population in the world, its blogosphere holds the third spot in terms of number of users, just behind the United States and China (Beth Elson et al.). In this essay the use of social and mobile media (technology) is not debated, but the extent of this use, and who, why and how it is used, is clearly scrutinised.Visibility and Surveillance There have been different kinds of surveillance for a very long time. However, all types of surveillance are based on the notion of “visibility”. Previous studies show that visibility is not a new term (Foucault Discipline). The new things in the new era, are its scale, scope and complicated ways to watch others without being watched, which are not limited to a specific time, space and group, and are completely different from previous instruments for watching (Andrejevic). As Meikle and Young (146) have mentioned ‘networked digital media bring with them a new kind of visibility’, based on different kinds of technology. Internet surveillance has important implications in politics to control, protect, and influence (Marx Ethics; Castells; Fuchs Critique). Surveillance has been improved during its long history, and evolved from very simple spying and watching to complicated methods of “iSpy” (Andrejevic). To understand the importance of visibility and its relationship with surveillance, it is essential to study visibility in conjunction with the notion of “panopticon” and its contradictory functions. Foucault uses Bentham's notion of panopticon that carries within itself visibility and transparency to control others. “Gaze” is a central term in Bentham’s view. ‘Bentham thinks of a visibility organised entirely around a dominating, overseeing gaze’ (Foucault Eye). Moreover, Thomson (Visibility 11) notes that we are living in the age of ‘normalizing the power of the gaze’ and it is clear that the influential gaze is based on powerful means to see others.Lyon (Surveillance 2) explains that ‘surveillance is any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been granted…’. He mentions that today the most important means of surveillance reside in computer power which allows collected data to be sorted, matched, retrieved, processed, marketed and circulated.Nowadays, the Internet has become ubiquitous in many parts of the world. So, the changes in people’s interactions have influenced their lives. Fuchs (Introduction 15) argues that ‘information technology enables surveillance at a distance…in real time over networks at high transmission speed’. Therefore, visibility touches different aspects of people’s lives and living in a “glasshouse” has caused a lot of fear and anxiety about privacy.Iran’s Green Movement is one of many cases for studying surveillance and counter-surveillance technologies in social and mobile media. Government Surveillance on Social and Mobile Media in Iran, 2009 In 2009 the Iranian government controlled technology that allowed them to monitor, track, and limit access to the Internet, social media and mobiles communication, which has resulted in the surveillance of Green Movement’s activists. The Iranian government had improved its technical capabilities to monitor the people’s behavior on the Internet long before the 2009 election. The election led to an increase in online surveillance. Using social media the Iranian government became even more powerful than it was before the election. Social media was a significant factor in strengthening the government’s power. In the months after the election the virtual atmosphere became considerably more repressive. The intensified filtering of the Internet and implementation of more advanced surveillance systems strengthened the government’s position after the election. The Open Net Initiative revealed that the Internet censorship system in Iran is one of the most comprehensive and sophisticated censorship systems in the world. It emphasized that ‘Advances in domestic technical capacity have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies’.On the other hand, the authorities attempted to block all access to political blogs (Jaras), either through cyber-security methods or through threats (Tusa). The Centre for Investigating Organized Cyber Crimes, which was founded in 2007 partly ‘to investigate and confront social and economic offenses on the Internet’ (Cyber Police), became increasingly important over the course of 2009 as the government combated the opposition’s online activities (Beth Elson et al. 16). Training of "senior Internet lieutenants" to confront Iran's "virtual enemies online" was another attempt that the Intelligence minister announced following the protests (Iran Media Program).In 2009 the Iranian government enacted the Computer Crime Law (Jaras). According to this law the Committee in Charge of Determining Unauthorized Websites is legally empowered to identify sites that carry forbidden content and report that information to TCI and other major ISPs for blocking (Freedom House). In the late fall of 2009, the government started sending threatening and warning text messages to protesters about their presence in the protests (BBC). Attacking, blocking, hacking and hijacking of the domain names of some opposition websites such as Jaras and Kaleme besides a number of non-Iranian sites such as Twitter were among the other attempts of the Iranian Cyber Army (Jaras).It is also said that the police and security forces arrested dissidents identified through photos and videos posted on the social media that many imagined had empowered them. Furthermore, the online photos of the active protesters were posted on different websites, asking people to identify them (Valizadeh).In late June 2009 the Iranian government was intentionally permitting Internet traffic to and from social networking sites such as Facebook and Twitter so that it could use a sophisticated practice called Deep Packet Inspection (DPI) to collect information about users. It was reportedly also applying the same technology to monitor mobile phone communications (Beth Elson et al. 15).On the other hand, to cut communication between Iranians inside and outside the country, Iran slowed down the Internet dramatically (Jaras). Iran also blocked access to Facebook, YouTube, Wikipedia, Twitter and many blogs before, during and after the protests. Moreover, in 2009, text message services were shut down for over 40 days, and mobile phone subscribers could not send or receive text messages regardless of their mobile carriers. Subsequently it was disrupted on a temporary basis immediately before and during key protests days.It was later discovered that the Nokia Siemens Network provided the government with surveillance technologies (Wagner; Iran Media Program). The Iranian government built a complicated system that enabled it to monitor, track and intercept what was said on mobile phones. Nokia Siemens Network confirmed it supplied Iran with the technology needed to monitor, control, and read local telephone calls [...] The product allowed authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic (Cellan-Jones). Media sources also reported that two Chinese companies, Huawei and ZTE, provided surveillance technologies to the government. The Nic Payamak and Saman Payamak websites, that provide mass text messaging services, also reported that operator Hamrah Aval commonly blocked texts with words such as meeting, location, rally, gathering, election and parliament (Iran Media Program). Visibility and Counter-Surveillance The panopticon is not limited to the watchers. Similarly, new kinds of panopticon and visibility are not confined to government surveillance. Foucault points out that ‘the seeing machine was once a sort of dark room into which individuals spied; it has become a transparent building in which the exercise of power may be supervised by society as a whole’ (Discipline 207). What is important is Foucault's recognition that transparency, not only of those who are being observed but also of those who are observing, is central to the notion of the panopticon (Allen) and ‘any member of society will have the right to come and see with his own eyes how schools, hospitals, factories, and prisons function’ (Foucault, Discipline 207). Counter-surveillance is the process of detecting and mitigating hostile surveillance (Burton). Therefore, while the Internet is a surveillance instrument that enables governments to watch people, it also improves the capacity to counter-surveille, and draws public attention to governments’ injustice. As Castells (185) notes the Internet could be used by citizens to watch their government as an instrument of control, information, participation, and even decision-making, from the bottom up.With regards to the role of citizens in counter-surveillance we can draw on Jay Rosen’s view of Internet users as ‘the people formerly known as the audience’. In counter-surveillance it can be said that passive citizens (formerly the audience) have turned into active citizens. And this change was becoming impossible without mobile and social media platforms. These new techniques and technologies have empowered people and given them the opportunity to have new identities. When Thompson wrote ‘the exercise of power in modern societies remains in many ways shrouded in secrecy and hidden from the public gaze’ (Media 125), perhaps he could not imagine that one day people can gaze at the politicians, security forces and the police through the use of the Internet and mobile devices.Furthermore, while access to mobile media allows people to hold authorities accountable for their uses and abuses of power (Breen 183), social media can be used as a means of representation, organization of collective action, mobilization, and drawing attention to police brutality and reasons for political action (Gerbaudo).There is no doubt that having creativity and using alternative platforms are important aspects in counter-surveillance. For example, images of Lt. Pike “Pepper Spray Cop” from the University of California became the symbol of the senselessness of police brutality during the Occupy Movement (Shaw). Iranians’ Counter-Surveillance on Social and Mobile Media, 2009 Iran’s Green movement (2009) triggered a lot of discussions about the role of technology in social movements. In this regard, there are two notable attitudes about the role of technology: techno-optimistic (Shriky and Castells) and techno-pessimistic (Morozov and Gladwell) views should be taken into account. While techno-optimists overrated the role of social media, techno-pessimists underestimated its role. However, there is no doubt that technology has played a great role as a counter-surveillance tool amongst Iranian people in Iran’s contemporary politics.Apart from the academic discussions between techno-optimists and techno-pessimists, there have been numerous debates about the role of new technologies in Iran during the Green Movement. This subject has received interest from different corners of the world, including Western countries, Iranian authorities, opposition groups, and also some NGOs. However, its role as a means of counter-surveillance has not received adequate attention.As the tools of counter-surveillance are more or less the tools of surveillance, protesters learned from the government to use the same techniques to challenge authority on social media.Establishing new websites (such as JARAS, RASA, Kalemeh, and Iran green voice) or strengthening some previous ones (such as Saham, Emrooz, Norooz), also activating different platforms such as Facebook, Twitter, and YouTube accounts to broadcast the voice of the Iranian Green Movement and neutralize the government’s propaganda were the most important ways to empower supporters of Iran’s Green Movement in counter-surveillance.‘Reporters Without Borders issued a statement, saying that ‘the new media, and particularly social networks, have given populations collaborative tools with which they can change the social order’. It is also mentioned that despite efforts by the Iranian government to prevent any reporting of the protests and due to considerable pressure placed on foreign journalists inside Iran, social media played a significant role in sending the messages and images of the movement to the outside world (Axworthy). However, at that moment, many thought that Twitter performed a liberating role for Iranian dissenters. For example, Western media heralded the Green Movement in Iran as a “Twitter revolution” fuelled by information and communication technologies (ICTs) and social media tools (Carrieri et al. 4). “The Revolution Will Be Twittered” was the first in a series of blog posts published by Andrew Sullivan a few hours after the news of the protests was released.According to the researcher’s observation the numbers of Twitter users inside Iran who tweeted was very limited in 2009 and social media was most useful in the dissemination of information, especially from those inside Iran to outsiders. Mobile phones were mostly influential as an instrument firstly used for producing contents (images and videos) and secondly for the organisation of protests. There were many photos and videos that were filmed by very simple mobile cell phones, uploaded by ordinary people onto YouTube and other platforms. The links were shared many times on Twitter and Facebook and released by mainstream media. The most frequently circulated story from the Iranian protests was a video of Neda Agha-Sultan. Her final moments were captured by some bystanders with mobile phone cameras and rapidly spread across the global media and the Internet. It showed that the camera-phone had provided citizens with a powerful means, allowing for the creation and instant sharing of persuasive personalised eyewitness records with mobile and globalised target populations (Anden-Papadopoulos).Protesters used another technique, DDOS (distributed denial of service attacks), for political protest in cyber space. Anonymous people used DDOS to overload a website with fake requests, making it unavailable for users and disrupting the sites set as targets (McMillan) in effect, shutting down the site. DDOS is an important counter-surveillance activity by grassroots activists or hackers. It was a cyber protest that knocked the main Iranian governmental websites off-line and caused crowdsourcing and false trafficking. Amongst them were Mahmoud Ahmadinejad, Iran's supreme leader’s websites and those which belong to or are close to the government or security forces, including news agencies (Fars, IRNA, Press TV…), the Ministry of Foreign Affairs, the Ministry of Justice, the Police, and the Ministry of the Interior.Moreover, as authorities uploaded the pictures of protesters onto different platforms to find and arrest them, in some cities people started to put the pictures, phone numbers and addresses of members of security forces and plain clothes police officers who attacked them during the protests and asked people to identify and report the others. They also wanted people to send information about suspects who infringed human rights. Conclusion To sum up, visibility, surveillance and counter-surveillance are not new phenomena. What is new is the technology, which increased their complexity. As Foucault (Discipline 200) mentioned ‘visibility is a trap’, so being visible would be the weakness of those who are being surveilled in the power struggle. In the convergent era, in order to be more powerful, both surveillance and counter-surveillance activities aim for more visibility. Although both attempt to use the same means (technology) to trap the other side, the differences are in their subjects, objects, goals and results.While in surveillance, visibility of the many by the few is mostly for the purpose of control and influence in undemocratic ways, in counter-surveillance, the visibility of the few by the many is mostly through democratic ways to secure more accountability and transparency from the governments.As mentioned in the case of Iran’s Green Movement, the scale and scope of visibility are different in surveillance and counter-surveillance. The importance of what Shaw wrote about Sydney occupy counter-surveillance, applies to other places, such as Iran. She has stressed that ‘protesters and police engaged in a dance of technology and surveillance with one another. Both had access to technology, but there were uncertainties about the extent of technology and its proficient use…’In Iran (2009), both sides (government and activists) used technology and benefited from digital networked platforms, but their levels of access and domains of influence were different, which was because the sources of power, information and wealth were divided asymmetrically between them. Creativity was important for both sides to make others more visible, and make themselves invisible. Also, sharing information to make the other side visible played an important role in these two areas. References Alen, David. “The Trouble with Transparency: The Challenge of Doing Journalism Ethics in a Surveillance Society.” Journalism Studies 9.3 (2008): 323-40. 8 Dec. 2013 ‹http://www.tandfonline.com/doi/full/10.1080/14616700801997224#.UqRFSuIZsqN›. Anden-Papadopoulos, Kari. “Citizen Camera-Witnessing: Embodied Political Dissent in the Age of ‘Mediated Mass Self-Communication.’” New Media & Society 16.5 (2014). 753-69. 9 Aug. 2014 ‹http://nms.sagepub.com/content/16/5/753.full.pdf+html›. Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence, Kan: UP of Kansas, 2007. Axworthy, Micheal. Revolutionary Iran: A History of the Islamic Republic. London: Penguin Books, 2014. Bentham, Jeremy. Panopticon Postscript. London: T. Payne, 1791. Beth Elson, Sara, Douglas Yeung, Parisa Roshan, S.R. Bohandy, and Alireza Nader. Using Social Media to Gauge Iranian Public Opinion and Mood after the 2009 Election. Santa Monica: RAND Corporation, 2012. 1 Aug. 2014 ‹http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1161.pdf›. Breen, Marcus. Uprising: The Internet’s Unintended Consequences. Champaign, Ill: Common Ground Pub, 2011. Burton, Fred. “The Secrets of Counter-Surveillance.” Stratfor Global Intelligence. 2007. 19 April 2015 ‹https://www.stratfor.com/secrets_countersurveillance›. Carrieri, Matthew, Ali Karimzadeh Bangi, Saad Omar Khan, and Saffron Suud. After the Green Movement Internet Controls in Iran, 2009-2012. OpenNet Initiative, 2013. 17 Dec. 2013 ‹https://opennet.net/sites/opennet.net/files/iranreport.pdf›. Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP: 2001. Cellan-Jones, Rory. “Hi-Tech Helps Iranian Monitoring.” BBC, 2009. 26 July 2014 ‹http://news.bbc.co.uk/1/hi/technology/8112550.stm›. “Cyber Crimes’ List.” Iran: Cyber Police, 2009. 17 July 2014 ‹http://www.cyberpolice.ir/page/2551›. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. Harmondsworth: Penguin, 1977. Foucault, Michel. “The Eye of Power.” 1980. 12 Dec. 2013 ‹https://nbrokaw.files.wordpress.com/2010/12/the-eye-of-power.doc›. Freedom House. “Special Report: Iran.” 2009. 14 June 2014 ‹http://www.sssup.it/UploadDocs/4661_8_A_Special_Report_Iran_Feedom_House_01.pdf›. Fuchs, Christian. “Introduction.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 1-28. Fuchs, Christian. “Critique of the Political Economy of Web 2.0 Surveillance.” Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Ed. Christian Fuchs. London: Routledge, 2012. 30-70. Gerbaudo, Paolo. Tweets and the Streets: Social Media and Contemporary Activism. London: Pluto, 2012. “Internet: Iran’s New Imaginary Enemy.” Jaras Mar. 2009. 28 June 2014 ‹http://www.rahesabz.net/print/12143›.Iran Media Program. “Text Messaging as Iran's New Filtering Frontier.” 2013. 25 July 2014 ‹http://www.iranmediaresearch.org/en/blog/227/13/04/25/136›. Internet World Stats News. The Internet Hits 1.5 Billion. 2009. 3 July 2014 ‹ http://www.internetworldstats.com/pr/edi038.htm›. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open UP, 2001. Lyon, David. “9/11, Synopticon, and Scopophilia: Watching and Being Watched.” The New Politics of Surveillance and Visibility. Eds. Richard V. Ericson and Kevin D. Haggerty. Toronto: UP of Toronto, 2006. 35-54. Marx, Gary T. “What’s New about the ‘New Surveillance’? Classify for Change and Continuity.” Surveillance & Society 1.1 (2002): 9-29. McMillan, Robert. “With Unrest in Iran, Cyber-Attacks Begin.” PC World 2009. 17 Apr. 2015 ‹http://www.pcworld.com/article/166714/article.html›. Meikle, Graham, and Sherman Young. Media Convergence: Networked Digital Media in Everyday Life. London: Palgrave Macmillan, 2012. Morozov, Evgeny. “How Dictators Watch Us on the Web.” Prospect 2009. 15 June 2014 ‹http://www.prospectmagazine.co.uk/magazine/how-dictators-watch-us-on-the-web/#.U5wU6ZRdU00›.Open Net. “Iran.” 2009. 26 June 2014 ‹https://opennet.net/research/profiles/iran›. Reporters without Borders. “Web 2.0 versus Control 2.0.” 2010. 27 May 2014 ‹http://en.rsf.org/web-2-0-versus-control-2-0-18-03-2010,36697›.Rosen, Jay. The People Formerly Known as the Audience. 2006. 7 Dec. 2013 ‹http://www.huffingtonpost.com/jay-rosen/the-people-formerly-known_1_b_24113.html›. Shaw, Frances. “'Walls of Seeing': Protest Surveillance, Embodied Boundaries, and Counter-Surveillance at Occupy Sydney.” Transformation 23 (2013). 9 Dec. 2013 ‹http://www.transformationsjournal.org/journal/issue_23/article_04.shtml›. “The Warning of the Iranian Revolutionary Guard Corps (IRGC) to the Weblogs and Websites.” BBC, 2009. 27 July 2014 ‹http://www.bbc.co.uk/persian/iran/2009/06/090617_ka_ir88_sepah_internet.shtml›. Thompson, John B. The Media And Modernity: A Social Theory of the Media. Cambridge: Polity Press, 1995. Thompson, John B. “The New Visibility.” Theory, Culture & Society 22.6 (2005): 31-51. 10 Dec. 2013 ‹http://tcs.sagepub.com/content/22/6/31.full.pdf+html›. Tusa, Felix. “How Social Media Can Shape a Protest Movement: The Cases of Egypt in 2011 and Iran in 2009.” Arab Media and Society 17 (Winter 2013). 15 July 2014 ‹http://www.arabmediasociety.com/index.php?article=816&p=0›. Tzu, Sun. Sun Tzu: The Art of War. S.l.: Pax Librorum Pub. H, 2009. Valizadeh, Reza. “Invitation to the Public Shooting with the Camera.” RFI, 2011. 19 June 2014 ‹http://www.persian.rfi.fr/%D8%AF%D8%B9%D9%88%D8%AA-%D8%A8%D9%87-%D8%B4%D9%84%DB%8C%DA%A9-%D8%B9%D9%85%D9%88%D9%85%DB%8C-%D8%A8%D8%A7-%D8%AF%D9%88%D8%B1%D8%A8%DB%8C%D9%86-%D8%B9%DA%A9%D8%A7%D8%B3%DB%8C-20110307/%D8%A7%DB%8C%D8%B1%D8%A7%D9%86›. Wagner, Ben. Exporting Censorship and Surveillance Technology. Netherlands: Humanist Institute for Co-operation with Developing Countries (Hivos), 2012. 7 July 2014 ‹https://hivos.org/sites/default/files/exporting_censorship_and_surveillance_technology_by_ben_wagner.pdf›. World Bank. Mobile Cellular Subscriptions (per 100 People). The World Bank. N.d. 27 June 2014 ‹http://data.worldbank.org/indicator/IT.CEL.SETS.P2›.
APA, Harvard, Vancouver, ISO, and other styles
39

Meese, James. "“It Belongs to the Internet”: Animal Images, Attribution Norms and the Politics of Amateur Media Production." M/C Journal 17, no. 2 (February 24, 2014). http://dx.doi.org/10.5204/mcj.782.

Full text
Abstract:
Cute pictures of animals feature as an inoffensive and adorable background to the contemporary online experience with cute content regularly shared on social media platforms. Indeed the demand for cuteness is so strong in the current cultural milieu that some animals become recognisable animal celebrities in the process (Hepola). However, despite the existence of this professionalisation in some sections of the cute economy, amateurs produce the majority of cute content that circulates online. This is largely because one of the central contributors to this steady stream of cute animal pictures is the subforum Aww, hosted on the online community Reddit. Aww is wholly dedicated to pictures of cute things and allows users to directly submit cute content directly to the site. Aww is one of the default subforums that new Reddit users are automatically subscribed to and is immensely popular, featuring over 4.2 million dedicated subscribers as well as untold casual visits. The section is self-described as: “Things that make you go AWW! -- like puppies, and bunnies, and so on...Feel free to post pictures, videos and stories of cute things” ("The cutest things on the internet!"). Users upload cute animal photos that they have taken and wait for the Reddit community to vote on their favourite pictures. The voting mechanism helps users to acknowledge their favourite posts, with the most popular featured on the front page of Aww (for a detailed critique of this process see van der Nagel 2013). The user-generated model of the site means that instead of visitors being confronted with a formally curated selection of cute animal photos, Aww offers a constantly changing mixture of amateur, semi-pro and professional content. Aww - and Reddit more generally - stand as an emblematic example of participatory culture (Jenkins 2006), with users playing an active role in the production and curation of online content. However, given the commercial nature of many user-generated content sites, this amateur media activity is becoming increasingly subject to intellectual property claims and conflicts (see Burgess; Kennedy). Across the internet there are growing tensions between website operators and amateur producers. As Jenny Kennedy (132) notes, while these platforms promote a public rhetoric of “sharing”, these corporate narratives “downplay their economic power” and imply “that they do not control the practices contained within their sites”. Subsequently, the expectations of users regarding how content is managed and organised can differ substantially from the corporate goals of social media companies. This paper contributes to the growing body of literature interested in the politics of amateur media production (see Hunter and Lastowka; Benkler; Burgess; Kennedy) by exploring the emergence of attribution norms and informal enforcement measures in and around the Aww online community. In contrast to professional content creators, amateurs often have fewer resources on hand to protect their copyrighted work and are also challenged by a pervasive online rhetoric that suggests that popular content essentially “belongs to the Internet” (Douglas). A number of communities on Reddit have questioned the company’s handling of amateur content with users suggesting that Reddit actively seeks to de-contextualise original content and not attribute original creators. By examining how amateur creators and online communities regulate content online, I interrogate the power relations that exist between social media platforms and users and explore how the corporate rhetoric of participatory culture interacts with the legal framework of copyright law. This article also contributes to existing legal scholarship on communities of practice and norms-based intellectual property systems. This literature has explored how social norms effectively regulate the protection of, among other things, recipes (Fauchart and Von Hippel), fashion design (Raustiala and Sprigman) and stand-up comedy routines (Oliar and Sprigman), in situations where copyright law does not function as an effective regulatory mechanism. Often these norms are in line with copyright law protections, but in other cases they diverge from these legal principles. In this paper I suggest that particular sections of Reddit function in a similar way, with their own set of self-governing norms, and that these norms largely align with the philosophical aims of copyright law. The paper begins by outlining a series of recent debates that have occurred between amateur media creators and Reddit, before exploring how norms are regulated on Reddit subforums Aww and Karma Court. I then offer some brief conclusions on the value of paying attention to how social norms structure forms of “sharing” (see Kennedy) and provide a useful way for amateur media producers to protect their content without going through formal legal processes. Introducing Reddit and the Confused Politics of Amateur Content Reddit is a social news site, a vibrant community and one of the most popular websites online. It stands as the most visible iteration of a long-standing tradition of user-generated and managed news, one that goes back to websites like Slashdot, which operated in the mid to late-90s. Founded in 2005 Reddit was launched after only one funding round of venture capital, receiving $100k in seed funding from Y Combinatory (Miller). Despite some early rivalry between Reddit and competitor site Digg, Reddit had enough potential to be purchased by Condé Nast for an estimated $20 million (Carr). Reddit’s audience numbers have grown exponentially in the last few years, with the site currently receiving over 5 billion page views and 114 million unique visitors per month (“About Reddit”). It has also changed focus significantly in the last few years with the site now “as much about posting interesting or funny pictures as it is about news” (Sepponen). Reddit hosts a number of individual subforums (called subreddits), which focus on a particular topic and function essentially like online bulletin boards. The front-page of Reddit showcases the most popular content from across the whole website, and user-generated content features heavily here. Amateur media cannot spread without the structural support of social media platforms, but this support is qualified in particular ways. Reddit stands as a paradigmatic case. Users on Reddit are “incentivized to submit direct links to images, because viewers can get to them more easily” (Douglas) and the website encourages amateur creators to use a preferred content server – Imgur – to host images. The Imgur service provides a direct public link to an image – even bypassing the Reddit discussion page – and with its free hosting and limited ads it has become a popular service and is used by most Reddit users (Slater-Robins). For the majority of Reddit users this is an unproblematic partnership. Imgur is free, effective and fast. However, a vocal minority of Reddit users and amateur creators claim that the partnership between Reddit and Imgur has created the equivalent of an online ghetto (Douglas).As Nick Douglas explains, when using services like Imgur there is no requirement to either provide an external link to a creators website or to attribute the creator, limiting the ability for an amateur creator to gain exposure. It also bypasses existing revenue streams that may have been set up by creators, including ad-supported websites or online stores offering merchandise. As a result creators have little opportunity to benefit either economically or reputationally from this system. This occurs to such an extent that “there are actually warnings against submitting your own [original] work” to particular subforums on Reddit (Douglas). For example, some forum moderators require submissions to either “link directly to a specific image file or to a website with minimal ads” (“Reddit Pics”). It is in this context, that the posting of original content without attribution is not actively policed. There are a number of complaints circulating within the Reddit community about these practices (see “Ok, look people. I know you heart Imgur, but webcomics? Just link to the freaking site”; “The problem with reddit”). Many creators have directly protested against this aspect of Reddit’s structural organisation. Blogger Benjamin Grelle (a.k.a The Frogman) and writer Chris Menning are two notable examples. Grelle’s protest was witty and dramatic. He wrote a blog post featuring a picture of an email he sent to Imgur offering the company a choice: send him a huge novelty check for $10,000 or alternatively, add a proper attribution system that allows artists, photographers and content creators to properly credit their work. Grelle estimates that his work generated around $20,000 in ad revenue for Imgur; however the structure of Reddit and Imgur meant he earned little income from the “viral” success of his content. Grelle claimed he was happy for his work to be shared, but attribution meant that it was more likely a fan would follow the link to his website and provide him with some financial recompense for his work. Unsurprisingly, Grelle didn’t receive a paycheck and so in response has developed a unique way to gain exposure. He has started to insert himself into his work, “[s]o when you see a stolen Frogman piece, you still see Ben Grelle’s face” (Douglas). Chris Menning posted a blog about being banned from Reddit, hoping to bring to light some of the inequalities that persist around Reddit’s current structure. He began by noting that he had received a significant amount of traffic from them in the past. He had responded in kind by looking to create original content for particular subforums, knowing what a particular community would enjoy. However, his habit of providing the link to his own website along with the content he posted saw him get labelled as a spammer and banned by administrators. Menning chose not to fight the ban:It seems that the only way I could avoid [getting banned] is if I were to relinquish any rights to my original content and post it exclusively to Imgur. In effect, reddit punishes the creation of original content, and rewards content theft (Menning). Instead he decided to quit Reddit, claiming that Reddit’s approach would carry long-term consequences as the platform provided little incentive for creators to produce wholly original content. It is worth noting that neither Menning nor Grelle turned to legal avenues in order to gain financial restitution. Considering the nature of the practices they were complaining about, compensation in the form of an injunction or damages would have certainly been possible. In Benjamin’s case, a user had combined a number of his copyrighted works into one image and posted the image to Imgur without attribution --this infringed Grelle’s copyright in his work as well as his moral right to be attributed as the creator of the work. However, the public comments of both creators suggest that despite the possibility of legal success, their issue was not so much to do with their individual cases but rather the broader structural issues at play within Reddit. While they might gain individually from a successful legal challenge, over the long term Reddit would continue to be a fraught place for amateur and semi-professional content creators. Certain parts of the Reddit community appear to be sympathetic to these issues, and the complaints of dissenting users like Menning and Grelle have received active support from some users and moderators on the site. This has led to changes in the way content is being posted and managed on Aww, and has also driven the emergence of a satirical user-run court entitled Karma Court. In these spaces moderators and members establish community norms, regularly police the correct attribution of works and challenge the de-contextualisation of content overtly encouraged by Reddit, Imgur and other subforums. In the following section I will examine both Aww and Karma Court in order to explore how these norms are established and negotiated by both moderators and users alike. reddit.com/r/aww: The Online Hub of Cute Animal Pictures As we have seen, the design of Reddit and Imgur creates a number of problems for amateur creators who wish to protect their intellectual property. To address these shortcomings, the Aww community has created its own informal regulatory systems. Volunteer moderators play a crucial role: they establish informal codes of conduct for the Aww community and enforce various rules about how the site should be used. One of these rules relates to attribution. Users are asked to to “post original content whenever possible or attribute original content creators” ("The cutest things on the internet!"). Due to the volunteer nature of the work and the size of the Aww sub-reddit, moderator enforcement is haphazard. Consequently, responsibility falls on the wider user community to self-police. Despite its informal nature, this process manages to facilitate a fairly consistent standard of attribution. In this way it functions as an informal method of intellectual property protection. It is worth noting however that this commitment to original content is not solely due to the moral character of Aww users. A significant motivation is the distribution of karma points amongst Reddit users. Karma, which represents your good standing within the Reddit community, can be earned through user likes and votes – these push the most popular content to the front page of each subforum. Thus karma stands as a numerical representation of a user’s value to Reddit. This ostensibly democratic system has the paradoxical effect of fuelling intellectual property violations on the site. Users often repost other users’ jpegs, animated gifs, and other content, in order to reap the social and cultural capital that comes with posting a popular picture. In some cases they claim authorship of the content; in other cases they simply re-post content that they feel “belongs to the internet” (Douglas). Some content is so popular or pervasive online (this content that is often described as “viral”) that users feel there is little reason or need to attribute content. This helps to explain the persistence of ownership and attribution conflicts on Reddit. In the eyes of some users and moderators the management of these rights and the correct distribution of karma are seen to be vital to the long-term functioning of site. The karma system offers a numerical representation of each contributor’s value. Re-posting already successful content and claiming it as your own challenges the proper functioning of the karma system and potentially ‘inhibits the innovative potential of contributions (Richterich). On Aww the re-posting of original content is viewed as a taboo act that breaches these norms. The poster is seen to have engaged in deceptive conduct in order to gain karma for their user profile. In addition there is a strong ethic that runs through these comment threads that the original creator deserves attribution. There is a presumption that this attribution is vital in order to increasing the possible marketability of the posted content and to recognise and courage creators within the community. This sort of community-driven regulation contrasts with the aforementioned site design of Reddit and Imgur, which frustrates effective authorship attribution practices. Aww users, in contrast, have shown a willingness to defend what they see as the intellectual property rights of content creators.A series of recent examples outline how this process works in practice. User “moonlikeme123” posted a picture of a cat with its hands on the steering wheel of a car. The picture was entitled “we don’t need to ask for directions, Helen”. During the same day, three separate users had identified the picture as a repost, with one noting that the same picture was already on the front page of Aww. “moonlikeme123” received no karma points for the picture. In a second example, the user “nibblur” posted a photo of a kitten “hunting” a toy mouse. Within a day, one enterprising user had identified the original photographer – “torode”, an amateur photographer – and linked to his Reddit profile (see fig. 2) ("ferocious cat hunting its prey: aww."). One further example: on 15 July 2013 “Cuzacelmare” posted a picture of two dogs comforting each other – an image which had originally been posted by “lauface”. Again, users were quick to point out the lack of attribution and the attempt to claim someone else’s content as their own (“Comforting her sister during a storm: aww). It is worth noting that some Reddit users consider attributing content to be entirely without benefit. Some deride karma as “meaningless” and suggest that as a significant amount of content online is regularly reposted elsewhere, there is little harm done in re-posting what is essentially amateur content destined to be lost in the bowels of the internet. For example, the comments that follow Cuzacelmare’s reflect an ambivalence about reposting, suggesting that users weigh up the benefits of exposure gained by the re-posting against the lack of attribution granted and the increasingly decontextualized nature of the photo itself:Why does everyone get so bitchy about reposts. Not everyone is on ALL the time or has been on Rreddit since it was created. I mean if you've seen it already ignore it. It's just picture you aren't forced to click the link. [sic] (“Comforting her sister during a storm: aww”)We're arguing semantics, but any content that gets attention can benefit the creator, whether it's reddit or Youtube (“Comforting her sister during a storm: aww”) Such discussions are common on comment threads following re-posts by other users. They underline the conflicted status of this ephemeral media and the underlying frictions that are part of these processes. These discussions underline the fact that on Reddit the “sharing” (Kennedy) and “spreading” (Jenkins et al.) of content is not seen as an unquestioned positive but rather as a contestable structural feature that needs to be constantly negotiated and discussed. These informal methods of identification, post-hoc attribution and criticism in comment threads have been the long-standing method used to redress questions of attribution and ownership of content on Reddit. However in recent times, Reddit users have turned to satirical methods of formal adjudication for particularly egregious cases. A sub-reddit, Karma Court, now functions as an informal tribunal in which punishment is meted out for “the abuse of karma and general contemptible actions heretofore identified as wrongdoing” (“Constitution and F.A.Q of the Karma Court”). Due to its double function as both an adjudicator and satire of users overly-invested in online debates, there is no limit to the possible “crimes” a user may be charged with. The following charges are only presented as guidelines and speak to common negative experiences on online: (1). Douchebaggery - When one is being a douche.(2). Defamation - Tarnishing another redditor's [user’s] username.(3). Public Indecency - When a user flexes his or her 'e-peen' with the intent to shame other users.(4). OhShit.exe - Intentional reposting that results in reddit Gold.(5). GrandTheft.jpg - Reposting while claiming credit for the post.(6). Obstruction of Justice - Impeding or interfering with an investigation, such as submitting false screenshots, deleting evidence, or providing false evidence to the court.(7). Other - Literally anything else you want. We like creative names for charges.(“Constitution and F.A.Q of the Karma Court”) In Karma Court, legal representation can be sourced from a list of attorneys and judges, populated by users who volunteer to help adjudicate the case. They are required to have been a Reddit member for over six months. The only punishment is a public shaming. Interestingly Karma Court has developed a fair reposting clause that attempts to manage the complex debates around reposting and attribution. Under the non-binding satirical clause, users are able to repost content if it has not featured on the front page of a sub-reddit for seven or more days, if the re-poster acknowledges in the title or description that they are re-posting or if the original poster has less than 30,000 link karma (which means that the original poster has not substantially contributed to the Reddit community). If a re-poster does not adhere by these rules and claims a re-post as their own original content (or “OC”), they can be charged with “grandtheft.jpg” and brought to trial by another Reddit user. As one of the most popular subforums, a number of cases have emerged from Aww. The aforementioned re-poster “Cuzacelmare” (“I am bringing /U/ Cuzacelmare to trial …”) was “charged” through this process and served with a summons after denying “cute and innocent animals of that subreddit of their much deserved karma”. Similar cases to do with re-posting without attribution on Aww involve “FreshCorio” (“Reddit vs. U/FreshCorio …”) and “ninjacollin” (“People of Reddit vs. /U/ ninjacollin”) who were also brought to karma court. In each case prosecutors were adamant that false authorship claims needed to be punished. With these mock trials run by volunteers it takes time for arguments to be heard and judgment to occur; however “ninjacollin” expedited the legal process by offering a full confession. As a new user, “ninjacollin” was reprimanded severely for his actions and the users on Karma Court underlined the consequences of not identifying original content creators when re-posting content. Ownership and Attribution: Amateur Media, Distribution and Law The practices outlined above offer a number of alternate ways to think about amateur media and how it is distributed. An increasingly complex picture of content attribution and circulation emerges once we take into account the structural operation of Reddit, the intellectual property norms of users, and the various formal and informal systems of regulation that are appearing on the site. Such practices require users to negotiate complex questions of ownership between each other and in relation to corporate bodies. These negotiations often lead to informal agreements around a set of norms to regulate the spread of content within a particular community, suggesting that the lack of a formal legal process in these debates does not mean that there is an absence of regulation. As noted throughout this paper, the spread of online content often involves progressive de-contextualisation. Website design features often support this process in the hopes of encouraging content to spread in a fashion amenable to their corporate goals. Considering this tendency for content to be decontextualized online, the presence of attribution norms on subforums like Aww is significant. Instead of remixing, spreading and re-purposing content indiscriminately, users retain a concept of ownership and attribution that tracks closely to the basic principles of copyright law. Rather than users radically redefining concepts of attribution and ownership, as prefigured in some of the more utopian accounts of participatory media, the dominant norms of the Reddit community extend a discourse of copyright and ownership. As well as providing a greater level of detail to contemporary debates around amateur media and its viral or spreadable nature (Burgess; Jenkins; Jenkins et al), this analysis offers some lessons for copyright law. The emergence of norms in particular Reddit subforums which govern the use of copyrighted content and the use of a mock court structure suggests that online communities have the capacity to engage in forms of redress for amateur creators. These organic forms of copyright management operate adjacent to formal legal structures of copyright law. However, they are more accessible and practical for amateur creators, who do not always have the money to hire lawyers, especially when the market value of their content might be negligible. The informal regulatory systems outlined above may not operate perfectly but they reveal communities who are willing to engage foundational conversations around the importance of attribution and ownership. Following the existing literature (Fauchart and Von Hippel; Raustiala and Sprigman; Schultz; Oliar and Sprigman), I suggest that these online social norms provide a useful form of alternative protection for amateur creators. Acknowledgements Thanks to Ramon Lobato and Emily van der Nagel for comments and productive discussions around these issues. I am also grateful to the two anonymous peer reviewers for their assistance in developing this argument. References “About Reddit.” Reddit, 2014. 29 Apr. 2014 ‹http://www.reddit.com/about/›. Benkler, Yochai. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven: Yale University Press, 2006. Burgess, Jean. “YouTube and the Formalisation of Amateur Media.” Amateur Media: Social, Cultural and Legal Perspectives. In Dan Hunter, Ramon Lobato, Megan Richardson, and Julian Thomas, eds. Oxford: Routledge, 2012. Carr, Nicholas. “Left Alone by Its Owner, Reddit Soars.” The New York Times: Business, 2 Sep. 2012. “Comforting Her Sister during a Storm: aww.” reddit: the front page of the internet, 15 July 2013. “Constitution and F.A.Q of the Karma Court.” reddit: the front page of the internet, 2014. Douglas, Nick. “Everything on the Internet Gets Stolen: Here’s How You Should Feel about That.” Slacktory, 8 Sep. 2009. Fauchart, Emmanual, and Eric von Hippel. “Norms-Based Intellectual Property Systems: The Case of French Chefs.” Organization Science 19.2 (2008): 187 - 201 "Ferocious Cat Hunting Its Prey: aww." reddit: the front page of the internet, 4 April 2013. 29 Apr. 2014 ‹http://www.rreddit.com/r/aww/comments/1bobcp/ferocious_cat_hunting_its_prey/›. Hepola, Sarah. “The Internet is Made of Kittens.” Salon.com, 11 Feb. 2009. 29 Apr. 2014 ‹http://www.salon.com/2009/02/10/cat_internet/›. Hunter, Dan, and Greg Lastowka. “Amateur-to-Amateur.” William & Mary Law Review 46 (2004): 951 - 1030. “I Am Bringing /U/ Cuzacelmare to Trial on the Basis of Being One of the Biggest _______ I’ve Ever Seen, by Reposting Cute Animal Pictures to /R/Awww. Feels.Jpg.” reddit: the front page of the internet, 21 March 2013. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York University Press, 2006. Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York University Press, 2013. Menning, Chris. "So I Got Banned from Reddit" Modern Primate, 23 Aug. 2012. Miller, Keery. “How Y Combinator Helped Shape Reddit.” Bloomberg Businessweek, 26 Sep. 2007. 29 Apr. 2014 ‹http://www.businessweek.com/stories/2007-09-26/how-y-combinator-helped-shape-redditbusinessweek-business-news-stock-market-and-financial-advice›. “Ok, Look People. I Know You Heart Imgur, But Webcomics? Just Link to the Freaking Site.” reddit: the front page of the internet, 22 Aug. 2011. Oliar, Dotan, and Christopher Sprigman. “There’s No Free Laugh (Anymore): The Emergence of Intellectual Property Norms and the Transformation of Stand-Up Comedy.” Virginia Law Review 94.8 (2009): 1787 – 1867. “People of reddit vs. /U/Ninjacollin for Grandtheft.jpg.” reddit: the front page of the internet, 30 Jan. 2013. Raustiala, Kal, and Christopher Sprigman. “The Piracy Paradox: Innovation and Intellectual Property in Fashion Design”. Virginia Law Review 92.8 (2006): 1687-1777. “Reddit v. U/FreshCorio. User Uploads Popular Repost Picture of R/AWW and Claims It Is His Sister’s Cat. Falsely Claims It Is His Cakeday for Good Measure.” reddit: the front page of the internet, 12 Apr. 2013. 29 Apr. 2014 ‹http://www.reddit.com/r/KarmaCourt/comments/1c7vxz/reddit_vs_ufreshcorio_user_uploads_popular_repost/›. “Reddit Pics.” reddit: the front page of the internet, 2014. 29 Apr. 2014 ‹http://www.reddit.com/r/pics/›. Richterich, Annika. “’Karma, Precious Karma!’ Karmawhoring on Reddit and the Front Page’s Econometrisation.” Journal of Peer Production 4 (2014). 29 Apr. 2014 ‹http://peerproduction.net/issues/issue-4-value-and-currency/peer-reviewed-articles/karma-precious-karma/›. Schultz, Mark. “Fear and Norms and Rock & Roll: What Jambands Can Teach Us about Persuading People to Obey Copyright Law.” Berkley Technology Law Journal 21.2 (2006): 651 – 728. Sepponen, Bemmu. “Why Redditors Gave Imgur a Chance.” Social Media Today, 20 July 2011. Slater-Robins, Max. “From Rags to Riches: The Story of Imgur.” Neowin, 21 Apr. 2013. "The Cutest Things on the Internet!" reddit: the front page of the internet, n.d. “The Problem with reddit.” reddit: the front page of the internet, 23 Aug. 2012. 29 Apr. 2014 ‹http://www.rreddit.com/r/technology/comments/ypbe2/the_problem_with_rreddit/›. Van der Nagel, Emily. “Faceless Bodies: Negotiating Technological and Cultural Codes on reddit gonewild.” Scan: Journal of Media Arts Culture 10.2 (2013). "We Don’t Need to Ask for Directions, Helen: aww." reddit: the front page of the internet, 30 June 2013. 29 Apr. 2014 ‹http://www.rreddit.com/r/aww/comments/1heut6/we_dont_need_to_ask_for_directions_helen/›.
APA, Harvard, Vancouver, ISO, and other styles
40

Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2696.

Full text
Abstract:
Introduction It has frequently been noted that ICTs and social networking applications have blurred the once-clear boundary between work, leisure and entertainment, just as they have collapsed the distinction between public and private space. While each individual has a sense of what “home” means, both in terms of personal experience and more conceptually, the following three examples of online interaction (based on participants’ interest, or involvement, in activities traditionally associated with the home: pet care, craft and cooking) suggest that the utilisation of online communication technologies can lead to refined and extended definitions of what “home” is. These examples show how online communication can assist in meeting the basic human needs for love, companionship, shelter and food – needs traditionally supplied by the home environment. They also provide individuals with a considerably expanded range of opportunities for personal expression and emotional connection, as well as creative and commercial production, than that provided by the purely physical (and, no doubt, sometimes isolated and isolating) domestic environment. In this way, these case studies demonstrate the interplay and melding of physical and virtual “home” as domestic practices leach from the most private spaces of the physical home into the public space of the Internet (for discussion, see Gorman-Murray, Moss, and Rose). At the same time, online interaction can assert an influence on activity within the physical space of the home, through the sharing of advice about, and modeling of, domestic practices and processes. A Dog’s (Virtual) Life The first case study primarily explores the role of online communities in the formation and expression of affective values and personal identity – as traditionally happens in the domestic environment. Garber described the 1990s as “the decade of the dog” (20), citing a spate of “new anthropomorphic” (22) dog books, Internet “dog chat” sites, remakes of popular classics such as Lassie Come Home, dog friendly urban amenities, and the meteoric rise of services for pampered pets (28-9). Loving pets has become a lifestyle and culture, witnessed and commodified in Pet Superstores as well as in dog collectables and antiques boutiques, and in publications like The Bark (“the New Yorker of Dog Magazines”) and Clean Run, the international agility magazine, Website, online book store and information gateway for agility products and services. Available online resources for dog lovers have similarly increased rapidly during the decade since Garber’s book was published, with the virtual world now catering for serious hobby trainers, exhibitors and professionals as well as the home-based pet lover. At a recent survey, Yahoo Groups – a personal communication portal that facilitates social networking, in this case enabling users to set up electronic mailing lists and Internet forums – boasted just over 9,600 groups servicing dog fanciers and enthusiasts. The list Dogtalk is now an announcement only mailing list, but was a vigorous discussion forum until mid-2006. Members of Dogtalk were Australian-based “clicker-trainers”, serious hobbyist dog trainers, many of whom operated micro-businesses providing dog training or other pet-related services. They shared an online community, but could also engage in “flesh-meets” at seminars, conferences and competitive dog sport meets. An author of this paper (Rutherford) joined this group two years ago because of her interest in clicker training. Clicker training is based on an application of animal learning theory, particularly psychologist E. F. Skinner’s operant conditioning, so called because of the trademark use of a distinctive “click” sound to mark a desired behaviour that is then rewarded. Clicker trainers tend to dismiss anthropomorphic pack theory that positions the human animal as fundamentally opposed to non-human animals and, thus, foster a partnership (rather than a dominator) mode of social and learning relationships. Partnership and nurturance are common themes within the clicker community (as well as in more traditional “home” locations); as is recognising and valuing the specific otherness of other species. Typically, members regard their pets as affective equals or near-equals to the human animals that are recognised members of their kinship networks. A significant function of the episodic biographical narratives and responses posted to this list was thus to affirm and legitimate this intra-specific kinship as part of normative social relationship – a perspective that is not usually validated in the general population. One of the more interesting nexus that evolved within Dogtalk links the narrativisation of the pet in the domestic sphere with the pictorial genre of the family album. Emergent technologies, such as digital cameras together with Web-based image manipulation software and hosting (as provided by portals like Photobucket and Flickr ) democratise high quality image creation and facilitate the sharing of these images. Increasingly, the Dogtalk list linked to images uploaded to free online galleries, discussed digital image composition and aesthetics, and shared technical information about cameras and online image distribution. Much of this cultural production and circulation was concerned with digitally inscribing particular relationships with individual animals into cultural memory: a form of family group biography (for a discussion of the family photograph as a display of extended domestic space, see Rose). The other major non-training thread of the community involves the sharing and witnessing of the trauma suffered due to the illness and loss of pets. While mourning for human family members is supported in the off-line world – with social infrastructure, such as compassionate leave and/or bereavement counselling, part of professional entitlements – public mourning for pets is not similarly supported. Yet, both cultural studies (in its emphasis on cultural memory) and trauma theory have highlighted the importance of social witnessing, whereby traumatic memories must be narratively integrated into memory and legitimised by the presence of a witness in order to loosen their debilitating hold (Felman and Laub 57). Postings on the progress of a beloved animal’s illness or other misfortune and death were thus witnessed and affirmed by other Dogtalk list members – the sick or deceased pet becoming, in the process, a feature of community memory, not simply an individual loss. In terms of such biographical narratives, memory and history are not identical: “Any memories capable of being formed, retained or articulated by an individual are always a function of socially constituted forms, narratives and relations … Memory is always subject to active social manipulation and revision” (Halbwachs qtd. in Crewe 75). In this way, emergent technologies and social software provide sites, akin to that of physical homes, for family members to process individual memories into cultural memory. Dogzonline, the Australian Gateway site for purebred dog enthusiasts, has a forum entitled “Rainbow Bridge” devoted to textual and pictorial memorialisation of deceased pet dogs. Dogster hosts the For the Love of Dogs Weblog, in which images and tributes can be posted, and also provides links to other dog oriented Weblogs and Websites. An interesting combination of both therapeutic narrative and the commodification of affect is found in Lightning Strike Pet Loss Support which, while a memorial and support site, also provides links to the emerging profession of pet bereavement counselling and to suppliers of monuments and tributary urns for home or other use. loobylu and Narratives of Everyday Life The second case study focuses on online interactions between craft enthusiasts who are committed to the production of distinctive objects to decorate and provide comfort in the home, often using traditional methods. In the case of some popular craft Weblogs, online conversations about craft are interspersed with, or become secondary to, the narration of details of family life, the exploration of important life events or the recording of personal histories. As in the previous examples, the offering of advice and encouragement, and expressions of empathy and support, often characterise these interactions. The loobylu Weblog was launched in 2001 by illustrator and domestic crafts enthusiast Claire Robertson. Robertson is a toy maker and illustrator based in Melbourne, Australia, whose clients have included prominent publishing houses, magazines and the New York Public Library (Robertson “Recent Client List” online). She has achieved a measure of public recognition: her loobylu Weblog has won awards and been favourably commented upon in the Australian press (see Robertson “Press for loobylu” online). In 2005, an article in The Age placed Robertson in the context of a contemporary “craft revolution”, reporting her view that this “revolution” is in “reaction to mass consumerism” (Atkinson online). The hand-made craft objects featured in Robertson’s Weblogs certainly do suggest engagement with labour-intensive pursuits and the construction of unique objects that reject processes of mass production and consumption. In this context, loobylu is a vehicle for the display and promotion of Robertson’s work as an illustrator and as a craft practitioner. While skills-based, it also, however, promotes a family-centred lifestyle; it advocates the construction by hand of objects designed to enhance the appearance of the family home and the comfort of its inhabitants. Its specific subject matter extends to related aspects of home and family as, in addition to instructions, ideas and patterns for craft, the Weblog features information on commercially available products for home and family, recipes, child rearing advice and links to 27 other craft and other sites (including Nigella Lawson’s, discussed below). The primary member of its target community is clearly the traditional homemaker – the mother – as well as those who may aspire to this role. Robertson does not have the “celebrity” status of Lawson and Jamie Oliver (discussed below), nor has she achieved their market saturation. Indeed, Robertson’s online presence suggests a modest level of engagement that is placed firmly behind other commitments: in February 2007, she announced an indefinite suspension of her blog postings so that she could spend more time with her family (Robertson loobylu 17 February 2007). Yet, like Lawson and Oliver, Robertson has exploited forms of domestic competence traditionally associated with women and the home, and the non-traditional medium of the Internet has been central to her endeavours. The content of the loobylu blog is, unsurprisingly, embedded in, or an accessory to, a unifying running commentary on Robertson’s domestic life as a parent. Miles, who has described Weblogs as “distributed documentaries of the everyday” (66) sums this up neatly: “the weblogs’ governing discursive quality is the manner in which it is embodied within the life world of its author” (67). Landmark family events are narrated on loobylu and some attract deluges of responses: the 19 June 2006 posting announcing the birth of Robertson’s daughter Lily, for example, drew 478 responses; five days later, one describing the difficult circumstances of her birth drew 232 comments. All of these comments are pithy, with many being simple empathetic expressions or brief autobiographically based commentaries on these events. Robertson’s news of her temporary retirement from her blog elicited 176 comments that both supported her decision and also expressed a sense of loss. Frequent exclamation marks attest visually to the emotional intensity of the responses. By narrating aspects of major life events to which the target audience can relate, the postings represent a form of affective mass production and consumption: they are triggers for a collective outpouring of largely homogeneous emotional reaction (joy, in the case of Lily’s birth). As collections of texts, they can be read as auto/biographic records, arranged thematically, that operate at both the individual and the community levels. Readers of the family narratives and the affirming responses to them engage in a form of mass affirmation and consumerism of domestic experience that is easy, immediate, attractive and free of charge. These personal discourses blend fluidly with those of a commercial nature. Some three weeks after loobylu announced the birth of her daughter, Robertson shared on her Weblog news of her mastitis, Lily’s first smile and the family’s favourite television programs at the time, information that many of us would consider to be quite private details of family life. Three days later, she posted a photograph of a sleeping baby with a caption that skilfully (and negatively) links it to her daughter: “Firstly – I should mention that this is not a photo of Lily”. The accompanying text points out that it is a photo of a baby with the “Zaky Infant Sleeping Pillow” and provides a link to the online pregnancystore.com, from which it can be purchased. A quotation from the manufacturer describing the merits of the pillow follows. Robertson then makes a light-hearted comment on her experiences of baby-induced sleep-deprivation, and the possible consequences of possessing the pillow. Comments from readers also similarly alternate between the personal (sharing of experiences) to the commercial (comments on the product itself). One offshoot of loobylu suggests that the original community grew to an extent that it could support specialised groups within its boundaries. A Month of Softies began in November 2004, describing itself as “a group craft project which takes place every month” and an activity that “might give you a sense of community and kinship with other similar minded crafty types across the Internet and around the world” (Robertson A Month of Softies online). Robertson gave each month a particular theme, and readers were invited to upload a photograph of a craft object they had made that fitted the theme, with a caption. These were then included in the site’s gallery, in the order in which they were received. Added to the majority of captions was also a link to the site (often a business) of the creator of the object; another linking of the personal and the commercial in the home-based “cottage industry” sense. From July 2005, A Month of Softies operated through a Flickr site. Participants continued to submit photos of their craft objects (with captions), but also had access to a group photograph pool and public discussion board. This extension simulates (albeit in an entirely visual way) the often home-based physical meetings of craft enthusiasts that in contemporary Australia take the form of knitting, quilting, weaving or other groups. Chatting with, and about, Celebrity Chefs The previous studies have shown how the Internet has broken down many barriers between what could be understood as the separate spheres of emotional (that is, home-based private) and commercial (public) life. The online environment similarly enables the formation and development of fan communities by facilitating communication between those fans and, sometimes, between fans and the objects of their admiration. The term “fan” is used here in the broadest sense, referring to “a person with enduring involvement with some subject or object, often a celebrity, a sport, TV show, etc.” (Thorne and Bruner 52) rather than focusing on the more obsessive and, indeed, more “fanatical” aspects of such involvement, behaviour which is, increasingly understood as a subculture of more variously constituted fandoms (Jenson 9-29). Our specific interest in fandom in relation to this discussion is how, while marketers and consumer behaviourists study online fan communities for clues on how to more successfully market consumer goods and services to these groups (see, for example, Kozinets, “I Want to Believe” 470-5; “Utopian Enterprise” 67-88; Algesheimer et al. 19-34), fans regularly subvert the efforts of those urging consumer consumption to utilise even the most profit-driven Websites for non-commercial home-based and personal activities. While it is obvious that celebrities use the media to promote themselves, a number of contemporary celebrity chefs employ the media to construct and market widely recognisable personas based on their own, often domestically based, life stories. As examples, Jamie Oliver and Nigella Lawson’s printed books and mass periodical articles, television series and other performances across a range of media continuously draw on, elaborate upon, and ultimately construct their own lives as the major theme of these works. In this, these – as many other – celebrity chefs draw upon this revelation of their private lives to lend authenticity to their cooking, to the point where their work (whether cookbook, television show, advertisement or live chat room session with their fans) could be described as “memoir-illustrated-with-recipes” (Brien and Williamson). This generic tendency influences these celebrities’ communities, to the point where a number of Websites devoted to marketing celebrity chefs as product brands also enable their fans to share their own life stories with large readerships. Oliver and Lawson’s official Websites confirm the privileging of autobiographical and biographical information, but vary in tone and approach. Each is, for instance, deliberately gendered (see Hollows’ articles for a rich exploration of gender, Oliver and Lawson). Oliver’s hip, boyish, friendly, almost frantic site includes the what are purported-to-be self-revelatory “Diary” and “About me” sections, a selection of captioned photographs of the chef, his family, friends, co-workers and sponsors, and his Weblog as well as footage streamed “live from Jamie’s phone”. This self-revelation – which includes significant details about Oliver’s childhood and his domestic life with his “lovely girls, Jools [wife Juliette Norton], Poppy and Daisy” – completely blurs the line between private life and the “Jamie Oliver” brand. While such revelation has been normalised in contemporary culture, this practice stands in great contrast to that of renowned chefs and food writers such as Elizabeth David, Julia Child, James Beard and Margaret Fulton, whose work across various media has largely concentrated on food, cooking and writing about cooking. The difference here is because Oliver’s (supposedly private) life is the brand, used to sell “Jamie Oliver restaurant owner and chef”, “Jamie Oliver cookbook author and TV star”, “Jamie Oliver advertising spokesperson for Sainsbury’s supermarket” (from which he earns an estimated £1.2 million annually) (Meller online) and “Jamie Oliver social activist” (made MBE in 2003 after his first Fifteen restaurant initiative, Oliver was named “Most inspiring political figure” in the 2006 Channel 4 Political Awards for his intervention into the provision of nutritious British school lunches) (see biographies by Hildred and Ewbank, and Smith). Lawson’s site has a more refined, feminine appearance and layout and is more mature in presentation and tone, featuring updates on her (private and public) “News” and forthcoming public appearances, a glamorous selection of photographs of herself from the past 20 years, and a series of print and audio interviews. Although Lawson’s children have featured in some of her television programs and her personal misfortunes are well known and regularly commented upon by both herself and journalists (her mother, sister and husband died of cancer) discussions of these tragedies, and other widely known aspects of her private life such as her second marriage to advertising mogul Charles Saatchi, is not as overt as on Oliver’s site, and the user must delve to find it. The use of Lawson’s personal memoir, as sales tool, is thus both present and controlled. This is in keeping with Lawson’s professional experience prior to becoming the “domestic goddess” (Lawson 2000) as an Oxford graduated journalist on the Spectator and deputy literary editor of the Sunday Times. Both Lawson’s and Oliver’s Websites offer readers various ways to interact with them “personally”. Visitors to Oliver’s site can ask him questions and can access a frequently asked question area, while Lawson holds (once monthly, now irregularly) a question and answer forum. In contrast to this information about, and access to, Oliver and Lawson’s lives, neither of their Websites includes many recipes or other food and cooking focussed information – although there is detailed information profiling their significant number of bestselling cookbooks (Oliver has published 8 cookbooks since 1998, Lawson 5 since 1999), DVDs and videos of their television series and one-off programs, and their name branded product lines of domestic kitchenware (Oliver and Lawson) and foodstuffs (Oliver). Instruction on how to purchase these items is also featured. Both these sites, like Robertson’s, provide various online discussion fora, allowing members to comment upon these chefs’ lives and work, and also to connect with each other through posted texts and images. Oliver’s discussion forum section notes “this is the place for you all to chat to each other, exchange recipe ideas and maybe even help each other out with any problems you might have in the kitchen area”. Lawson’s front page listing states: “You will also find a moderated discussion forum, called Your Page, where our registered members can swap ideas and interact with each other”. The community participants around these celebrity chefs can be, as is the case with loobylu, divided into two groups. The first is “foodie (in Robertson’s case, craft) fans” who appear to largely engage with these Websites to gain, and to share, food, cooking and craft-related information. Such fans on Oliver and Lawson’s discussion lists most frequently discuss these chefs’ television programs and books and the recipes presented therein. They test recipes at home and discuss the results achieved, any problems encountered and possible changes. They also post queries and share information about other recipes, ingredients, utensils, techniques, menus and a wide range of food and cookery-related matters. The second group consists of “celebrity fans” who are attracted to the chefs (as to Robertson as craft maker) as personalities. These fans seek and share biographical information about Oliver and Lawson, their activities and their families. These two areas of fan interest (food/cooking/craft and the personal) are not necessarily or always separated, and individuals can be active members of both types of fandoms. Less foodie-orientated users, however (like users of Dogtalk and loobylu), also frequently post their own auto/biographical narratives to these lists. These narratives, albeit often fragmented, may begin with recipes and cooking queries or issues, but veer off into personal stories that possess only minimal or no relationship to culinary matters. These members also return to the boards to discuss their own revealed life stories with others who have commented on these narratives. Although research into this aspect is in its early stages, it appears that the amount of public personal revelation either encouraged, or allowed, is in direct proportion to the “open” friendliness of these sites. More thus are located in Oliver’s and less in Lawson’s, and – as a kind of “control” in this case study, but not otherwise discussed – none in that of Australian chef Neil Perry, whose coolly sophisticated Website perfectly complements Perry’s professional persona as the epitome of the refined, sophisticated and, importantly in this case, unapproachable, high-end restaurant chef. Moreover, non-cuisine related postings are made despite clear directions to the contrary – Lawson’s site stating: “We ask that postings are restricted to topics relating to food, cooking, the kitchen and, of course, Nigella!” and Oliver making the plea, noted above, for participants to keep their discussions “in the kitchen area”. Of course, all such contemporary celebrity chefs are supported by teams of media specialists who selectively construct the lives that these celebrities share with the public and the postings about others’ lives that are allowed to remain on their discussion lists. The intersection of the findings reported above with the earlier case studies suggests, however, that even these most commercially-oriented sites can provide a fruitful data regarding their function as home-like spaces where domestic practices and processes can be refined, and emotional relationships formed and fostered. In Summary As convergence results in what Turow and Kavanaugh call “the wired homestead”, our case studies show that physically home-based domestic interests and practices – what could be called “home truths” – are also contributing to a refiguration of the private/public interplay of domestic activities through online dialogue. In the case of Dogtalk, domestic space is reconstituted through virtual spaces to include new definitions of family and memory. In the case of loobylu, the virtual interaction facilitates a development of craft-based domestic practices within the physical space of the home, thus transforming domestic routines. Jamie Oliver’s and Nigella Lawson’s sites facilitate development of both skills and gendered identities by means of a bi-directional nexus between domestic practices, sites of home labour/identity production and public media spaces. As participants modify and redefine these online communities to best suit their own needs and desires, even if this is contrary to the stated purposes for which the community was instituted, online communities can be seen to be domesticated, but, equally, these modifications demonstrate that the activities and relationships that have traditionally defined the home are not limited to the physical space of the house. While virtual communities are “passage points for collections of common beliefs and practices that united people who were physically separated” (Stone qtd in Jones 19), these interactions can lead to shared beliefs, for example, through advice about pet-keeping, craft and cooking, that can significantly modify practices and routines in the physical home. Acknowledgments An earlier version of this paper was presented at the Association of Internet Researchers’ International Conference, Brisbane, 27-30 September 2006. The authors would like to thank the referees of this article for their comments and input. Any errors are, of course, our own. References Algesheimer, R., U. Dholake, and A. Herrmann. “The Social Influence of Brand Community: Evidence from European Car Clubs”. Journal of Marketing 69 (2005): 19-34. Atkinson, Frances. “A New World of Craft”. The Age (11 July 2005). 28 May 2007 http://www.theage.com.au/articles/2005/07/10/1120934123262.html>. Brien, Donna Lee, and Rosemary Williamson. “‘Angels of the Home’ in Cyberspace: New Technologies and Biographies of Domestic Production”. Paper. Biography and New Technologies conference. Humanities Research Centre, Australian National University, Canberra, ACT. 12-14 Sep. 2006. Crewe, Jonathan. “Recalling Adamastor: Literature as Cultural Memory in ‘White’ South Africa”. In Acts of Memory: Cultural Recall in the Present, eds. Mieke Bal, Jonathan Crewe, and Leo Spitzer. Hanover, NH: Dartmouth College, 1999. 75-86. Felman, Shoshana, and Dori Laub. Testimony: Crises of Witnessing in Literature, Psychoanalysis, and History. New York: Routledge, 1992. Garber, Marjorie. Dog Love. New York: Touchstone/Simon and Schuster, 1996. Gorman-Murray, Andrew. “Homeboys: Uses of Home by Gay Australian Men”. Social and Cultural Geography 7.1 (2006): 53-69. Halbwachs, Maurice. On Collective Memory. Trans. Lewis A. Closer. Chicago: U of Chicago P, 1992. Hildred, Stafford, and Tim Ewbank. Jamie Oliver: The Biography. London: Blake, 2001. Hollows, Joanne. “Feeling like a Domestic Goddess: Post-Feminism and Cooking.” European Journal of Cultural Studies 6.2 (2003): 179-202. ———. “Oliver’s Twist: Leisure, Labour and Domestic Masculinity in The Naked Chef.” International Journal of Cultural Studies 6.2 (2003): 229-248. Jenson, J. “Fandom as Pathology: The Consequences of Characterization”. The Adoring Audience; Fan Culture and Popular Media. Ed. L. A. Lewis. New York, NY: Routledge, 1992. 9-29. Jones, Steven G., ed. Cybersociety, Computer-Mediated Communication and Community. Thousand Oaks, CA: Sage, 1995. Kozinets, R.V. “‘I Want to Believe’: A Netnography of the X’Philes’ Subculture of Consumption”. Advances in Consumer Research 34 (1997): 470-5. ———. “Utopian Enterprise: Articulating the Meanings of Star Trek’s Culture of Consumption.” Journal of Consumer Research 28 (2001): 67-88. Lawson, Nigella. How to Be a Domestic Goddess: Baking and the Art of Comfort Cooking. London: Chatto and Windus, 2000. Meller, Henry. “Jamie’s Tips Spark Asparagus Shortages”. Daily Mail (17 June 2005). 21 Aug. 2007 http://www.dailymail.co.uk/pages/live/articles/health/dietfitness.html? in_article_id=352584&in_page_id=1798>. Miles, Adrian. “Weblogs: Distributed Documentaries of the Everyday.” Metro 143: 66-70. Moss, Pamela. “Negotiating Space in Home Environments: Older Women Living with Arthritis.” Social Science and Medicine 45.1 (1997): 23-33. Robertson, Claire. Claire Robertson Illustration. 2000-2004. 28 May 2007 . Robertson, Claire. loobylu. 16 Feb. 2007. 28 May 2007 http://www.loobylu.com>. Robertson, Claire. “Press for loobylu.” Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/press.html>. Robertson, Claire. A Month of Softies. 28 May 2007. 21 Aug. 2007 . Robertson, Claire. “Recent Client List”. Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/clients.html>. Rose, Gillian. “Family Photographs and Domestic Spacings: A Case Study.” Transactions of the Institute of British Geographers NS 28.1 (2003): 5-18. Smith, Gilly. Jamie Oliver: Turning Up the Heat. Sydney: Macmillian, 2006. Thorne, Scott, and Gordon C. Bruner. “An Exploratory Investigation of the Characteristics of Consumer Fanaticism.” Qualitative Market Research: An International Journal 9.1 (2006): 51-72. Turow, Joseph, and Andrea Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, MA: MIT Press, 2003. Citation reference for this article MLA Style Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/10-brien.php>. APA Style Brien, D., L. Rutherford, and R. Williamson. (Aug. 2007) "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/10-brien.php>.
APA, Harvard, Vancouver, ISO, and other styles
41

Harb, Zahera. "Arab Revolutions and the Social Media Effect." M/C Journal 14, no. 2 (April 4, 2011). http://dx.doi.org/10.5204/mcj.364.

Full text
Abstract:
The Arab world witnessed an influx of satellite channels during the 1990s and in the early years of the first decade of the new century. Many analysts in the Arab world applauded this influx as a potential tool for political change in the Arab countries. Two stations were at the heart of the new optimism: Al-Jazeera and Al Arabiya, the two most prominent 24-hour news channels in the region. Al-Jazeera proved to be more controversial because in its early years of broadcasting it managed to break taboos in the Arab media by tackling issues of human rights and hosting Arab dissidents. Also, its coverage of international conflicts (primarily Afghanistan and Iraq) has marked it as a counter-hegemonic news outlet. For the first time, the flow of news went from South to North. Some scholars who study Arab satellite media, and Al-Jazeera specifically, have gone so far as to suggest that it has created a new Arab public sphere (Lynch, Miladi). However, the political developments in the Arab world, mainly the recent revolutions in Tunisia and Egypt and what is now happening in Bahrain, Libya, and Yemen, have raised questions as to how credible these suggestions are. And are we going to claim the same powers for social media in the Arab world? This article takes the form of a personal reflection on how successful (or not) Arab satellite channels are proving to be as a tool for political change and reform in the Arab world. Are these channels editorially free from Arab governments’ political and economic interests? And could new media (notably social networking sites) achieve what satellite channels have been unable to over the last two decades? 1996 saw the launch of Al-Jazeera, the first 24-hour news channel in the Arab world. However, it didn’t have much of an impact on the media scene in the region until 1998 and gained its controversial reputation through its coverage of the Afghanistan and Iraq wars (see Zayani; Miles; Allan and Zelizer; El-Nawawy and Iskandar). In the Arab world, it gained popularity with its compelling talk shows and open discussions of human rights and democracy (Alterman). But its dominance didn’t last long. In 2003, Al Walid Al Ibrahim, son-in-law of the late King Fahd of Saudi Arabia (1921-2005) established Al Arabiya, the second 24-hour news channel in the Arab world, just before the start of the Iraq war. Many scholars and analysts saw in this a direct response to the popularity that Al-Jazeera was achieving with the Arab audiences. Al Arabiya, however, didn’t achieve the level of popularity that Al-Jazeera enjoyed throughout its years of broadcasting (Shapiro). Al Arabiya and Al-Jazeera Arabic subsequently became rivals representing political and national interests and not just news competitors. Indeed, one of Wikileaks’ latest revelations states that Al-Jazeera changed its coverage to suit Qatari foreign policy. The US ambassador to Qatar, Joseph LeBaron, was reported as saying: The Qatari prime minister, Hamad bin Jassim al-Thani, had joked in an interview that Al-Jazeera had caused the Gulf State such headaches that it might be better to sell it. But the ambassador remarked: “Such statements must not be taken at face value.” He went on: “Al-Jazeera’s ability to influence public opinion throughout the region is a substantial source of leverage for Qatar, one which it is unlikely to relinquish. Moreover, the network can also be used as a chip to improve relations. For example, Al-Jazeera’s more favourable coverage of Saudi Arabia's royal family has facilitated Qatari–Saudi reconciliation over the past year.” (Booth). The unspoken political rivalry between Saudi Arabia and Qatar on Lebanese domestic disputes, over Iran, and over the Palestinian internal conflict was played out in the two channels. This brings us to my central question: can Arab satellite channels, and specifically Al-Jazeera Arabic and Al Arabiya, be regarded as tools for democratic political change? In the recent revolution in Tunisia (spring 2011), satellite channels had to catch up with what social media were reporting: and Al-Jazeera more so than Al Arabiya because of previous encounters between Al-Jazeera and Zein Al Abidine bin Ali’s regime (Greenslade, The Guardian). Bin Ali controlled the country’s media and access to satellite media to suit his interests. Al-Jazeera was banned from Tunisia on several occasions and had their offices closed down. Bin Ali allowed private TV stations to operate but under indirect state control when it came to politics and what Ben Ali’s regime viewed as national and security interests. Should we therefore give social networking credit for facilitating the revolution in Tunisia? Yes, we should. We should give it credit for operating as a mobilising tool. The people were ready, the political moment came, and the people used it. Four out of ten Tunisians are connected to the Internet; almost 20 per cent of the Tunisian population are on Facebook (Mourtada and Salem). We are talking about a newly media-literate population who have access to the new technology and know how to use it. On this point, it is important to note that eight out of ten Facebook users in Tunisia are under the age of 30 (Mourtada and Salem). Public defiance and displays of popular anger were sustained by new media outlets (Miladi). Facebook pages have become sites of networking and spaces for exchanging and disseminating news about the protests (Miladi). Pages such as “The people of Tunisia are burning themselves, Mr President” had around 15,000 members. “Wall-posts” specifying the date and place of upcoming protest became very familiar on social media websites. They even managed to survive government attempts to disable and block these sites. Tunisian and non-Tunisians alike became involved in spreading the message through these sites and Arab transnationalism and support for the revolution came to a head. Many adjacent countries had Facebook pages showing support for the Tunisian revolution. And one of the most prominent of these pages was “Egyptians supporting the Tunisian revolution.” There can be little doubt, therefore, that the success of the Tunisian revolution encouraged the youth of Egypt (estimated at 80 per cent of its Facebook users) to rise up and persist in their call for change and political reform. Little did Wael Ghonim and his friends on the “Kolinah Khaled Said” (“We are all Khaled Said”) Facebook page know where their call for demonstrations on the 25 January 2011 would lead. In the wake of the Tunisian victory, the “We are all Khaled Said” page (Said was a young man who died under torture by Egyptian police) garnered 100,000 hits and most of these virtual supporters then took to the streets on 25 January which was where the Egyptian revolution started. Egyptians were the first Arab youth to have used the Internet as a political platform and tool to mobilise people for change. Egypt has the largest and most active blogosphere in the Arab world. The Egyptian bloggers were the first to reveal corruption and initiated calls for change as early as 2007 (Saleh). A few victories were achieved, such as the firing and sentencing of two police officers condemned for torturing Imad Al Kabeer in 2007 (BBC Arabic). However, these early Egyptian bloggers faced significant jail sentences and prosecution (BBC News). Several movements were orchestrated via Facebook, including the 6 April uprising of 2007, but at this time such resistance invariably ended in persecution and even more oppression. The 25 January revolution therefore took the regime by surprise. In response, former Egyptian president Hosni Mubarak and his entourage (who controlled the state media and privately owned TV stations such as Dream TV) started making declarations that “Egypt is not Tunisia,” but the youth of Egypt were determined to prove them wrong. Significantly, Mubarak’s first reaction was to block Twitter, then Facebook, as well as disrupting mobile phone text-messaging and Blackberry-messaging services. Then, on Thursday 27 January, the regime attempted to shut down the Internet as a whole. Al-Jazeera Arabic quickly picked up on the events in Egypt and began live coverage from Cairo’s Tahrir Square, which resulted in Mubarak’s block of Al-Jazeera’s transmission in Egypt and the withdrawal of its operational licences. One joke exchanged with Tunisian activists on Facebook was that Egyptians, too, had “Ammar 404” (the nickname of the government censor in Tunisia). It was not long, however, before Arab activists from across the regions started exchanging codes and software that allowed Egyptians to access the Internet, despite the government blockades. Egyptian computer science students also worked on ways to access the Worldwide Web and overcome the government’s blockade (Shouier) and Google launched a special service to allow people in Egypt to send Twitter messages by dialling a phone number and leaving a voice message (Oreskovic, Reuters). Facebook group pages like Akher Khabar’s “Latest News” and Rased’s “RNN” were then used by the Egyptian diaspora to share all the information they could get from friends and family back home, bypassing more traditional modes of communication. This transnational support group was crucial in communicating their fellow citizens’ messages to the rest of the world; through them, news made its way onto Facebook and then through to the other Arab nations and beyond. My own personal observation of these pages during the period 25 January to 12 February revealed that the usage of social media platforms such as Facebook and Twitter changed markedly, shifting from being merely social in nature to becoming rapidly and primarily political, not only among Arab users in the Arab world, as Mourtada and Salem argue, but also throughout the Arabian diaspora. In the case of Libya’s revolution, also, social media may be seen to be a mobilising tool in the hands of both Libyans at home and across the Libyan diaspora. Libya has around 4 per cent of its population on Facebook (Mourtada and Salem), and with Gaddafi’s regime cracking down on the Internet, the Libyan diaspora has often been the source of information for what is happening inside the country. Factual information, images, and videos were circulated via the February 17th website (in Arabic and in English) to appeal to Arab and international audiences for help. Facebook and Twitter were where the hash tag “#Feb17th” was created. Omar Amer, head of the UK’s Libyan youth movement based in Manchester, told Channel 4: “I can call Benghazi or Tripoli and obtain accurate information from the people on the ground, then report it straight onto Twitter” (Channel 4 News). Websites inspired by #Feb17th were spread online and Facebook pages dedicated to news about the Libyan uprisings quickly had thousands of supporters (Channel 4 News). Social media networks have thus created an international show of solidarity for the pro-democracy protestors in Libya, and Amer was able to report that they have received overwhelming support from all around the globe. I think that it must therefore be concluded that the role Arab satellite channels were playing a few years ago has now been transferred to social media websites which, in turn, have changed from being merely social/cultural to political platforms. Moreover, the nature of the medium has meant that the diasporas of the nations concerned have been instrumental to the success of the uprisings back home. However, it would be wrong to suggest that broadcast media have been totally redundant in the revolutionary process. Throughout the Tunisian and Egyptian revolutions, Al-Jazeera became a disseminating tool for user-generated content. A call for Arab citizens to send their footage of unfolding events to the Al-Jazeera website for it to re-broadcast on its TV screens was a key factor in the dissemination of what was happening. The role Al-Jazeera played in supporting the Egyptian revolution especially (which caused some Arab analysts to give it the name “channel of revolutions”), was quickly followed by criticism for their lack of coverage of the pro-democracy protests in Bahrain. The killing of peaceful protestors in Bahrain did not get airtime the way that the killing of Egyptian pro-democracy protestors had. Tweets, Facebook posts and comments came pouring in, questioning the lack of coverage from Bahrain. Al Arabiya followed Al-Jazeera’s lead. Bahrain was put last on the running order of the coverage of the “Arab revolutions.” Newspaper articles across the Arab world were questioning the absence of “the opinion and other opinion” (Al-Jazeera’s Arabic motto) when it came to Bahrain (see Al Akhbar). Al Jazeera’s editor-in-chief, Hassan El Shoubaki, told Lebanese newspaper Al Akhbar that they were not deliberately absent but had logistical problems with the coverage since Al-Jazeera is banned in Bahrain (Hadad). However, it can be argued that Al-Jazeera was also banned in Egypt and Tunisia and that didn’t stop the channel from reporting or remodelling its screen to host and “rebroadcast” an activist-generated content. This brings us back to the Wikileaks’ revelation mentioned earlier. Al-Jazeera’s coverage of the Bahraini protests is influenced by Qatari foreign policy and, in the case of Bahrain, is arguably abiding by Qatar’s commitment to Gulf Cooperation Council security treaties. (This is one of the occasions where Al Arabiya and Al-Jazeera appear to have shared the same editorial guidelines, influenced by Qatari and Saudi Arabian shared policy.) Nevertheless, the Bahraini protests continue to dominate the social networks sites and information has kept flowing from Bahrain and it will continue to do so because of these platforms. The same scenario is also unfolding in Syria, but this time Al-Jazeera Arabic is taking a cautious stance while Al Arabiya has given the protests full coverage. Once again, the politics are obvious: Qatar is a supporter of the Syrian regime, while Saudi Arabia has long been battling politically with Syria on issues related to Lebanon, Palestine, and Iran (this position might change with Syria seeking support on tackling its own domestic unrest from the Saudi regime). All this confirms that there are limits to what satellite channels in the Arab world can do to be part of a process for democratic political reform. The Arab media world is not free of the political and economic influence of its governments, its owners or the various political parties struggling for control. However, this is clearly not a phenomenon unique to the Arab world. Where, or when, has media reporting ever been totally “free”? So is this, then, the age of new media? Could the Internet be a free space for Arab citizens to express their opinion and fulfil their democratic aspirations in bringing about freedom of speech and political freedom generally? Is it able to form the new Arab public sphere? Recent events show that the potential is there. What happened in Tunisia and Egypt was effectively the seizure of power by the people as part of a collective will to overthrow dictators and autocratic regimes and to effect democratic change from within (i.e. not having it imposed by foreign powers). The political moment in Tunisia was right and the people receptive; the army refused to respond violently to the protests and members of bin Ali’s government rose up against him. The political and social scene in Egypt became receptive after the people felt empowered by events in Tunis. Will this transnational empowerment now spread to other Arab countries open to change notwithstanding the tribal and sectarian alliances that characterise their populations? Further, since new media have proven to be “dangerous tools” in the hands of the citizens of Tunisia and Egypt, will other Arab regimes clamp down on them or hijack them for their own interests as they did the satellite channels previously? Maybe, but new media technology is arguably ahead of the game and I am sure that those regimes stand to be taken by surprise by another wave of revolutions facilitated by a new online tool. So far, Arab leaders have been of one voice in blaming the media for the protests (uprisings) their countries are witnessing—from Tunisia to Syria via Egypt, Yemen, Bahrain and Libya. As Khatib puts it: “It is as if the social, economic, and political problems the people are protesting against would disappear if only the media would stop talking about them.” Yet what is evident so far is that they won’t. The media, and social networks in particular, do not of themselves generate revolutions but they can facilitate them in ways that we are only just beginning to understand. References Allan, Stuart, and Barbie Zelizer. Reporting War: Journalism in War Time. London: Routledge, 2004. Alterman, John. New Media New Politics? From Satellite Television to the Internet in the Arab World. Washington: Washington Institute for Near East Policy, 1998. BBC News. “Egypt Blogger Jailed for ‘Insult,’” 22 Feb. 2007. 1 Mar. 2011 ‹http://news.bbc.co.uk/go/pr/fr/-/1/hi/world/middle_east/6385849.stm›. BBC Arabic. “Three Years Jail Sentence for Two Police Officers in Egypt in a Torture Case.” 5 Nov. 2007. 26 Mar. 2011 ‹http://news.bbc.co.uk/hi/arabic/middle_east_news/newsid_7079000/7079123.stm›. Booth, Robert. “WikiLeaks Cables Claim Al-Jazeera Changed Coverage to Suit Qatari Foreign Policy.” The Guardian 6 Dec. 2010. 22 Feb. 2011 ‹http://www.guardian.co.uk/world/2010/dec/05/wikileaks-cables-al-jazeera-qatari-foreign-policy›. Channel 4 News. “Arab Revolt: Social Media and People’s Revolution.” 25 Feb. 2011. 3 Mar. 2011 ‹http://www.channel4.com/news/arab-revolt-social-media-and-the-peoples-revolution›. El-Nawawy, Mohammed, and Adel Iskandar. Al Jazeera. USA: Westview, 2002. Greenslade, Roy. “Tunisia Breaks Ties with Qatar over Al-Jazeera.” The Guardian 26 Oct. 2006. 23 Mar. 2011 ‹http://www.guardian.co.uk/media/greenslade/2006/oct/26/tunisiabreakstieswithqatar›. Hadad, Layal. “Al thowra al Arabiya tawqafet Eindah masharef al khaleegj” (The Arab Revolution Stopped at the Doorsteps of the Gulf). Al Akhbar 19 Feb. 2011. 20 Feb. 2011 ‹http://www.al-akhbar.com/node/4614›. Khatib, Lina. “How to Lose Friends and Alienate Your People.” Jadaliyya 26 Mar. 2011. 27 Mar. 2011 ‹http://www.jadaliyya.com/pages/index/1014/how-to-lose-friends-and-alienate-your-people›. Lynch, Marc. Voices of the New Arab Public: Iraq, Al-Jazeera, and Middle East Politics Today. New York: Columbia UP, 2006. Miladi, Noureddine. “Tunisia A Media Led Revolution?” Al Jazeera 17 Jan. 2011. 2 Mar. 2011 ‹http://english.aljazeera.net/indepth/opinion/2011/01/2011116142317498666.html#›. Miles, Hugh. Al Jazeera: How Arab TV News Challenged the World. London: Abacus, 2005. Mourtada, Rasha, and Fadi Salem. “Arab Social Media Report, Facebook Usage: Factors and Analysis.” Dubai School of Government 1.1 (Jan. 2011). Oreskovic, Alexei. “Google Inc Launched a Special Service...” Reuters 1 Feb. 2011. 28 Jan. 2011 ‹http://www.reuters.com/article/2011/02/01/us-egypt-protest-google-idUSTRE71005F20110201›. Saleh, Heba. “Egypt Bloggers Fear State Curbs.” BBC News 22 Feb. 2007. 28 Jan. 2011 ‹http://news.bbc.co.uk/go/pr/fr/-/1/hi/world/middle_east/6386613.stm›. Shapiro, Samantha. “The War inside the Arab Newsroom.” The New York Times 2 Jan. 2005. Shouier, Mohammed. “Al Tahrir Qanat al Naser … Nawara Najemm” (Liberation, Victory Channel… and Nawara Najem). Al Akhbar 17 Feb. 2011. Zayani, Mohammed. The Al-Jazeera Phenomenon: Critical Perspectives on Arab Media. London: Pluto, 2005.
APA, Harvard, Vancouver, ISO, and other styles
42

Rodan, Debbie, and Jane Mummery. "Animals Australia and the Challenges of Vegan Stereotyping." M/C Journal 22, no. 2 (April 24, 2019). http://dx.doi.org/10.5204/mcj.1510.

Full text
Abstract:
Introduction Negative stereotyping of alternative diets such as veganism and other plant-based diets has been common in Australia, conventionally a meat-eating culture (OECD qtd. in Ting). Indeed, meat consumption in Australia is sanctioned by the ubiquity of advertising linking meat-eating to health, vitality and nation-building, and public challenges to such plant-based diets as veganism. In addition, state, commercial enterprises, and various community groups overtly resist challenges to Australian meat-eating norms and to the intensive animal husbandry practices that underpin it. Hence activists, who may contest not simply this norm but many of the customary industry practices that comprise Australia’s meat production, have been accused of promoting a vegan agenda and even of undermining the “Australian way of life”.If veganism meansa philosophy and way of living which seeks to exclude—as far as is possible and practicable—all forms of exploitation of, and cruelty to, animals for food, clothing or any other purpose; and by extension, promotes the development and use of animal-free alternatives for the benefit of humans, animals and the environment. In dietary terms it denotes the practice of dispensing with all products derived wholly or partly from animals. (Vegan Society)then our interest in this article lies in how a stereotyped label of veganism (and other associated attributes) is being used across Australian public spheres to challenge the work of animal activists as they call out factory farming for entrenched animal cruelty. This is carried out in three main parts. First, following an outline of our research approach, we examine the processes of stereotyping and the key dimensions of vegan stereotyping. Second, in the main part of the article, we reveal how opponents to such animal activist organisations as Animals Australia attempt to undermine activist calls for change by framing them as promoting an un-Australian vegan agenda. Finally, we consider how, despite such framing, that organisation is generating productive public debate around animal welfare, and, further, facilitating the creation of new activist identifications and identities.Research ApproachData collection involved searching for articles where Animals Australia and animal activism were yoked with veg*n (vegan and vegetarian), across the period May 2011 to 2016 (discussion peaked between May and June 2013). This period was of interest because it exposed a flare point with public discord being expressed between communities—namely between rural and urban consumers, farmers and animal activists, Coles Supermarkets (identified by The Australian Government the Treasury as one of two major supermarkets holding over 65% share of Australian food retail market) and their producers—and a consequent voicing of disquiet around Australian identity. We used purposive sampling (Waller, Farquharson, and Dempsey 67) to identify relevant materials as we knew in advance the case was “information-rich” (Patton 181) and would provide insightful information about a “troublesome” phenomenon (Emmel 6). Materials were collected from online news articles (30) and readers’ comments (167), online magazines (2) and websites (2) and readers’ comments (3), news items (Factiva 13), Australian Broadcasting Commission television (1) and radio (1), public blogs (2), and Facebook pages from involved organisations, specifically Australia’s National Farmers’ Federation (NFF, 155 posts) and Coles Supermarkets (29 posts). Many of these materials were explicitly responsive to a) Animals Australia’s Make It Possible campaign against Australian factory farming (launched and highly debated during this period), and b) Coles Supermarket’s short-lived partnership with Animals Australia in 2013. We utilised content analysis so as to make visible the most prominent and consistent stereotypes utilised in these various materials during the identified period. The approach allowed us to code and categorise materials so as to determine trends and patterns of words used, their relationships, and key structures and ways of speaking (Weerakkody). In addition, discourse analysis (Gee) was used in order to identify and track “language-in-use” so as to make visible the stereotyping deployed during the public reception of both the campaign and Animals Australia’s associated partnership with Coles. These methods enabled a “nuanced approach” (Coleman and Moss 12) with which to spot putdowns, innuendos, and stereotypical attitudes.Vegan StereotypingStereotypes creep into everyday language and are circulated and amplified through mainstream media, speeches by public figures, and social media. Stereotypes maintain their force through being reused and repurposed, making them difficult to eradicate due to their “cumulative effects” and influence (Harris and Sanborn 38; Inzlicht, Tullett, Legault, and Kang; Pickering). Over time stereotypes can become the lens through which we view “the world and social reality” (Harris and Sanborn 38; Inzlicht et al.). In summation, stereotyping:reduces identity categories to particular sets of deeds, attributes and attitudes (Whitley and Kite);informs individuals’ “cognitive investments” (Blum 267) by associating certain characteristics with particular groups;comprises symbolic and connotative codes that carry sets of traits, deeds, or beliefs (Cover; Rosello), and;becomes increasingly persuasive through regulating language and image use as well as identity categories (Cover; Pickering; Rosello).Not only is the “iterative force” (Rosello 35) of such associative stereotyping compounded due to its dissemination across digital media sites such as Facebook, YouTube, websites, and online news, but attempts to denounce it tend to increase its “persuasive power” (29). Indeed, stereotypes seem to refuse “to die” (23), remaining rooted in social and cultural memory (Whitley and Kite 10).As such, despite the fact that there is increasing interest in Australia and elsewhere in new food norms and plant-based diets (see, e.g., KPMG), as well as in vegan lifestyle options (Wright), studies still show that vegans remain a negatively stereotyped group. Previous studies have suggested that vegans mark a “symbolic threat” to Western, conventionally meat-eating cultures (MacInnis and Hodson 722; Stephens Griffin; Cole and Morgan). One key UK study of national newspapers, for instance, showed vegans continuing to be discredited in multiple ways as: 1) “self-evidently ridiculous”; 2) “ascetics”; 3) having a lifestyle difficult and impossible to maintain; 4) “faddist”; 5) “oversensitive”; and 6) “hostile extremists” (Cole and Morgan 140–47).For many Australians, veganism also appears anathema to their preferred culture and lifestyle of meat-eating. For instance, the NFF, Meat & Livestock Australia (MLA), and other farming bodies continue to frame veganism as marking an extreme form of lifestyle, as anti-farming and un-Australian. Such perspectives are also circulated through online rural news and readers’ comments, as will be discussed later in the article. Such representations are further exemplified by the MLA’s (Lamb, Australia Day, Celebrate Australia) Australia Day lamb advertising campaigns (Bembridge; Canning). For multiple consecutive years, the campaign presented vegans (and vegetarians) as being self-evidently ridiculous and faddish, representing them as mentally unhinged and fringe dwellers. Such stereotyping not only invokes “affective reactions” (Whitley and Kite 8)—including feelings of disgust towards individuals living such lifestyles or holding such values—but operates as “political baits” (Rosello 18) to shore-up or challenge certain social or political positions.Although such advertisements are arguably satirical, their repeated screening towards and on Australia Day highlights deeply held views about the normalcy of animal agriculture and meat-eating, “homogenizing” (Blum 276; Pickering) both meat-eaters and non-meat-eaters alike. Cultural stereotyping of this kind amplifies “social” as well as political schisms (Blum 276), and arguably discourages consumers—whether meat-eaters or non-meat-eaters—from advocating together around shared goals such as animal welfare and food safety. Additionally, given the rise of new food practices in Australia—including flexitarian, reducetarian, pescatarian, kangatarian (a niche form of ethical eating), vegivores, semi-vegetarian, vegetarian, veganism—alongside broader commitments to ethical consumption, such stereotyping suggests that consumers’ actual values and preferences are being disregarded in order to shore-up the normalcy of meat-eating.Animals Australia and the (So-Called) Vegan Agenda of Animal ActivismGiven these points, it is no surprise that there is a tacit belief in Australia that anyone labelled an animal activist must also be vegan. Within this context, we have chosen to primarily focus on the attitudes towards the campaigning work of Animals Australia—a not-for-profit organisation representing some 30 member groups and over 2 million individual supporters (Animals Australia, “Who Is”)—as this organisation has been charged as promoting a vegan agenda. Along with the RSPCA and Voiceless, Animals Australia represents one of the largest animal protection organisations within Australia (Chen). Its mission is to:Investigate, expose and raise community awareness of animal cruelty;Provide animals with the strongest representation possible to Government and other decision-makers;Educate, inspire, empower and enlist the support of the community to prevent and prohibit animal cruelty;Strengthen the animal protection movement. (Animals Australia, “Who Is”)In delivery of this mission, the organisation curates public rallies and protests, makes government and industry submissions, and utilises corporate outreach. Campaigning engages the Web, multiple forms of print and broadcast media, and social media.With regards to Animals Australia’s campaigns regarding factory farming—including the Make It Possible campaign (see fig. 1), launched in 2013 and key to the period we are investigating—the main message is that: the animals kept in these barren and constrictive conditions are “no different to our pets at home”; they are “highly intelligent creatures who feel pain, and who will respond to kindness and affection – if given the chance”; they are “someone, not something” (see the Make It Possible transcript). Campaigns deliberately strive to engender feelings of empathy and produce affect in viewers (see, e.g., van Gurp). Specifically they strive to produce mainstream recognition of the cruelties entrenched in factory farming practices and build community outrage against these practices so as to initiate industry change. Campaigns thus expressly challenge Australians to no longer support factory farmed animal products, and to identify with what we have elsewhere called everyday activist positions (Rodan and Mummery, “Animal Welfare”; “Make It Possible”). They do not, however, explicitly endorse a vegan position. Figure 1: Make It Possible (Animals Australia, campaign poster)Nonetheless, as has been noted, a common counter-tactic used within Australia by the industries targeted by such campaigns, has been to use well-known negative stereotypes to discredit not only the charges of systemic animal cruelty but the associated organisations. In our analysis, we found four prominent interconnected stereotypes utilised in both digital and print media to discredit the animal welfare objectives of Animals Australia. Together these cast the organisation as: 1) anti-meat-eating; 2) anti-farming; 3) promoting a vegan agenda; and 4) hostile extremists. These stereotypes are examined below.Anti-Meat-EatingThe most common stereotype attributed to Animals Australia from its campaigning is of being anti-meat-eating. This charge, with its associations with veganism, is clearly problematic for industries that facilitate meat-eating and within a culture that normalises meat-eating, as the following example expresses:They’re [Animals Australia] all about stopping things. They want to stop factory farming – whatever factory farming is – or they want to stop live exports. And in fact they’re not necessarily about: how do I improve animal welfare in the pig industry? Or how do I improve animal welfare in the live export industry? Because ultimately they are about a meat-free future world and we’re about a meat producing industry, so there’s not a lot of overlap, really between what we’re doing. (Andrew Spencer, Australian Pork Ltd., qtd. in Clark)Respondents engaging this stereotype also express their “outrage at Coles” (McCarthy) and Animals Australia for “pedalling [sic]” a pro-vegan agenda (Nash), their sense that Animals Australia is operating with ulterior motives (Flint) and criminal intent (Brown). They see cultural refocus as unnecessary and “an exercise in futility” (Harris).Anti-FarmingTo be anti-farming in Australia is generally considered to be un-Australian, with Glasgow suggesting that any criticism of “farming practices” in Australian society can be “interpreted as an attack on the moral integrity of farmers, amounting to cultural blasphemy” (200). Given its objectives, it is unsurprising that Animals Australia has been stereotyped as being “anti-farming”, a phrase additionally often used in conjunction with the charge of veganism. Although this comprises a misreading of veganism—given its focus on challenging animal exploitation in farming rather than entailing opposition to all farming—the NFF accused Animals Australia of being “blatantly anti-farming and proveganism” (Linegar qtd. in Nason) and as wanting “to see animal agriculture phased out” (National Farmers’ Federation). As expressed in more detail:One of the main factors for VFF and other farmers being offended is because of AA’s opinion and stand on ALL farming. AA wants all farming banned and us all become vegans. Is it any wonder a lot of people were upset? Add to that the proceeds going to AA which may have been used for their next criminal activity washed against the grain. If people want to stand against factory farming they have the opportunity not to purchase them. Surely not buying a product will have a far greater impact on factory farmed produce. Maybe the money could have been given to farmers? (Hunter)Such stereotyping reveals how strongly normalised animal agriculture is in Australia, as well as a tendency on the part of respondents to reframe the challenge of animal cruelty in some farming practices into a position supposedly challenging all farming practices.Promoting a Vegan AgendaAs is already clear, Animals Australia is often reproached for promoting a vegan agenda, which, it is further suggested, it keeps hidden from the Australian public. This viewpoint was evident in two key examples: a) the Australian public and organisations such as the NFF are presented as being “defenceless” against the “myopic vitriol of the vegan abolitionists” (Jonas); and b) Animals Australia is accused of accepting “loans from liberation groups” and being “supported by an army of animal rights lawyers” to promote a “hard core” veganism message (Bourke).Nobody likes to see any animals hurt, but pushing a vegan agenda and pushing bad attitudes by group members is not helping any animals and just serves to slow any progress both sides are trying to resolve. (V.c. Deb Ford)Along with undermining farmers’ “legitimate business” (Jooste), veganism was also considered to undermine Australia’s rural communities (Park qtd. in Malone).Hostile ExtremistsThe final stereotype linking veganism with Animals Australia was of hostile extremism (cf. Cole and Morgan). This means, for users, being inimical to Australian national values but, also, being akin to terrorists who engage in criminal activities antagonistic to Australia’s democratic society and economic livelihood (see, e.g., Greer; ABC News). It is the broad symbolic threat that “extremism” invokes that makes this stereotype particularly “infectious” (Rosello 19).The latest tag team attacks on our pork industry saw AL giving crash courses in how to become a career criminal for the severely impressionable, after attacks on the RSPCA against the teachings of Peter Singer and trying to bully the RSPCA into vegan functions menu. (Cattle Advocate)The “extremists” want that extended to dairy products, as well. The fact that this will cause the total annihilation of practically all animals, wild and domestic, doesn’t bother them in the least. (Brown)What is interesting about these last two dimensions of stereotyping is their displacement of violence. That is, rather than responding to the charge of animal cruelty, violence and extremism is attributed to those making the charge.Stereotypes and Symbolic Boundary ShiftingWhat is evident throughout these instances is how stereotyping as a “cognitive mechanism” is being used to build boundaries (Cherry 460): in the first instance, between “us” (the meat-eating majority) and “them” (the vegan minority aka animal activists); and secondly between human interest and livestock. This point is that animals may hold instrumental value and receive some protection through such, but any more stringent arguments for their protection at the expense of perceived human interests tend to be seen as wrong-headed (Sorenson; Munro).These boundaries are deeply entrenched in Western culture (Wimmer). They are also deeply problematic in the context of animal activism because they fragment publics, promote restrictive identities, and close down public debate (Lamont and Molnár). Boundary entrenching is clearly evident in the stereotyping work carried out by industry stakeholders where meat-eating and practices of industrialised animal agriculture are valorised and normalised. Challenging Australia’s meat production practices—irrespective of the reason given—is framed and belittled as entailing a vegan agenda, and further as contributing to the demise of farming and rural communities in Australia.More broadly, industry stakeholders are explicitly targeting the activist work by such organisations as Animals Australia as undermining the ‘Australian way of life’. In their reading, there is an irreconcilable boundary between human and animal interests and between an activist minority which is vegan, unreasonable, extremist and hostile to farming and the meat-eating majority which is representative of the Australian community and sustains the Australian economy. As discussed so far, such stereotyping and boundary making—even in their inaccuracies—can be pernicious in the way they entrench identities and divisions, and close the possibility for public debate.Rather than directly contesting the presuppositions and inaccuracies of such stereotyping, however, Animals Australia can be read as cultivating a process of symbolic boundary shifting. That is, rather than responding by simply underlining its own moderate position of challenging only intensive animal agriculture for systemic animal cruelty, Animals Australia uses its campaigns to develop “boundary blurring and crossing” tactics (Cherry 451, 459), specifically to dismantle and shift the symbolic boundaries conventionally in place between humans and non-human animals in the first instance, and between those non-human animals used for companionship and those used for food in the second (see fig. 2). Figure 2: That Ain’t No Way to Treat a Lady (Animals Australia, campaign image on back of taxi)Indeed, the symbolic boundaries between humans and animals left unquestioned in the preceding stereotyping are being profoundly shaken by Animals Australia with campaigns such as Make It Possible making morally relevant likenesses between humans and animals highly visible to mainstream Australians. Namely, the organisation works to interpellate viewers to exercise their own capacities for emotional identification and moral imagination, to identify with animals’ experiences and lives, and to act upon that identification to demand change.So, rather than reactively striving to refute the aforementioned stereotypes, organisations such as Animals Australia are modelling and facilitating symbolic boundary shifting by building broad, emotionally motivated, pathways through which Australians are being encouraged to refocus their own assumptions, practices and identities regarding animal experience, welfare and animal-human relations. Indeed the organisation has explicitly framed itself as speaking on behalf of not only animals but all caring Australians, suggesting thereby the possibility of a reframing of Australian national identity. Although such a tactic does not directly contest this negative stereotyping—direct contestation being, as noted, ineffective given the perniciousness of stereotyping—such work nonetheless dismantles the oppositional charge of such stereotyping in calling for all Australians to proudly be a little bit anti-meat-eating (when that meat is from factory farmed animals), a little bit anti-factory farming, a little bit pro-veg*n, and a little bit proud to consider themselves as caring about animal welfare.For Animals Australia, in other words, appealing to Australians to care about animal welfare and to act in support of that care, not only defuses the stereotypes targeting them but encourages the work of symbolic boundary shifting that is really at the heart of this dispute. Further research into the reception of the debate would give a sense of the extent to which such an approach is making a difference.ReferencesABC News. “Animal Rights Activists ‘Akin to Terrorists’, Says NSW Minister Katrina Hodgkinson.” ABC News 18 Jul. 2013. 21 Feb. 2019 <http://www.abc.net.au/news/2013-07-18/animal-rights-activists-27terrorists272c-says-nsw-minister/4828556>.Animals Australia. “Who Is Animals Australia?” 20 Feb. 2019 <http://www.animalsaustralia.org/about>.———. Make It Possible. Video and transcript. 21 Oct. 2012. 20 Feb. 2019 <http://www.youtube.com/watch?v=fM6V6lq_p0o>.The Australian Government the Treasury. Independent Review of the Food and Grocery Code of Conduct: Final Report. Commonwealth of Australia, 2018. 1 Apr. 2019 <https://treasury.gov.au/sites/default/files/2019-03/Independent-review-of-the-Food-and-Grocery-Code-of-Conduct-Final-Report.pdf>.Bembridge, Courtney. “Australia Day Lamb Ad, Starring Lee Lin Chin, Attracts Dozens of Complaints from Vegans.” ABC News 20 Jan. 2016. 21 Feb. 2019 <http://www.abc.net.au/news/2016-01-11/vegans-lodge-complaints-over-lamb-ad/7081706>.Blum, Lawrence. “Stereotypes and Stereotyping: A Moral Analysis.” Philosophical Papers 33.3 (2004): 251–89.Bourke, John. “Coles Undermines Our Way of Life.” Weekly Times Now 5 Jun. 2013. 19 Jun. 2013 <http://www.weeklytimesnow.com.au/article/2013/06/05/572335_opinion-news.html>.Brown, Frank. “Letter to the Editor.” Northern Miner 9 Dec. 2014. 18 Nov. 2017 <http://www.newscorpaustralia.com/brand/northern-miner>.Canning, Simon. “MLA’s Australia Day Vegan Flaming Lamb Ad Cleared by Advertising Watchdog.” Mumbrella News 19 Jan. 2016. 18 Nov. 2017 <https://mumbrella.com.au/mlas-australia-day-vegan-flaming-lamb-ad-cleared-by-advertising-watchdog-340779>.Cattle Advocate. “Coles Bags a Boost for NFF.” Farm Weekly 3 Jul. 2013. 20 Feb. 2018 <http://www.farmweekly.com.au/news/agriculture/agribusiness/general-news/coles-bags-a-boost-for-nff/2660179.aspx>.Chen, Peter John. Animal Welfare in Australia: Politics and Policy. Sydney: U of Sydney Press, 2016.Cherry, Elizabeth. “Shifting Symbolic Boundaries: Cultural Strategies of the Animal Rights Movement.” Sociological Forum 25.3 (2010): 450–75.Clark, Chris. “Animals Australia under the Microscope.” ABC Landline 16 Jun. 2013. 24 Jun. 2013 <http://www.abc.net.au/landline/ content/2013/s3782456.htm>.Cole, Matthew, and Karen Morgan. “Vegaphobia: Derogatory Discourses of Veganism and the Reproduction of Speciesism in UK National Newspapers.” The British Journal of Sociology 62.1 (2011): 134–53.Coleman, Stephen, and Giles Moss. “Under Construction: The Field of Online Deliberation Research.” Journal of Information Technology and Politics 9.1 (2012): 1–15.Cover, Rob. “Digital Difference: Theorizing Frameworks of Bodies, Representation and Stereotypes in Digital Games.” Asia Pacific Media Educator 26.1 (2016): 4–16.Emmel, Nick. “Purposeful Sampling.” Sampling and Choosing Cases in Qualitative Research: A Realist Approach. London: Sage Publications, 2013. 2–12. 28 Feb. 2019 <http://dx.doi.org.ezproxy.ecu.edu.au/10.4135/9781473913882>.Flint, Nicole. “The ABC Continues to Broadcast Animals Australia Footage while Failing to Probe the Group’s Motivations.” The Advertiser 28 Oct. 2014. 18 Nov. 2017 <http://www.adelaidenow.com.au/>.Gee, James Paul. An Introduction to Discourse Analysis: Theory and Method. 3rd ed. New York: Routledge, 2010.Glasgow, David. “The Law of the Jungle: Advocating for Animals in Australia.” Deakin Law Review 13.1 (2008): 181–210.Greer, Anna. “‘Akin to Terrorism’: The War on Animal Activists.” Overland 9 Aug. 2013. 21 Feb. 2019 <https://overland.org.au/2013/08/akin-to-terrorism-the-war-on-animal-activists/>Harris, Janeen. “Coles Are the Piggy in the Middle of Animal Welfare Confrontation.” The Conversation 13 Jun. 2013. 21 Feb. 2019 <https://theconversation.com/coles-are-the-piggy-in-the-middle-of-animal-welfare-confrontation-15078>.Harris, Richard Jackson, and Fred W. Sanborn. A Cognitive Psychology of Mass Communication. 6th ed. New York: Routledge, 2014.Hunter, Jim. “Animals Australia Bags Hot Property.” Weekly Times Now 10 Jun. 2013. 19 Jun. 2013 <http://tools.weeklytimesnow.com.au/yoursay/comment_all.php>.Inzlicht, Michael, Alexa M. Tullett, Lisa Legault, and Sonia K Kang. “Lingering Effects: Stereotype Threat Hurts More than You Think.” Social Issues and Policy Review 5.1 (2011): 227–56.Jonas, Tammi. “Coles & Animals Australia: Unlikely Bedfellows?” Blog post. 6 Jun. 2013. 24 Jun. 2013 <http://www.tammijonas.com/2013/06/06/coles-animals-australia-unlikely-bedfellows/>.Jooste, James. “Animals Australia Ready to Launch New Advertisements Calling for Ban on Live Exports, after Complaints about Previous Campaign Dismissed.” ABC News 16 Feb. 2016. 21 Feb. 2019 <http://www.abc.net.au/news/rural/2016-02-15/live-export-animals-australia-advertising-complaint-dismissed/7168534>.KPMG. Talking 2030: Growing Agriculture into a $100 Billion Industry. KPMG, 2018. 21 Feb. 2019 <https://docs.wixstatic.com/ugd/f0cfd1_26dbb49eea91458d8b1606a0006ec20e.pdf>.Lamont, Michèle, and Virág Molnár. “The Study of Boundaries in the Social Sciences.” Annual Review of Sociology 28 (2002): 167–95.MacInnis, Cara C., and Gordon Hodson. “It Ain’t Easy Eating Greens: Evidence of Bias towards Vegetarians and Vegans from Both Source and Target.” Group Process and Intergroup Relations 20.6 (2017): 721–44.Malone, Paul. “Farmers Face Changing World.” The Canberra Times 9 Jun. 2013. 22 Nov. 2013 <https://www.canberratimes.com.au/>.McCarthy, John. “Farmers Angered by Coles Campaign.” The Courier-Mail 4 Jun. 2013. 24 Jun. 2013 <http://www.couriermail.com.au/>.Meat and Livestock Australia (MLA). Australia Day Lamb 2016: Commence Operation Boomerang. Video. 9 Jan. 2016. 8 Nov. 2017 <https://www.youtube.com/watch?v=7i15OPuFvmA>.———. Celebrate Australia with a Lamb BBQ. Video. 11 Jan. 2017. 8 Nov. 2017 <https://www.youtube.com/watch?v=LX__i-zeaWs>.———. “Lamb Campaigns.” No date. 8 Nov. 2017 <https://www.mla.com.au/marketing-beef-and-lamb/domestic-marketing/lamb-campaigns/>.Munro, Lyle. “Animals, ‘Nature’ and Human Interests.” Controversies in Environmental Sociology. Ed. Rob White. Cambridge: Cambridge UP, 2004. 61–76.Nash, Fiona. “Nationals Senator Congratulating Animals Australia’s Damaging …. .” The Nationals for Regional Australia 6 Jun. 2013. 21 Jun. 2013 <http://nationals.org.au/>.Nason, James. “Coles Bagged over Animals Australia Campaign.” Beef Central. 4 Jun. 2013. 22 Nov. 2013 <http://www.beefcentral.com/news/coles-bagged-over-animals-australia-campaign/>.National Farmers’ Federation. Facebook post. 30 May 2013. 26 Nov. 2013 <http://www.facebook.com/NationalFarmers>.Patton, Michael Quinn. Qualitative Research and Evaluation Methods. 2nd ed. London: Sage, 1990. Pickering, Michael. Stereotyping: The Politics of Representation. Basingstoke: Palgrave, 2001.Rodan, Debbie, and Jane Mummery. “The ‘Make It Possible’ Multi-Media Campaign: Generating a New ‘Everyday’ in Animal Welfare.” Media International Australia, 153 (2014): 78–87.———. “Doing Animal Welfare Activism Everyday: Questions of Identity.” Continuum: Journal of Media & Cultural Studies 30.4 (2016): 381–96.Rosello, Mireille. Declining the Stereotype: Ethnicity and Representation in French Culture. Hanover: U of New England, 1998.Sorenson John. “Constructing Terrorists: Propaganda about Animal Rights.” Critical Studies on Terrorism 2.2 (2009): 237-56.Stephens Griffin, Nathan. Understanding Veganism: Biography and Identity. Cham: Springer International, 2017.Ting, Inga. “Australia is the Meat-Eating Capital of the World.” The Sydney Morning Herald 27 Oct. 2015. 20 Feb. 2019 <http://www.smh.com.au/national/health/australia-is-the-meateating-capital-of-the-world-20151027-gkjhp4.html>.V.c. Deb Ford. “National Farmers Federation.” Facebook post. 30 May 2013. 26 Nov. 2013 <http://www.facebook.com/NationalFarmers>.Van Gurp, Marc. “Factory Farming the Musical.” Osocio 4 Nov. 2012. 21 Feb. 2019 <https://osocio.org/message/factory-farming-the-musical/>.Vegan Society. “History.” 20 Feb. 2019 <https://www.vegansociety.com/about-us/history>.Waller, Vivienne, Karen Farquharson, and Deborah Dempsey. Qualitative Social Research: Contemporary Methods for the Digital Age. London: Sage, 2016Weerakkody, Niranjala. Research Methods for Media and Communication. South Melbourne: Oxford UP, 2009.Whitley, Bernard E., and Mary E. Kite. The Psychology of Prejudice and Discrimination. Belmont: Thomson Wadsworth, 2006.Wimmer, Andreas. “The Making and Unmaking of Ethnic Boundaries: A Multilevel Process Theory.” American Journal of Sociology 113.4 (2008): 970–1022.Wright, Laura. The Vegan Studies Project: Food, Animals, and Gender in the Age of Terror. Georgia: U of Georgia Press, 2015.
APA, Harvard, Vancouver, ISO, and other styles
43

Ashton, Daniel. "Digital Gaming Upgrade and Recovery: Enrolling Memories and Technologies as a Strategy for the Future." M/C Journal 11, no. 6 (November 30, 2008). http://dx.doi.org/10.5204/mcj.86.

Full text
Abstract:
IntroductionThe tagline for the 2008 Game On exhibition at the Australian Centre for the Moving Image in Melbourne invites visitors to “play your way through the history of videogames.” The Melbourne hosting follows on from exhibitions that have included the Barbican (London), the Royal Museum (Edinburgh) and the Science Museum (London). The Game On exhibition presents an exemplary instance of how digital games and digital games culture are recovered, organised and presented. The Science Museum exhibition offered visitors a walkthrough from the earliest to the latest consoles and games (Pong to Wii Sports) with opportunities for game play framed by curatorial plaques. This article will explore some of the themes and narratives embodied within the exhibition that see digital games technologies enrolled within a media teleology that emphasises technological advancement and upgrade. Narratives of Technological Upgrade The Game On exhibition employed a “social contextualisation” approach, connecting digital gaming developments with historical events and phenomena such as the 1969 moon landing and the Spice Girls. Whilst including thematic strands such as games and violence and games in education, the exhibition’s chronological ordering highlighted technological advancement. In doing so, the exhibition captured a broader tension around celebrating past technological advancement in gaming, whilst at the same time emphasising the quaint shortfalls and looking to future possibilities. That technological advancements stand out, particularly as a means of organising a narrative of digital gaming, resonates with Stephen Kline, Nick Dyer-Withford and Greig de Peuter’s analysis of digital gaming as a “perpetual innovation economy.” For Kline et al., corporations “devote a growing share of their resources to the continual alteration and upgrading of their products” (66). Technological upgrade and advancement were described by the Game On curator as an engaging aspect of the exhibition: When we had a BBC news presenter come in, she was talking about ‘here we have the PDP 1 and here I have the Nintendo DS’. She was just sort of comparing and contrasting. I know certainly that journalists were very keen on: ‘yeah, but how much processing power does the PDP 1 have?’, ‘what does it compare to today?’ – and it is very hard to compare. How do you compare Space War on the PDP 1 with something that runs on your mobile phone? They are very different systems. (Lee)This account of journalistic interest in technological progression and the curator’s subsequent interpretation raise a significant tension around understanding digital gaming. The concern with situating past gaming technologies and comparing capacities and capabilities, emphasises both the fascination with advancement and technological progress in the field and how the impressiveness of this advancement depends on remembering what has come before. Questions of remembering, recovering and forgetting are clear in the histories that console manufacturers offer when they describe past innovation and pioneering developments. For example, the company history provided by Nintendo on its website is exclusively a history of games technologies with no reference to the proceeding business of playing-card games from the late nineteenth century. Its website-published history only starts with the 1985 release of the NES (Nintendo Entertainment System), “an instant hit [that] over the course of the next two years, it almost single-handedly revitalized the video game industry” (Nintendo, ‘History’), and thereby overlooks the earlier 1983 less successful Famicom system. Past technologies are selectively remembered and recovered as part of the foundations for future success. This is a tension, that can be unpacked in a number of ways, across current industry transformations and strategies that potentially erase the past whilst simultaneously seeking to recover it as part of an evidence-base for future development. The following discussion develops an analysis of how digital gaming history is recovered and constructed.Industry Wind Change and Granny on the WiiThere is “unease, almost embarrassment”, James Newman suggests, “about the videogames industry within certain quarters of the industry itself” (6). Newman goes on to suggest:Various euphemisms have passed into common parlance, all seemingly motivated by a desire to avoid the use of the word ‘game’ and perhaps even ‘computer’, thereby adding a veneer of respectability, distancing the products and experiences from the childish pursuits of game, play and toys, and downplaying the technology connection with its unwanted resonances of nerds in bedrooms hunched over ZX Spectrums and Commodore 64s and the amateurism of hobbyist production. (6-7) The attempted move away from the resonances of “nerds in bedrooms” has been a strategic decision for Nintendo especially. This is illustrated by the naming of consoles: ‘family’ in Famicom, ‘entertainment’ in NES and, more recently, the renaming of the Wii from ‘Revolution’. The seventh generation Nintendo Wii console, released in November and December 2006, may be been seen as industry leading in efforts to broaden gaming demographics. In describing the console for instance, Satoru Iwata, the President of Nintendo, stated, “we want to appeal to mothers who don't want consoles in their living rooms, and to the elderly and to young women. It’s a challenge, like trying to sell cosmetics to men” (Edge Online). This position illustrates a digital games industry strategy to expand marketing to demographic groups previously marginalised.A few examples from the marketing and advertising campaigns for the Nintendo Wii help to illustrate this strategy. The marketing associated with the Wii can be seen as part of a longer lineage of Nintendo marketing with Kline et al. suggesting, “it was under Nintendo’s hegemony that the video game industry began to see the systematic development of a high-intensity marketing apparatus, involving massive media budgets, ingenious event marketing, ground breaking advertising and spin off merchandising” (118). The “First Experiences” show on the Wii website mocks-up domestic settings as the backdrop to the Wii playing experience to present an ideal, potential Wii-play scenario. These advertisements can be seen to position the player within an imagined home and game-play environment and speak for the Wii. As Keith Grint and Steve Woolgar suggest, “technology does not speak for itself but has to be spoken for” (32). As part of their concern with addressing, “the particular regime of truth which surrounds, upholds, impales and represents technology” (32), Grint and Woolgar “analyse the way certain technologies gain specific attributes” (33). Across advertisements for the Wii there are a range of domestic environments and groups playing. Of these, the power to bring the family together and facilitate ease of game-play for the novice is most noticeable. David Morley’s comment that, “‘hi-tech’ discourse is often carefully framed and domesticated by a rather nostalgic vision of ‘family values’” (438) is borne out here.A television advertisement aired on Nickelodeon illustrates the extent to which the Wii was at the forefront in motioning forward a strategy of industry and gaming inclusiveness around the family: “the 60-second spot shows a dad mistaking the Wii Remote for his television remote control. Dad becomes immersed in the game and soon the whole family joins in” (Nintendo World Report). From confused fathers to family bonding, the Wii is presented as the easy-to-use and accessible device that brings the family together. The father confusing the Wii remote with a television remote control is an important gesture to foreground the accessibility of the Wii remotes compared to previous “joypads”, and emphasize the Wii as an accessible device with no bedroom, technical wizardry required. Within the emerging industry inclusivity agenda, the ‘over technological’ past of digital gaming is something to move away from. The forms of ‘geek’ or ‘hardcore’ that epitomise previous dominant representations of gaming have seemingly stood in the way of the industry reaching its full market potential. This industry wind change is captured in the comments of a number of current industry professionals.For Matthew Jeffrey, head of European Recruitment for Electronic Arts (EA), speaking at the London Games Week Career Fair, the shift in the accessibility and inclusivity of digital gaming is closely bound up with Nintendo’s efforts and these have impacted upon EA’s strategy: There is going to be a huge swathe of new things and the great thing in the industry, as you are all easy to identify, is that Nindento DS and the Wii have revolutionised the way we look at the way things are going on.Jeffrey goes on to add, “hopefully some of you have seen that your eighty year old grandparent is quite happy to play a game”, pointing to the figure of the grandparent as a game-player to emphasise the inclusivity shift within gaming.Similarly, at Edinburgh Interactive Festival 2007, the CEO of Ubisoft Yves Guillemot in his “The New Generation of Gaming: Facing the Challenges of a Changing Market” speech outlined the development of a family friendly portfolio to please a new, non-gamer population that would include the recruitment of subject experts for “non-game” titles. This instance of the accessibility and inclusivity strategy being advocated is notable for it being part of a keynote speech at the Edinburgh Interactive Festival, an event associated with the Edinburgh festival that is both an important industry gathering and receives mainstream press coverage. The approaches taken by the other leading console manufacturers Sony and Microsoft, illustrate that whilst this is by no means a total shift, there is nevertheless an industry-wide engagement. The ‘World of Playstation: family and friends’ for example suggests that, “with PlayStation, games have never been more family-friendly” and that “you can even team up as a family to challenge your overseas relatives to a round of online quizzing over the PLAYSTATION Network” (Playstation).What follows from these accounts and transformations is a consideration of where the “geeky” past resides in the future of gaming as inclusive and accessible. Where do these developments leave digital gaming’s “subcultural past” (“subcultural” as it now becomes even within the games industry), as the industry forges on into mainstream culture? Past digital games technologies are clearly important in indicating technological progression and advancement, but what of the bedroom culture of gaming? How does “geek game culture” fit within a maturing future for the industry?Bedroom Programmers and Subcultural Memories There is a tension between business strategy directed towards making gaming accessible and thereby fostering new markets, and the games those in industry would design for people like themselves. This is not to deny the willingness or commitment of games developers to work on a variety of games, but instead to highlight transformation and tension. In their research into games development, Dovey and Kennedy suggest that, the “generation, now nearing middle-age and finding themselves in the driving seat of cultures of new media, have to reconcile a subcultural history and a dominant present” (145). Pierre Bourdieu’s account of symbolic capital is influential in tracing this shift, and Dovey and Kennedy note Bourdieu’s comment around, “the subjective image of the occupational project and the objective function of the occupation” (145). This shift is highly significant for ways of understanding maturation and inclusivity strategies within digital gaming.Bourdieu’s account of the “conservative functions attached” to an occupation for Dovey and Kennedy: Precisely describes the tensions between designers’ sense of themselves as ‘outsiders’ and rebels (‘the subjective image of the occupational project’) on the one hand and their position within a very tight production machine (‘the objective function of the occupation’) on the other. (145) I would suggest the “production machine”, that is to say the broader corporate management structures by which games development companies are increasingly operated, has a growing role in understandings of the industry. This approach was implicit in Iwata’s comments on selling cosmetics to men and broadening demographics, and Jeffrey’s comments pointing to how EA’s outlook would be influenced by the accessibility and inclusivity strategy championed by Nintendo. It may be suggested that as the occupational project of gaming is negotiated and shifts towards an emphasis on accessibility and inclusivity, the subjective image must be similarly reoriented. That previous industry models are being replaced, is highlighted in this excerpt from a Managing Director of a ‘leisure software’ company in the Staying ahead report on the creative industries by the Work Foundation:The first game that came from us was literally two schoolchildren making a game in their bedroom … the game hadn’t been funded, but made for fun … As those days are gone, the biggest challenges nowadays for game developers are finding funding that doesn’t impinge on creativity, and holding onto IP [intellectual property], which is so important if you want a business that is going to have any value. (27)This account suggests a hugely important transition from bedroom production, the days that ‘are gone’, towards Intellectual Property-aware production. The creative industries context for these comments should not be overlooked and is insightful for further recognising the shifts and negotiations taking place in digital gaming, notably, around the maturation of the games industry. The creative industries context is made explicit in creative industries reports such as Staying ahead and in the comments of Shaun Woodward (former Parliamentary Under-Secretary of State at the Department for Culture, Media and Sport) in a keynote speech at the 2006 British Video Games Academy Awards, in which he referred to the games industry as “one of our most important creative industries”. The forms of collaboration between, for instance, The Independent Games Developers Association (TIGA) and the Department of Culture, Media and Sport (see Gamasutra), further indicate the creative industries context to the maturation of the UK games industry.The creative industries context also presents the anchor through which tensions between a subcultural history and professional future and the complex forms of recovery can be more fully engaged with. The Game On curator’s indication that making comparisons between different games technologies systems was a delicate balance insightfully provides cautions to any attempt to mark out a strict departure from the ‘subcultural’ to the ‘professional’. Clearly put, the accessibility and inclusivity strategy that shifts away from geek culture and technical wizardry remains in conversation with geek elements as the foundation for the future. As technologies are recovered within a lineage of technological development and upgrade, the geek bedroom culture of gaming is almost mythologized to offer the industry history creative credentials and future potential. Recovering and Combining: Technologies and Memories for a Professional Future Emphasised thus far has been a shift from the days gone by of bedroom programming towards an inclusive and accessible professional and mature future. This is a teleological shift in the sense that the latest technological developments can be located within a past replete with innovation and pioneering spirit. In relation to the Wii for example, a Nintendo employee states:Nintendo is a company where you are praised for doing something different from everyone else. In this company, when an individual wants to do something different, everyone else lends their support to help them overcome any hurdles. I think this is how we made the challenge of Wii a possibility. (Nintendo)Nintendo’s history, alluded to here and implicit throughout the interviews with Nintendo staff from which this comment is taken, and previous and existing ‘culture’ of experimentation is offered here as the catalyst and enabler of the Wii. A further example may be offered in relation to Nintendo’s competitor Sony.A hugely significant transformation in digital gaming, further to the accessibility and inclusivity agenda, is the ability of players to develop their own games using games engines. For Phil Harrison (Sony), gaming technology is creating a, “‘virtual community’ of collaborative digital production, marking a return to the ‘golden age of video game development, which was at home, on your own with a couple of friends, designing a game yourself’” (Kline et al., 204). Bedroom gaming that in the earlier comments was regarded as days gone by for professionals, takes on a new significance as a form of user-engagement. The previous model of bedroom production, now outmoded compared to industry production, is relocated as available for users and recovered as the ‘golden age of gaming’. It is recovered as a model for users to aspire to. The significance of this for business strategy is made clear by Kline et al. who suggest that, “thousands of bright bulbs have essentially become Sony’s junior development community” (204). An obsolete model of past production is recovered and deployed within a future vision of the games industry that sees users participating and extending forms of games engagement and consumption. Similarly, the potential of ‘bedroom’ production and its recovery in relation to growth areas such as games for mobile phones, is carefully framed by Intellectual Property Rights (Edwards and Coulton). In this respect, forms of bedroom production are carefully situated in terms of industry strategies.The “Scarce Talent Seminars” as part of the London Games Week 2008 “Skills Week” further illustrate this continual recovery of ‘past’, or more accurately alternative, forms of production in line with narratives of professionalisation and industry innovation. The seminars were stated as offering advice on bridging the gap between the “bedroom programmer” and the “professional developer”. The discourse of ‘talent’ framed this seminar, and the bedroom programmer is held up as being (not having) raw talent with creative energies and love and commitment for gaming that can be shaped for the future of the industry. This discourse of bedroom programmers as talent emphasises the industry as an enabler of individual talent through access to professional development and technological resources. This then sits alongside the recovery of historical narratives in which bedroom gaming culture is celebrated for its pioneering spirit, but is ultimately recovered in terms of current achievements and future possibilities. “Skills Week” and guidance for those wanting to work in the industry connects with the recovery of past technologies and ways of making games visible amongst the potential industry workers of the future – students. The professional future of the industry is intertwined with graduates with professional qualifications. Those qualifications need not be, and sometimes preferably should not be, in ‘gaming’ courses. What is important is the love of games and this may be seen through the appreciation of gaming’s history. During research conducted with games design students in higher education courses in the UK, many students professed a love of games dating back to the Spectrum console in the 1980s. There was legitimacy and evidence of professing long-seated interests in consoles. At the same time as acknowledging the significant, embryonic power these consoles had in stimulating their interests, many students engaged in learning games design skills with the latest software packages. Similarly, they engaged in bedroom design activities themselves, as in the days gone by, but mainly as training and to develop skills useful to securing employment within a professional development studio. Broadly, students could be said to be recovering both technologies and ways of working that are then enrolled within their development as professional workers of the future. The professional future of the gaming industry is presented as part of a teleological trajectory that mirrors the technological progression of the industry’s upgrade culture. The days of bedroom programming are cast as periods of incubation and experimentation, and part of the journey that has brought gaming to where it is now. Bedroom programming is incorporated into the evidence-base of creative industries policy reports. Other accounts of bedroom programming, independent production and attempts to explore alternative publishing avenues do not feature as readily.In the 2000 Scratchware Manifesto for example, the authors declare, “the machinery of gaming has run amok”, and say, “Basta! Enough!” (Scratchware). The Scratchware Manifesto puts forward Scratchware as a response: “a computer game, created by a microteam, with pro-quality art, game design, programming and sound to be sold at paperback prices” (Scratchware). The manifesto goes on to say, “we need Scratchware because there is more than one way to develop good computer games” (Scratchware, 2000). Using a term readily associated with the Zapatista Army of National Liberation, the Scratchware Manifesto called for a revolution in gaming and stated, “we will strive for […] originality over the tried and tested” (Scratchware). These are the experiences and accounts of the games industry that seem to fall well outside of the technological and upgrade focused agenda of professional games development.The recovery and framing of past technologies and industry practices, in ways supportive to current models of technological upgrade and advancement, legitimises these models and marginalizes others. A eulogized and potentially mythical past is recovered to point to cultures of innovation and creative vibrancy and to emphasize current and future technological prowess. We must therefore be cautious of the instrumental dangers of recovery in which ‘bright bulbs’ are enrolled and alternative forms of production marginalised.As digital gaming establishes a secure footing with increased markets, the growing pains of the industry can be celebrated and recovered as part of the ongoing narratives of the industry. Recovery is vital to make sense of both the past and future. Within digital gaming, the PDP-1 and the bedroom geek both exist in the past, present and future as part of an industry strategy and trajectory that seeks to move away from them but also relies on them. They are the legitimacy, the evidence and the potential for affirming industry models. The extent to which other narratives can be told and technologies and memories recovered as alternative forms of evidence and potential is a question I, and hopefully others, will leave open.ReferencesDovey, John, and Helen W. Kennedy. Game Cultures. Maidenhead: Open University Press, 2006.Edge-Online. "Iwata: Wii Is 'Like Selling Make-Up to Men.'" Edge-Online 19 Sep. 2006. 29 Sep. 2006 ‹http://www.edge-online.com/news/iwata-wii-like-selling-make-up-men›.Edwards, Reuben, and Paul Coulton. "Providing the Skills Required for Innovative Mobile Game Development Using Industry/Academic Partnerships." Italics e journal 5.3 (2006). ‹http://www.ics.heacademy.ac.uk/italics/vol5iss3/edwardscoulton.pdf›.Gamasutra. "TIGA Pushing for Continued UK Industry Government Support." Gamasutra Industry News 3 July 2007. 8 July 2007 ‹http://www.gamasutra.com/php-bin/news_index.php?story=14504›Grint, Keith, and Steve Woolgar. The Machine at Work. London: Blackwell, 1997.Jeffrey, Matthew. Transcribed Speech. 24 October 2007.Kline, Stephen, Nick Dyer-Witheford, and Greig De Peuter. Digital Play. London: McGill-Queen’s University Press, 2003.Lee, Gaetan. Personal Interview. 27 July 2007.Morley, David. "What’s ‘Home’ Got to Do with It? Contradictory Dynamics in the Domestication of Technology and the Dislocation of Domesticity." European Journal of Cultural Studies 6.4 (2003): 435-458.Newman, James. Videogames. London: Routledge, 2004.Nintendo. "Company History." Nintendo. 2007. 3 Nov. 2008 ‹http://www.nintendo.com/corp/history.jsp›.Nintendo. "Wii Remote." Nintendo. 2006. 29 Sep. 2008 ‹http://wiiportal.nintendo-europe.com/97.html›.Nintendo World Report. "Nintendo’s Marketing Blitz: Wii Play for All!" Nintendo World Report 13 Nov. 2006. 29 Sep. 2008 ‹http://www.nintendoworldreport.com/newsArt.cfm?artid=12383›.Playstation. "World of Playstation: Family and Friends." Sony Playstation. 3 Nov. 2008 ‹http://uk.playstation.com/home/news/articles/detail/item103208/World-of-PlayStation:-Family-&-Friends/›.Scratchware. "The Scratchware Manifesto." 2000. 14 June 2006 ‹http://www.the-underdogs.info/scratch.php›.Work Foundation. Staying Ahead: The Economic Performance of the UK’s Creative Industries. London: Department of Culture, Media and Sport, 2007.
APA, Harvard, Vancouver, ISO, and other styles
44

Madison, Nora. "The Bisexual Seen: Countering Media Misrepresentation." M/C Journal 20, no. 4 (August 16, 2017). http://dx.doi.org/10.5204/mcj.1271.

Full text
Abstract:
IntroductionJohn Berger provides a compelling analysis in Ways of Seeing on how we’ve been socialized through centuries of art to see women as objects and men as subjects. This way of seeing men and women is more than aesthetic choices but in fact shapes our ideologies of gender. As Berger asserts: “The art of the past no longer exists as it once did… In its place there is a language of images. What matters now is who uses that language for what purpose” (33).What happens when there are no historical images that represent your identity? How do others learn to see you? How do you learn to represent yourself? This article addresses the challenges that bisexuals face in constructing and contending with media representations of non-normative sexualities. As Berger suggests: “A people or class which is cut off from its own past is far less free to choose and to act as a people or class than one that has been able to situate itself in history” (33). This article seeks to apply Berger’s core concepts in Ways of Seeing studying representations of bisexuality in mainstream media. How bisexuality is represented, and therefore observed, shapes what can ultimately be culturally understood and recognized.This article explores how bisexuals use digital media to construct self-representations and brand a bisexual identity. Bisexual representations are particularly relevant to study as they are often rendered invisible by the cultural hegemony of monosexuality. Cultural norms ideologically shape the intelligibility of representation; bisexuality is often misinterpreted when read within the dominant binaries of heterosexuality and homosexuality in Western European culture. This work addresses how users adapt visual, textual, and hyperlinked information in online spaces to create representations that can be culturally recognized. Users want to be seen as bisexuals. The research for this article examined online social spaces created by and for bisexuals between 2013-2015, as well as mainstream media addressing bisexuality or bisexual characters. The social spaces studied included national and regional websites for bisexual organizations, blogs dedicated to bisexual issues and topics, and public bisexual groups on Facebook and Tumblr. Participant observation and semiotic analysis was employed to analyze how bisexual representation was discussed and performed. Learning to See Bisexuality Bisexuality is often constructed within the domain of medical and psychological classification systems as a sexual identity situated between one polarity or the other: between desiring men or desiring women as sexual partners or between being gay or being straight in sexual orientation, as most widely put forth by Alfred Kinsey in the 1950s (Kinsey et al., 1948; e.g., Blumstein, 1977; Diamond, 1993; Weinberg, 1995). This popularly held conception has a particular history that serves to reinforce the normative categories of heterosexuality and monosexuality.This history does not reflect bisexual’s accounts of their own experiences of what it means to be bisexual. Bisexuals in the spaces I study express their sexuality as fluid both in terms of gender (objects of desire do not have to identify as only male or female) as well as in terms of the lifespan (desire based on sex or gender does not have remain consistent throughout one’s life). As one participant remarked: “I think of bisexual as a different orientation from both homosexuals (who orient exclusively towards same-sex romance/sexuality) and heterosexuals (who orient exclusively toward opposite-sex romance/sexuality). Bisexuals seem to think about the world in a different way: a world of ‘AND’ rather than a world of ‘OR’.” Or as another participant noted: “I saw video a couple of months ago that described ‘bi’ as being attracted to ‘same and different sexed people.’ I considered my internal debate settled at that point. Yes, it is binary, but only in the broadest sense.”This data from my research is congruent with data from much larger studies that examined longitudinal psycho-social development of bisexual identities (Klein, 1978; Barker, 2007; Diamond, 2008). Individuals’ narratives of a more “fluid” identity suggest an emphasis at the individual level less about fluctuating between “two” possible types of sexual partners than about a dynamic, complex desire within a coherent self. Nevertheless, popular constructions of bisexuality in media continue to emphasize it within hegemonic monosexual ideologies.Heterosexual relationships are overwhelmingly the most dominant relationship type portrayed in media, and the second most portrayed relationship is homosexuality, or a serial monogamy towards only one gender. This pairing is not only conveying the dominant hegemonic norms of heterosexuality (and most often paired with serial monogamy as well), but it is equally and powerfully reproducing the hegemonic ideal of monosexuality. Monosexuality is the romantic or sexual attraction to members of one sex or gender group only. A monosexual person may identify as either heterosexual or homosexual, the key element being that their sexual or romantic attraction remains consistently directed towards one sex or gender group. In this way, we have all been socialized since childhood to value not only monogamy but monosexuality as well. However, current research on sexuality suggests that self-identified bisexuals are the largest group among non-heterosexuals. In 2011, Dr. Gary Gates, Research Director of the Williams Institute at UCLA School of Law, analyzed data collected from nine national health surveys from the USA, United Kindgdom, Canada, Australia and Norway to provide the most comprehensive statistics available to date on how many people self-identify as lesbian, gay, bisexual and transgender. While the population percentage of LGBT people varied by country, the ratio of lesbian, gay and bisexuals among LGBT people remained consistent, with self-identified bisexuals accounting for 40-60% of all LGBT populations regardless of country. This data is significant for challenging the popular assumption that bisexuals are a small minority among non-heterosexuals; indeed, this data indicates that non-monosexuals represent half of all non-heterosexuals. Yet we have learned to recognize monosexuality as dominant, normal and naturalized, even within LGBT representations. Conversely, we struggle to even recognize relationships that fall outside of this hegemonic norm. In essence, we lack ways of seeing bisexuals, pansexuals, omnisexuals, asexuals, and all queer-identified individuals who do not conform to monosexuality. We quite literally have not learned to see them, or—worse yet—learned how to not see them.Bisexual representations are particularly relevant to study as they are often rendered invisible in cultures that practice monogamy paired with hegemonic monosexuality. Members of bisexual spaces desire to achieve recognition but struggle to overcome bisexual erasure in their daily lives.Misrepresention: The Triad in Popular MediaWhen bisexuality is portrayed in media it is most commonly portrayed in a disingenuous manner where the bisexual is portrayed as being torn between potential lovers, on a pathway from straight to gay, or as a serial liar and cheater who cannot remain monogamous due to overwhelming attractions. Representations of bisexuals in media are infrequent, but those that are available too often follow these inaccurate stereotypes. By far the most common convention for representing bisexuality in visual media is the use of the triad: three people convey the (mis)representation of bisexuality as a sexuality in the “middle” of heterosexuality and homosexuality. For the purpose of this article, data analysis will be limited to print magazines for the sake of length and clarity.The 2014 New York Times Magazine article “The Scientific Quest to Prove Bisexuality Exists” (Denizet-Lewis) addresses the controversial nature of bisexuality. The cover image depicts a close-up of a man’s face, separated into two halves: in one half, a woman is nuzzled up to the man’s cheek, and the other half a man is nuzzled up to his ear. Presumably the man is bisexual and therefore split into two parts: his heterosexual self and his homosexual self. This visual depiction of bisexuality reifies the notion that bisexuals are torn between two polar desires and experience equal and concurrent attraction to more than one partner simultaneously. Furthermore, the triad represented in this way suggests that the essential bisexual is having simultaneous liaisons with heterosexual and homosexual partners.Within the convention of the triad there is also a sub-genre closely connected with hypersexualization and the male gaze. In these cases, the triad is commonly presented in varying states of undress and/or in a bed. An article in The Guardian from 11 April 2014 with the headline: “Make up your mind! The science behind bisexuality” (Browne) includes an image with three attractive young people in bed together. A man is sitting up between two sleeping women and smoking a cigarette – the cigarette connotes post-coital sexual activity, as does the smirk on his face. This may have been a suitable image if the article had been about having a threesome, but the headline—and the article—are attempting to explain the science behind bisexuality. Furthermore, while the image is intended to illustrate an article on bisexuality, the image is fundamentally misleading. The women in the image are asleep and to the side and the man is awake and in the middle. He is the central figure – it is a picture of him. So who is the bisexual in the image? What is the image attempting to do? It seems that the goal is to titillate, to excite, and to satisfy a particularly heterosexual fantasy rather than to discuss bisexuality. This hypersexualization once again references the mistaken idea (or heterosexual male fantasy) that bisexuality is only expressed through simultaneous sex acts.Many of these examples are salacious but they occur with surprising regularity in the mainstream media. On 17 February 2016, the American Association of Retired Persons posted an article to the front page of their website titled “Am I Discovering I'm Bisexual?” (Schwartz, 2016). In the accompanying image at the top of the article, we see three people sitting on a park bench – two men on either side of a woman. The image is taken from behind the bench so we see their backs and ostensibly they do not see us, the viewer. The man on the left is kissing the woman in the center while also holding hands behind the back of the bench with the man sitting on her other side. The man on the right is looking away from the couple kissing, suggesting he is not directly included in their intimate activity. Furthermore, the two men are holding hands behind the bench, which could also be code for behind the woman’s back, suggesting infidelity to the dyad and depicting some form of duplicity. This triad reinforces the trope of the bisexual as promiscuous and untrustworthy.Images such as these are common and range from the more inoffensive to the salacious. The resulting implications are that bisexuals are torn between their internal hetero and homo desires, require simultaneous partners, and are untrustworthy partners. Notably, in all these images it is never clear exactly which individuals are bisexual. Are all three members of the triad bisexual? While this is a possible read, the dominant discourse leads us to believe that one of person in the triad is the bisexual while the others adhere to more dominant sexualities.Participants in my research were acutely aware of these media representations and expressed frequent negative reactions to the implications of the triad. Each article contained numerous online comments expressing frustration with the use of “threesomes.” As one commentator stated: “Without a threesome, we’re invisible. It’s messed up. I always imagine a t-shirt with 3 couples stick figure like: girl + girl, girl + boy, and boy + boy. and it says “6 bisexuals.” What is made clear in many user comments is that the mainstream social scripts used to portray bisexuality are clearly at odds with the ways in which bisexuals choose to describe or portray themselves. Seeing through CapitalismOne of the significant conclusions of this research was the ways in which the misrepresentation of bisexuality results in many individuals feeling underrepresented or made invisible within mainstream media. The most salient themes to emerge from this research is participants’ affective struggle with feeling "invisible.” The frequency of discourse specific to invisibility is significant, as well as its expressed negatively associated experiences and feelings. The public sharing of those reactions among individuals, and the ensuing discourse that emerges from those interactions, include imagining what visibility “looks” like (its semiotic markers and what would make those markers “successful” for visibility), and the articulation of “solutions” to counter perceived invisibility. Notably, participants often express the desire for visibility in terms of commodification. As one participant posted, “their [sic] is no style for bi, there is no voice tone, unless I'm wearing my shirt, how is anyone to know?” Another participant explicated, “I wish there was a look. I wish I could get up every day and put on the clothes and jewelry that identified me to the world when I stepped out of my apartment. I wish I was as visible on the street as I am on facebook.” This longing for a culturally recognizable bisexual identity is articulated as a desire for a market commodification of “bisexual.” But a commodified identity may be a misguided desire. As Berger warns: “Publicity is not merely an assembly of competing messages: it is a language in itself which is always being used to make the same general purpose… It proposes to each of us that we transform ourselves, or our lives, by buying something more” (131). Consumerism—and its bedfellow—marketing, aim to sell the fantasy of a future self whereby the consumer transforms themselves through material objects, not transforming the culture to accept them. Berger further elicits that marketing essentially convinces us that we are not whole the way we are and sells us the idea of a wholeness achieved through consumerism (134). Following Berger’s argument, this desire for a commodified identity, while genuine, may fundamentally undermine the autonomy bisexuals currently have insomuch as without a corporate brand, bisexual representations are more culturally malleable and therefore potentially more inclusive to the real diversity of bisexual identified people.However, Berger also rightly noted that “publicity is the culture of the consumer society. It propagates through images that society’s belief in itself” (139). Without any publicity, bisexuals are not wrong to feel invisible in a consumer culture. And yet “publicity turns consumption into a substitute for democracy. The choice of what one eats (or wears or drives) takes the place of significant political choice” (149). A commodified identity will not likely usher in meaningful political change in a culture where bisexuals experience worse mental health and discrimination outcomes than lesbian and gay people (LGBT Advisory Committee, 2011). Bisexuals Online: New Ways of SeeingThe Internet, which was touted early as a space of great potential for anonymity and exploration where visibility can be masked, here becomes the place where bisexuals try to make the perceived invisible ‘visible.’ Digital technologies and spaces provide particularly useful environments for participants of online bisexual spaces to negotiate issues of invisibility as participants construct visible identities through daily posts, threads, videos, and discourse in which bisexuality is discursively and visually imagined, produced, articulated, defended, and desired. But most importantly these digital technologies provide bisexuals with opportunities to counter misrepresentations in mainstream media. In the frequent example of intimate partners in the physical world rendering a bisexual’s identity invisible, participants of these online communities grapple with the seeming paradox of one’s offline self as the avatar and one’s online self as more fully integrated, represented, and recognized. One participant expressed this experience, remarking:I feel I'm more out online that offline. That's because, in the offline world there's the whole ''social assumptions'' issue. My co-workers, friends, etc, know I have a boyfriend, wich [sic] equals ''straight'' for most ppl out there. So, I'll out myself when the occasion comes (talking abt smn I used to date, the LGBT youth group I used to belong to, or usually just abt some girl I find attractive) and usually ppl are not surprised. Whereas online, my pic at Facebook (and Orkut) is a Bisexual Pride icon. I follow Bi groups on Twitter. I'm a member of bi groups. So, online it's spelled out, while offline ppl usually think me having a bf means I'm straight.The I Am Visible (IAV) campaign is just one example of an organized response to the perceived erasure of bisexuals in mainstream culture. Launched in January 2011 by Adrienne McCue (nee Williams), the executive director of the Bi Social Network, a non-profit organization aimed at bringing awareness to representations of bisexuality in media. The campaign was hosted on bisocialnetwork.com, with the goal to “stop biphobia and bi-erasure in our community, media, news, and entertainment,” Prior to going live, IAV implemented a six-month lead-up advertising campaign across multiple online bisexual forums, making it the most publicized new venture during the period of my study. IAV hosted user-generated videos and posters that followed the vernacular of coming out and provided emotional support for listeners who may be struggling with their identity in a world largely hostile to bisexuality. Perceived invisibility was the central theme of IAV, which was the most salient theme for every bisexual group I studied online.Perhaps the most notable video and still image series to come out of IAV were those including Emmy nominated Scottish actor Alan Cumming. Cumming, a long-time Broadway thespian and acclaimed film actor, openly identifies as bisexual and has criticized ‘gaystream’ outlets on more than one occasion for intentionally mislabeling him as ‘gay.’ As such, Alan Cumming is one of the most prominently celebrated bisexual celebrities during the time of my study. While there are numerous famous out gays and lesbians in the media industry who have lent their celebrity status to endorse LGBT political messages—such as Ellen DeGeneres, Elton John, and Neil Patrick Harris, to name a few—there have been notably fewer celebrities supporting bisexual specific causes. Therefore, Cummings involvement with IAV was significant for many bisexuals. His star status was perceived as contributing legitimacy to bisexuality and increasing cultural visibility for bisexuals.These campaigns to become more visible are based in the need to counteract the false media narrative, which is, in a sense, to educate the wider society as to what bisexuality is not. The campaigns are an attempt to repair the false messages which have been “learnt” and replace them with more accurate representations. The Internet provides bisexual activists with a tool with which they can work to correct the skewed media image of themselves. Additionally, the Internet has also become a place where bisexuals can more easily represent themselves through a wide variety of semiotic markers in ways which would be difficult or unacceptable offline. In these ways, the Internet has become a key device in bisexual activism and while it is important not to uncritically praise the technology it plays an important role in enabling correct representation. ReferencesBarker, Meg. "Heteronormativity and the Exclusion of Bisexuality in Psychology." Out in Psychology: Lesbian, Gay, Bisexual, Trans, and Queer Perspectives. Eds. Victoria Clarke and Elizabeth Peel. Chichester: Wiley, 2007. 86–118.Berger, John. Ways of Seeing. London: Penguin Books, 1972.Blumstein, Phillip W., and Pepper Schwartz. “Bisexuality: Some Social Psychological Issues.” Journal of Social Issues 33.2 (1977): 30–45.Browne, Tania. “Make Up Your Mind! The Science behind Bisexuality.” The Guardian 11 Apr. 2014.Denizet-Lewis, Benoit. "The Scientific Quest to Prove Bisexuality Exists." New York Times 20 Mar. 2014.Diamond, Lisa. Sexual Fluidity: Understanding Women's Love and Desire. Harvard UP, 2008.Diamond, Milton. “Homosexuality and Bisexuality in Different Populations.” Archives of Sexual Behavior 22.4 (1993): 291-310.Gates, Gary J. How Many People Are Lesbian, Gay, Bisexual and Transgender? Williams Institute, UCLA School of Law, 2011.Kinsey, Alfred, et al. Sexual Behavior in the Human Female. Philadelphia: Saunders, 1953.Klein, Fitz. The Bisexual Option. London: Routledge, 1978.Leland, J. “Not Gay, Not Straight: A New Sexuality Emerges.” Newsweek 17 July 1995: 44–50.Schwartz, P. “Am I Discovering I Am Bisexual?” AARP (2016). 20 Mar. 2016 <http://aarp.org/home-family/sex-intimacy/info-2016/discovering-bisexual-schwartz.html>.
APA, Harvard, Vancouver, ISO, and other styles
45

Horrigan, Matthew. "A Flattering Robopocalypse." M/C Journal 23, no. 6 (November 28, 2020). http://dx.doi.org/10.5204/mcj.2726.

Full text
Abstract:
RACHAEL. It seems you feel our work is not a benefit to the public.DECKARD. Replicants are like any other machine. They're either a benefit or a hazard. If they're a benefit it's not my problem.RACHAEL. May I ask you a personal question?DECKARD. Yes.RACHAEL. Have you every retired a human by mistake? (Scott 17:30) CAPTCHAs (henceforth "captchas") are commonplace on today's Internet. Their purpose seems clear: block malicious software, allow human users to pass. But as much as they exclude spambots, captchas often exclude humans with visual and other disabilities (Dzieza; W3C Working Group). Worse yet, more and more advanced captcha-breaking technology has resulted in more and more challenging captchas, raising the barrier between online services and those who would access them. In the words of inclusive design advocate Robin Christopherson, "CAPTCHAs are evil". In this essay I describe how the captcha industry implements a posthuman process that speculative fiction has gestured toward but not grasped. The hostile posthumanity of captcha is not just a technical problem, nor just a problem of usability or access. Rather, captchas convey a design philosophy that asks humans to prove themselves by performing well at disembodied games. This philosophy has its roots in the Turing Test itself, whose terms guide speculation away from the real problems that today's authentication systems present. Drawing the concept of "procedurality" from game studies, I argue that, despite a design goal of separating machines and humans to the benefit of the latter, captchas actually and ironically produce an arms race in which humans have a systematic and increasing disadvantage. This arms race results from the Turing Test's equivocation between human and machine bodies, an assumption whose influence I identify in popular film, science fiction literature, and captcha design discourse. The Captcha Industry and Its Side-Effects Exclusion is an essential function of every cybersecurity system. From denial-of-service attacks to data theft, toxic automated entities constantly seek admission to services they would damage. To remain functional and accessible, Websites need security systems to keep out "abusive agents" (Shet). In cybersecurity, the term "user authentication" refers to the process of distinguishing between abusive agents and welcome users (Jeng et al.). Of the many available authentication techniques, CAPTCHA, "Completely Automated Public Turing test[s] to tell Computers and Humans Apart" (Von Ahn et al. 1465), is one of the most iconic. Although some captchas display a simple checkbox beside a disclaimer to the effect that "I am not a robot" (Shet), these frequently give way to more difficult alternatives: perception tests (fig. 1). Test captchas may show sequences of distorted letters, which a user is supposed to recognise and then type in (Godfrey). Others effectively digitize a game of "I Spy": an image appears, with an instruction to select the parts of it that show a specific type of object (Zhu et al.). A newer type of captcha involves icons rotated upside-down or sideways, the task being to right them (Gossweiler et al.). These latter developments show the influence of gamification (Kani and Nishigaki; Kumar et al.), the design trend where game-like elements figure in serious tasks. Fig. 1: A series of captchas followed by multifactor authentication as a "quick security check" during the author's suspicious attempt to access LinkedIn over a Virtual Private Network Gamified captchas, in using tests of ability to tell humans from computers, invite three problems, of which only the first has received focussed critical attention. I discuss each briefly below, and at greater length in subsequent sections. First, as many commentators have pointed out (W3C Working Group), captchas can accidentally categorise real humans as nonhumans—a technical problem that becomes more likely as captcha-breaking technologies improve (e.g. Tam et al.; Brown et al.). Indeed, the design and breaking of captchas has become an almost self-sustaining subfield in computer science, as researchers review extant captchas, publish methods for breaking them, and publish further captcha designs (e.g. Weng et al.). Such research fuels an industry of captcha-solving services (fig. 2), of which some use automated techniques, and some are "human-powered", employing groups of humans to complete large numbers of captchas, thus clearing the way for automated incursions (Motoyama et al. 2). Captchas now face the quixotic task of using ability tests to distinguish legitimate users from abusers with similar abilities. Fig. 2: Captcha production and captcha breaking: a feedback loop Second, gamified captchas import the feelings of games. When they defeat a real human, the human seems not to have encountered the failure state of an automated procedure, but rather to have lost, or given up on, a game. The same frame of "gameful"-ness (McGonigal, under "Happiness Hacking") or "gameful work" (under "The Rise of the Happiness Engineers"), supposed to flatter users with a feeling of reward or satisfaction when they complete a challenge, has a different effect in the event of defeat. Gamefulness shifts the fault from procedure to human, suggesting, for the latter, the shameful status of loser. Third, like games, gamified captchas promote a particular strain of logic. Just as other forms of media can be powerful venues for purveying stereotypes, so are gamified captchas, in this case conveying the notion that ability is a legitimate means, not only of apportioning privilege, but of humanising and dehumanising. Humanity thus appears as a status earned, and disability appears not as a stigma, nor an occurrence, but an essence. The latter two problems emerge because the captcha reveals, propagates and naturalises an ideology through mechanised procedures. Below I invoke the concept of "procedural rhetoric" to critique the disembodied notion of humanity that underlies both the original Turing Test and the "Completely Automated Public Turing test." Both tests, I argue, ultimately play to the disadvantage of their human participants. Rhetorical Games, Procedural Rhetoric When videogame studies emerged as an academic field in the early 2000s, once of its first tasks was to legitimise games relative to other types of artefact, especially literary texts (Eskelinen; Aarseth). Scholars sought a framework for discussing how video games, like other more venerable media, can express ideas (Weise). Janet Murray and Ian Bogost looked to the notion of procedure, devising the concepts of "procedurality" (Bogost 3), "procedural authorship" (Murray 171), and "procedural rhetoric" (Bogost 1). From a proceduralist perspective, a videogame is both an object and a medium for inscribing processes. Those processes have two basic types: procedures the game's developers have authored, which script the behaviour of the game as a computer program; and procedures human players respond with, the "operational logic" of gameplay (Bogost 13). Procedurality's two types of procedure, the computerised and the human, have a kind of call-and-response relationship, where the behaviour of the machine calls upon players to respond with their own behaviour patterns. Games thus train their players. Through the training that is play, players acquire habits they bring to other contexts, giving videogames the power not only to express ideas but "disrupt and change fundamental attitudes and beliefs about the world, leading to potentially significant long-term social change" (Bogost ix). That social change can be positive (McGonigal), or it can involve "dark patterns", cases where game procedures provoke and exploit harmful behaviours (Zagal et al.). For example, embedded in many game paradigms is the procedural rhetoric of "toxic meritocracy" (Paul 66), where players earn rewards, status and personal improvement by overcoming challenges, and, especially, excelling where others fail. While meritocracy may seem logical within a strictly competitive arena, its effect in a broader cultural context is to legitimise privileges as the spoils of victory, and maltreatment as the just result of defeat. As game design has influenced other fields, so too has procedurality's applicability expanded. Gamification, "the use of game design elements in non-game contexts" (Deterding et al. 9), is a popular trend in which designers seek to imbue diverse tasks with some of the enjoyment of playing a game (10). Gamification discourse has drawn heavily upon Mihaly Csikszentmihalyi's "positive psychology" (Seligman and Csikszentmihalyi), and especially the speculative psychology of flow (Csikszentmihalyi 51), which promise enormously broad benefits for individuals acting in the "flow state" that challenging play supposedly promotes (75). Gamification has become a celebrated cause, advocated by a group of scholars and designers Sebastian Deterding calls the "Californian league of gamification evangelists" (120), before becoming an object of critical scrutiny (Fuchs et al.). Where gamification goes, it brings its dark patterns with it. In gamified user authentication (Kroeze and Olivier), and particularly gamified captcha, there occurs an intersection of deceptively difficult games, real-world stakes, and users whose differences go often ignored. The Disembodied Arms Race In captcha design research, the concept of disability occurs under the broader umbrella of usability. Usability studies emphasise the fact that some technology pieces are easier to access than others (Yan and El Ahmad). Disability studies, in contrast, emphasises the fact that different users have different capacities to overcome access barriers. Ability is contextual, an intersection of usability and disability, use case and user (Reynolds 443). When used as an index of humanness, ability yields illusive results. In Posthuman Knowledge, Rosi Braidotti begins her conceptual enquiry into the posthuman condition with a contemplation of captcha, asking what it means to tick that checkbox claiming that "I am not a robot" (8), and noting the baffling multiplicity of possible answers. From a practical angle, Junya Kani and Masakatsu Nishigaki write candidly about the problem of distinguishing robot from human: "no matter how advanced malicious automated programs are, a CAPTCHA that will not pass automated programs is required. Hence, we have to find another human cognitive processing capability to tackle this challenge" (40). Kani and Nishigaki try out various human cognitive processing capabilities for the task. Narrative comprehension and humour become candidates: might a captcha ascribe humanity based on human users' ability to determine the correct order of scenes in a film (43)? What about panels in a cartoon (40)? As they seek to assess the soft skills of machines, Kani and Nishigaki set up a drama similar to that of Philip K. Dick's Do Androids Dream of Electric Sheep. Do Androids Dream of Electric Sheep, and its film adaptation, Blade Runner (Scott), describe a spacefaring society populated by both humans and androids. Androids have lesser legal privileges than humans, and in particular face execution—euphemistically called "retirement"—for trespassing on planet Earth (Dick 60). Blade Runner gave these androids their more famous name: "replicant". Replicants mostly resemble humans in thought and action, but are reputed to lack the capacity for empathy, so human police, seeking a cognitive processing capability unique to humans, test for empathy to test for humanness (30). But as with captchas, Blade Runner's testing procedure depends upon an automated device whose effectiveness is not certain, prompting the haunting question: "have you ever retired a human by mistake?" (Scott 17:50). Blade Runner's empathy test is part of a long philosophical discourse about the distinction between human and machine (e.g. Putnam; Searle). At the heart of the debate lies Alan Turing's "Turing Test", which a machine hypothetically passes when it can pass itself off as a human conversationalist in an exchange of written text. Turing's motivation for coming up with the test goes: there may be no absolute way of defining what makes a human mind, so the best we can do is assess a computer's ability to imitate one (Turing 433). The aporia, however—how can we determine what makes a human mind?—is the result of an unfair question. Turing's test, dealing only with information expressed in strings of text, purposely disembodies both humans and machines. The Blade Runner universe similarly evens the playing field: replicants look, feel and act like humans to such an extent that distinguishing between the two becomes, again, the subject of a cognition test. The Turing Test, obsessed with information processing and steeped in mind-body dualism, assesses humanness using criteria that automated users can master relatively easily. In contrast, in everyday life, I use a suite of much more intuitive sensory tests to distinguish between my housemate and my laptop. My intuitions capture what the Turing Test masks: a human is a fleshy entity, possessed of the numerous trappings and capacities of a human body. The result of the automated Turing Test's focus on cognition is an arms race that places human users at an increasing disadvantage. Loss, in such a race, manifests not only as exclusion by and from computer services, but as a redefinition of proper usership, the proper behaviour of the authentic, human, user. Thus the Turing Test implicitly provides for a scenario where a machine becomes able to super-imitate humanness: to be perceived as human more often than a real human would be. In such an outcome, it would be the human conversationalist who would begin to fail the Turing test; to fail to pass themself off according to new criteria for authenticity. This scenario is possible because, through procedural rhetoric, machines shift human perspectives: about what is and is not responsible behaviour; about what humans should and should not feel when confronted with a challenge; about who does and does not deserve access; and, fundamentally, about what does and does not signify authentic usership. In captcha, as in Blade Runner, it is ultimately a machine that adjudicates between human and machine cognition. As users we rely upon this machine to serve our interests, rather than pursue some emergent automated interest, some by-product of the feedback loop that results from the ideologies of human researchers both producing and being produced by mechanised procedures. In the case of captcha, that faith is misplaced. The Feeling of Robopocalypse A rich repertory of fiction has speculated upon what novelist Daniel Wilson calls the "Robopocalypse", the scenario where machines overthrow humankind. Most versions of the story play out as a slave-owner's nightmare, featuring formerly servile entities (which happen to be machines) violently revolting and destroying the civilisation of their masters. Blade Runner's rogue replicants, for example, are effectively fugitive slaves (Dihal 196). Popular narratives of robopocalypse, despite showing their antagonists as lethal robots, are fundamentally human stories with robots playing some of the parts. In contrast, the exclusion a captcha presents when it defeats a human is not metaphorical or emancipatory. There, in that moment, is a mechanised entity defeating a human. The defeat takes place within an authoritative frame that hides its aggression. For a human user, to be defeated by a captcha is to fail to meet an apparently common standard, within the framework of a common procedure. This is a robopocalypse of baffling systems rather than anthropomorphic soldiers. Likewise, non-human software clients pose threats that humanoid replicants do not. In particular, software clients replicate much faster than physical bodies. The sheer sudden scale of a denial-of-service attack makes Philip K. Dick's vision of android resistance seem quaint. The task of excluding unauthorised software, unlike the impulse to exclude replicants, is more a practical necessity than an exercise in colonialism. Nevertheless, dystopia finds its way into the captcha process through the peril inherent in the test, whenever humans are told apart from authentic users. This is the encroachment of the hostile posthuman, naturalised by us before it denaturalises us. The hostile posthuman sometimes manifests as a drone strike, Terminator-esque (Cameron), a dehumanised decision to kill (Asaro). But it is also a process of gradual exclusion, detectable from moment to moment as a feeling of disdain or impatience for the irresponsibility, incompetence, or simply unusualness of a human who struggles to keep afloat of a rising standard. "We are in this together", Braidotti writes, "between the algorithmic devil and the acidified deep blue sea" (9). But we are also in this separately, divided along lines of ability. Captcha's danger, as a broken procedure, hides in plain sight, because it lashes out at some only while continuing to flatter others with a game that they can still win. Conclusion Online security systems may always have to define some users as legitimate and others as illegitimate. Is there a future where they do so on the basis of behaviour rather than identity or essence? Might some future system accord each user, human or machine, the same authentic status, and provide all with an initial benefit of the doubt? In the short term, such a system would seem grossly impractical. The type of user that most needs to be excluded is the disembodied type, the type that can generate orders of magnitude more demands than a human, that can proliferate suddenly and in immense number because it does not lag behind the slow processes of human bodies. This type of user exists in software alone. Rich in irony, then, is the captcha paradigm which depends on the disabilities of the threats it confronts. We dread malicious software not for its disabilities—which are momentary and all too human—but its abilities. Attenuating the threat presented by those abilities requires inverting a habit that meritocracy trains and overtrains: specifically, we have here a case where the plight of the human user calls for negative action toward ability rather than disability. References Aarseth, Espen. "Computer Game Studies, Year One." Game Studies 1.1 (2001): 1–15. Asaro, Peter. "On Banning Autonomous Weapon Systems: Human Rights, Automation, and the Dehumanization of Lethal Decision-Making." International Review of the Red Cross 94.886 (2012): 687–709. Blade Runner. Dir. Ridley Scott. Warner Bros, 1982. Bogost, Ian. Persuasive Games: The Expressive Power of Videogames. Cambridge, MA: MIT Press, 2007. Braidotti, Rosi. Posthuman Knowledge. Cambridge: Polity Press, 2019. Brown, Samuel S., et al. "I Am 'Totally' Human: Bypassing the Recaptcha." 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), 2017. Christopherson, Robin. "AI Is Making CAPTCHA Increasingly Cruel for Disabled Users." AbilityNet 2019. 17 Sep. 2020 <https://abilitynet.org.uk/news-blogs/ai-making-captcha-increasingly-cruel-disabled-users>. Csikszentmihalyi, Mihaly. Flow: The Psychology of Optimal Experience. Harper & Row: New York, 1990. Deterding, Sebastian. "Eudaimonic Design, Or: Six Invitations to Rethink Gamification." Rethinking Gamification. Eds. Mathias Fuchs et al. Lüneburg: Meson Press, 2014. Deterding, Sebastian, et al. "From Game Design Elements to Gamefulness: Defining Gamification." Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments. ACM, 2011. Dick, Philip K. Do Androids Dream of Electric Sheep. 1968. New York: Del Rey, 1996. Dihal, Kanta. "Artificial Intelligence, Slavery, and Revolt." AI Narratives: A History of Imaginative Thinking about Intelligent Machines. Eds. Stephen Cave, Kanta Dihal, and Sarah Dillon. 2020. 189–212. Dzieza, Josh. "Why Captchas Have Gotten So Difficult." The Verge 2019. 17 Sep. 2020 <https://www.theverge.com/2019/2/1/18205610/google-captcha-ai-robot-human-difficult-artificial-intelligence>. Eskelinen, Markku. "Towards Computer Game Studies." Digital Creativity 12.3 (2001): 175–83. Fuchs, Mathias, et al., eds. Rethinking Gamification. Lüneburg: Meson Press, 2014. Godfrey, Philip Brighten. "Text-Based CAPTCHA Algorithms." First Workshop on Human Interactive Proofs, 15 Dec. 2001. 14 Nov. 2020 <http://www.aladdin.cs.cmu.edu/hips/events/abs/godfreyb_abstract.pdf>. Gossweiler, Rich, et al. "What's Up CAPTCHA? A CAPTCHA Based on Image Orientation." Proceedings of the 18th International Conference on World Wide Web. WWW, 2009. Jeng, Albert B., et al. "A Study of CAPTCHA and Its Application to User Authentication." International Conference on Computational Collective Intelligence. Springer, 2010. Kani, Junya, and Masakatsu Nishigaki. "Gamified Captcha." International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 2013. Kroeze, Christien, and Martin S. Olivier. "Gamifying Authentication." 2012 Information Security for South Africa. IEEE, 2012. Kumar, S. Ashok, et al. "Gamification of Internet Security by Next Generation Captchas." 2017 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2017. McGonigal, Jane. Reality Is Broken: Why Games Make Us Better and How They Can Change the World. Penguin, 2011. Motoyama, Marti, et al. "Re: Captchas – Understanding CAPTCHA-Solving Services in an Economic Context." USENIX Security Symposium. 2010. Murray, Janet. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. New York: The Free Press, 1997. Paul, Christopher A. The Toxic Meritocracy of Video Games: Why Gaming Culture Is the Worst. University of Minnesota Press, 2018. Putnam, Hilary. "Robots: Machines or Artificially Created Life?" The Journal of Philosophy 61.21 (1964): 668–91. Reynolds, Joel Michael. "The Meaning of Ability and Disability." The Journal of Speculative Philosophy 33.3 (2019): 434–47. Searle, John. "Minds, Brains, and Programs." Behavioral and Brain Sciences 3.3 (1980): 417–24. Seligman, Martin, and Mihaly Csikszentmihalyi. "Positive Psychology: An Introduction." Flow and the Foundations of Positive Psychology. 2000. Springer, 2014. 279–98. Shet, Vinay. "Are You a Robot? Introducing No Captcha Recaptcha." Google Security Blog 3 (2014): 12. Tam, Jennifer, et al. "Breaking Audio Captchas." Advances in Neural Information Processing Systems. 2009. Proceedings of the 21st International Conference on Neural Information Processing Systems 1625–1632. ACM, 2008. The Terminator. Dir. James Cameron. Orion, 1984. Turing, Alan. "Computing Machinery and Intelligence." Mind 59.236 (1950). Von Ahn, Luis, et al. "Recaptcha: Human-Based Character Recognition via Web Security Measures." Science 321.5895 (2008): 1465–68. W3C Working Group. "Inaccessibility of CAPTCHA: Alternatives to Visual Turing Tests on the Web." W3C 2019. 17 Sep. 2020 <https://www.w3.org/TR/turingtest/>. Weise, Matthew. "How Videogames Express Ideas." DiGRA Conference. 2003. Weng, Haiqin, et al. "Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services." Big Data Mining and Analytics 2.2 (2019): 118–44. Wilson, Daniel H. Robopocalypse. New York: Doubleday, 2011. Yan, Jeff, and Ahmad Salah El Ahmad. "Usability of Captchas or Usability Issues in CAPTCHA Design." Proceedings of the 4th Symposium on Usable Privacy and Security. 2008. Zagal, José P., Staffan Björk, and Chris Lewis. "Dark Patterns in the Design of Games." 8th International Conference on the Foundations of Digital Games. 2013. 25 Aug. 2020 <http://soda.swedish-ict.se/5552/1/DarkPatterns.1.1.6_cameraready.pdf>. Zhu, Bin B., et al. "Attacks and Design of Image Recognition Captchas." Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010.
APA, Harvard, Vancouver, ISO, and other styles
46

Rogers, Ian, Dave Carter, Benjamin Morgan, and Anna Edgington. "Diminishing Dreams." M/C Journal 25, no. 2 (April 25, 2022). http://dx.doi.org/10.5204/mcj.2884.

Full text
Abstract:
Introduction In a 2019 report for the International Journal of Communication, Baym et al. positioned distributed blockchain ledger technology, and what would subsequently be referred to as Web3, as a convening technology. Riffing off Barnett, a convening technology “initiates and serves as the focus of a conversation that can address issues far beyond what it may ultimately be able to address itself” (403). The case studies for the Baym et al. research—early, aspirant projects applying the blockchain concept to music publishing and distribution—are described in the piece as speculations or provocations concerning music’s commercial and social future. What is convened in this era (pre-2017 blockchain music discourse and practice) is the potential for change: a type of widespread, broadly discussed, reimagination of the 21st-century music industries, productive precisely because near-future applications suggest the realisation of what Baym et al. call dreams. In this article, we aim to examine the Web3 music field as it lies some years later. Taking the latter half of 2021 as our subject, we present a survey of where music then resided within Web3, focussing on how the dreams of Baym et al. have morphed and evolved, and materialised and declined, in the intervening years. By investigating the discourse and functionality of 2021’s current crop of music NFTs—just one thread of music Web3’s far-reaching aspiration, but a potent and accessible manifestation nonetheless—we can make a detailed analysis of concept-led application. Volatility remains throughout the broader sector, and all of the projects listed here could be read as conditionally short-term and untested, but what they represent is a series of clearly evolved case studies of the dream, rich precisely because of what is assumed and disregarded. WTF Is an NFT? Non-fungible tokens inscribe indelible, unique ledger entries on a blockchain, detailing ownership of, or rights associated with, assets that exist off-chain. Many NFTs take the form of an ERC-721 smart-contract that functions as an indivisible token on the Ethereum blockchain. Although all ERC-721 tokens are NFTs, the inverse is not true. Similar standards exist on other blockchains, and bridges allow these tokens to be created on alternative networks such as Polygon, Solana, WAX, Cardano and Tezos. The creation (minting) and transfer of ownership on the Ethereum network—by far the dominant chain—comes with a significant and volatile transaction cost, by way of gas fees. Thus, even a “free” transaction on the main NFT network requires a currency and time investment that far outweighs the everyday routines of fiat exchange. On a technical level, the original proposal for the ERC-721 standard refers to NFTs as deeds intended to represent ownership of digital and physical assets like houses, virtual collectibles, and negative value assets such as loans (Entriken et al.). The details of these assets can be encoded as metadata, such as the name and description of the asset including a URI that typically points to either a file somewhere on the Internet or a file hosted via IPFS, a decentralised peer-to-peer hosting network. As noted in the standard, while the data inscribed on-chain are immutable, the asset being referred to is not. Similarly, while each NFT is unique, multiple NFTs could, in theory, point to a single asset. In this respect ERC-721 tokens are different from cryptocurrencies and other tokens like stable-coins in that their value is often contingent on their accurate and ongoing association with assets outside of the blockchain on which they are traded. Further complicating matters, it is often unclear if and how NFTs confer ownership of digital assets with respect to legislative or common law. NFTs rarely include any information relating to licencing or rights transfer, and high-profile NFTs such as Bored Ape Yacht Club appear to be governed by licencing terms held off-chain (Bored Ape Yacht Club). Finally, while it is possible to inscribe any kind of data, including audio, into an NFT, the ERC-721 standard and the underpinning blockchains were not designed to host multimedia content. At the time of writing, storing even a low-bandwidth stereo audio file on the ethereum network appears cost-prohibitive. This presents a challenge for how music NFTs distinguish themselves in a marketplace dominated by visual works. The following sections of this article are divided into what we consider to be the general use cases for NFTs within music in 2021. We’ve designated three overlapping cases: audience investment, music ownership, and audience and business services. Audience Investment Significant discourse around NFTs focusses on digital collectibles and artwork that are conceptually, but not functionally, unique. Huge amounts of money have changed hands for specific—often celebrity brand-led—creations, resulting in media cycles of hype and derision. The high value of these NFTs has been variously ascribed to their high novelty value, scarcity, the adoption of NFTs as speculative assets by investors, and the lack of regulatory oversight allowing for price inflation via practices such as wash-trading (Madeline; Das et al.; Cong et al.; Le Pennec, Fielder, and Ante; Fazil, Owfi, and Taesiri). We see here the initial traditional split of discourse around cultural activity within a new medium: dual narratives of utopianism and dystopianism. Regardless of the discursive frame, activity has grown steadily since stories reporting the failure of Blockchain to deliver on its hype began appearing in 2017 (Ellul). Early coverage around blockchain, music, and NFTs echoes this capacity to leverage artificial scarcity via the creation of unique digital assets (cf Heap; Tomaino). As NFTs have developed, this discourse has become more nuanced, arguing that creators are now able to exploit both ownership and abundance. However, for the most part, music NFTs have essentially adopted the form of digital artworks and collectibles in editions ranging from 1:1 or 1:1000+. Grimes’s February 2021 Mars NFT pointed to a 32-second rotating animation of a sword-wielding cherubim above the planet Mars, accompanied by a musical cue (Grimes). Mars sold 388 NFTs for a reported fixed price of $7.5k each, grossing $2,910,000 at time of minting. By contrast, electronic artists Steve Aoki and Don Diablo have both released 1:1 NFT editions that have been auctioned via Sotheby’s, Superrare, and Nifty Gateway. Interestingly, these works have been bundled with physical goods; Diablo’s Destination Hexagonia, which sold for 600 Eth or approximately US$1.2 million at the time of sale, proffered ownership of a bespoke one-hour film hosted online, along with “a unique hand-crafted box, which includes a hard drive that contains the only copy of the high-quality file of the film” (Diablo). Aoki’s Hairy was much less elaborate but still promised to provide the winner of the $888,888 auction with a copy of the 35-second video of a fur-covered face shaking in time to downbeat electronica as an Infinite Objects video print (Aoki). In the first half of 2021, similar projects from high-profile artists including Deadmau5, The Weekend, Snoop Dogg, Eminem, Blondie, and 3Lau have generated an extraordinary amount of money leading to a significant, and understandable, appetite from musicians wanting to engage in this marketplace. Many of these artists and the platforms that have enabled their sales have lauded the potential for NFTs to address an alleged poor remuneration of artists from streaming and/or bypassing “industry middlemen” (cf. Sounds.xyz); the millions of dollars generated by sales of these NFTs presents a compelling case for exploring these new markets irrespective of risk and volatility. However, other artists have expressed reservations and/or received pushback on entry into the NFT marketplace due to concerns over the environmental impact of NFTs; volatility; and a perception of NFT markets as Ponzi schemes (Poleg), insecure (Goodin), exploitative (Purtill), or scammy (Dash). As of late 2021, increased reportage began to highlight unauthorised or fraudulent NFT minting (cf. TFL; Stephen), including in music (Newstead). However, the number of contested NFTs remains marginal in comparison to the volume of exchange that occurs in the space daily. OpenSea alone oversaw over US$2.5 billion worth of transactions per month. For the most part, online NFT marketplaces like OpenSea and Solanart oversee the exchange of products on terms not dissimilar to other large online retailers; the space is still resolutely emergent and there is much debate about what products, including recently delisted pro-Nazi and Alt-Right-related NFTs, are socially and commercially acceptable (cf. Pearson; Redman). Further, there are signs this trend may impact on both the willingness and capacity of rightsholders to engage with NFTs, particularly where official offerings are competing with extant fraudulent or illegitimate ones. Despite this, at the time of writing the NFT market as a whole does not appear prone to this type of obstruction. What remains complicated is the contested relationship between NFTs, copyrights, and ownership of the assets they represent. This is further complicated by tension between the claims of blockchain’s independence from existing regulatory structures, and the actual legal recourse available to music rights holders. Music Rights and Ownership Baym et al. note that addressing the problems of rights management and metadata is one of the important discussions around music convened by early blockchain projects. While they posit that “our point is not whether blockchain can or can’t fix the problems the music industries face” (403), for some professionals, the blockchain’s promise of eliminating the need for trust seemed to provide an ideal solution to a widely acknowledged business-to-business problem: one of poor metadata leading to unclaimed royalties accumulating in “black boxes”, particularly in the case of misattributed mechanical royalties in the USA (Rethink Music Initiative). As outlined in their influential institutional research paper (partnered with music rights disruptor Kobalt), the Rethink Music Initiative implied that incumbent intermediaries were benefiting from this opacity, incentivising them to avoid transparency and a centralised rights management database. This frame provides a key example of one politicised version of “fairness”, directly challenging the interest of entrenched powers and status quo systems. Also present in the space is a more pragmatic approach which sees problems of metadata and rights flows as the result of human error which can be remedied with the proper technological intervention. O’Dair and Beaven argue that blockchain presents an opportunity to eliminate the need for trust which has hampered efforts to create a global standard database of rights ownership, while music business researcher Opal Gough offers a more sober overview of how decentralised ledgers can streamline processes, remove inefficiencies, and improve cash flow, without relying on the moral angle of powerful incumbents holding on to control accounts and hindering progress. In the intervening two years, this discourse has shifted from transparency (cf. Taghdiri) to a practical narrative of reducing system friction and solving problems on the one hand—embodied by Paperchain, see Carnevali —and ethical claims reliant on the concept of fairness on the other—exemplified by Resonate—but with, so far, limited widespread impact. The notion that the need for b2b collaboration on royalty flows can be successfully bypassed through a “trustless” blockchain is currently being tested. While these earlier projects were attempts to either circumvent or fix problems facing the traditional rights holders, with the advent of the NFT in particular, novel ownership structures have reconfigured the concept of a rights holder. NFTs promise fans an opportunity to not just own a personal copy of a recording or even a digitally unique version, but to share in the ownership of the actual property rights, a role previously reserved for record labels and music publishers. New NFT models have only recently launched which offer fans a share of IP revenue. “Collectors can buy royalty ownership in songs directly from their favorite artists in the form of tokens” through the service Royal. Services such as Royal and Vezt represent potentially massive cultural shifts in the traditional separation between consumers and investors; they also present possible new headaches and adventures for accountants and legal teams. The issues noted by Baym et al. are still present, and the range of new entrants into this space risks the proliferation, rather than consolidation, of metadata standards and a need to put money into multiple blockchain ecosystems. As noted in RMIT’s blockchain report, missing royalty payments … would suggest the answer to “does it need a blockchain?” is yes (although further research is needed). However, it is not clear that the blockchain economy will progress beyond the margins through natural market forces. Some level of industry coordination may still be required. (18) Beyond the initial questions of whether system friction can be eased and standards generated without industry cooperation lie deeper philosophical issues of what will happen when fans are directly incentivised to promote recordings and artist brands as financial investors. With regard to royalty distribution, the exact role that NFTs would play in the ownership and exploitation of song IP remains conceptual rather than concrete. Even the emergent use cases are suggestive and experimental, often leaning heavily on off-chain terms, goodwill and the unknown role of existing legal infrastructure. Audience and Business Services Aside from the more high-profile NFT cases which focus on the digital object as an artwork providing a source of value, other systemic uses of NFTs are emerging. Both audience and business services are—to varying degrees—explorations of the utility of NFTs as a community token: i.e. digital commodities that have a market value, but also unlock ancillary community interaction. The music industries have a longstanding relationship with the sale of exclusivity and access tailored to experiential products. Historically, one of music’s most profitable commodities—the concert ticket—contains very little intrinsic value, but unlocks a hugely desirable extrinsic experience. As such, NFTs have already found adoption as tools of music exclusivity; as gateways into fan experiences, digital communities, live events ticketing and closed distribution. One case study incorporating almost all of these threads is the Deathbats club by American heavy metal band Avenged Sevenfold. Conceived of as the “ultimate fan club”, Deathbats is, according to the band’s singer M. Shadows, “every single thing that [fans] want from us, which is our time, our energy” (Chan). At the time of writing, the Deathbats NFT had experienced expected volatility, but maintained a 30-day average sale price well above launch price. A second affordance provided by music NFTs’ ability to tokenise community is the application of this to music businesses in the form of music DAOs: decentralised autonomous organisations. DAOs and NFTs have so far intersected in a number of ways. DAOs function as digital entities that are owned by their members. They utilise smart contracts to record protocols, votes, and transactions on the blockchain. Bitcoin and Ethereum are often considered the first DAOs of note, serving as board-less venture capital funds, also known as treasuries, that cannot be accessed without the consensus of their members. More recently, DAOs have been co-opted by online communities of shared interests, who work towards an agreed goal, and operate without the need for leadership. Often, access to DAO membership is tokenised, and the more tokens a member has, the more voting rights they possess. All proposals must pass before members, and have been voted for by the majority in order to be enacted, though voting systems differ between DAOs. Proposals must also comply with the DAO’s regulations and protocols. DAOs typically gather in online spaces such as Discord and Zoom, and utilise messaging services such as Telegram. Decentralised apps (dapps) have been developed to facilitate DAO activities such as voting systems and treasury management. Collective ownership of digital assets (in the form of NFTs) has become commonplace within DAOs. Flamingo DAO and PleasrDAO are two well-established and influential examples. The “crypto-backed social club” Friends with Benefits (membership costs between $5,000 and $10,000) serves as a “music discovery platform, an online publication, a startup incubator and a kind of Bloomberg terminal for crypto investors” (Gottsegen), and is now hosting its own curated NFT art platform with work by the likes of Pussy Riot. Musical and cross-disciplinary artists and communities are also exploring the potential of DAOs to empower, activate, and incentivise their communities as an extension of, or in addition to, their adoption and exploration of NFTs. In collaboration with Never Before Heard Sounds, electronic artist and musical pioneer Holly Herndon is exploring ideological questions raised by the growing intelligence of AI to create digital likeness and cloning through voice models. Holly+ is a custom voice instrument that allows users to process pre-existing polyphonic audio through a deep neural network trained by recordings of Holly Herndon’s voice. The output is audio-processed through Holly Herndon’s distinct vocal sound. Users can submit their resulting audio to the Holly+ DAO, to whom she has distributed ownership of her digital likeness. DAO token-holders steward which audio is minted and certified as an NFT, ensuring quality control and only good use of her digital likeness. DAO token-holders are entitled to a percentage of profit from resales in perpetuity, thereby incentivising informed and active stewardship of her digital likeness (Herndon). Another example is LA-based label Leaving Records, which has created GENRE DAO to explore and experiment with new levels of ownership and empowerment for their pre-existing community of artists, friends, and supporters. They have created a community token—$GENRE—for which they intend a number of uses, such as “a symbol of equitable growth, a badge of solidarity, a governance token, currency to buy NFTs, or as a utility to unlock token-gated communities” (Leaving Records). Taken as a whole, the spectrum of affordances and use cases presented by music NFTs can be viewed as a build-up of interest and capital around the technology. Conclusion The last half of 2021 was a moment of intense experimentation in the realms of music business administration and cultural expression, and at the time of writing, each week seemed to bring a new high-profile music Web3 project and/or disaster. Narratives of emancipation and domination under capitalism continue to drive our discussions around music and technology, and the direct link to debates on ecology and financialisation make these conversations particularly polarising. High-profile cases of music projects that overstep norms of existing IP rights, such as Hitpiece’s attempt to generate NFTs of songs without right-holders’ consent, point to the ways in which this technology is portrayed as threatening and subversive to commercial musicians (Blistein). Meanwhile, the Water and Music research DAO promises to incentivise a research community to “empower music-industry professionals with the knowledge, network and skills to do more collaborative and progressive work with technology” through NFT tokens and a DAO organisational structure (Hu et al.). The assumption in many early narratives of the ability of blockchain to provide systems of remuneration that musicians would embrace as inherently fairer is far from the reality of a popular discourse marked by increasing disdain and distrust, currently centred on NFTs as lacking in artistic merit, or even as harmful. We have seen all this talk before, of course, when jukeboxes and player pianos, film synchronisation, radio, recording, and other new communication technologies steered new paths for commercial musicians and promised magical futures. All of these innovations were met with intense scrutiny, cries of inauthentic practice, and resistance by incumbent musicians, but all were eventually sustained by the emergence of new forms of musical expression that captured the interest of the public. On the other hand, the road towards musical nirvana passes by not only the more prominent corpses of the Digital Audio Tape, SuperAudio, and countless recording formats, but if you squint and remember that technology is not always about devices or media, you can see the Secure Download Music Initiative, PressPlay, the International Music Registry, and Global Repertoire Databases in the distance, wondering if blockchain might correct some of the problems they dreamed of solving in their day. The NFT presents the artistic and cultural face of this dream of a musical future, and of course we are first seeing the emergence of old models within its contours. While the investment, ownership, and service phenomena emerging might not be reminiscent of the first moment when people were able to summon a song recording onto their computer via a telephone modem, it is important to remember that there were years of text-based chat rooms before we arrived at music through the Internet. It is early days, and there will be much confusion, anger, and experimentation before music NFTs become either another mundane medium of commercial musical practice, or perhaps a memory of another attempt to reach that goal. References Aoki, Steve. “Hairy.” Nifty Gateway 2021. 16 Feb. 2022 <https://niftygateway.com/marketplace/collection/0xbeccd9e4a80d4b7b642760275f60b62608d464f7/1?page=1>. Baym, Nancy, Lana Swartz, and Andrea Alarcon. "Convening Technologies: Blockchain and the Music Industry." International Journal of Communication 13.20 (2019). 13 Feb. 2022 <https://ijoc.org/index.php/ijoc/article/view/8590>. Barnett, C. “Convening Publics: The Parasitical Spaces of Public Action.” The SAGE Handbook of Political Geography. Eds. K.R. Cox., M. Low, and J. Robinson. London: Sage, 2008. 403–418. Blistein, Jon. "Hitpiece Wants to Make Every Song in the World an NFT. But Artists Aren't Buying It." Rolling Stone 2022. 14 Feb, 2022 <https://www.rollingstone.com/music/music-news/hitpiece-nft-song-controversy-1294027/>. Bored Ape Yacht Club. "Terms & Conditions." Yuga Labs, Inc. 2020. 14 Feb. 2022 <https://boredapeyachtclub.com/#/terms>. Carnevali, David. "Paperchain Uses Defi to Speed Streaming Payments to Musicians; the Startup Gets Streaming Data from Music Labels and Distributors on Their Artists, Then Uses Their Invoices as Collateral for Defi Loans to Pay the Musicians More Quickly." Wall Street Journal 2021. 16 Feb. 2022 <https://www.wsj.com/articles/paperchain-uses-defi-to-speed-streaming-payments-to-musicians-11635548273>. Chan, Anna. “How Avenged Sevenfold Is Reinventing the Fan Club with Deathbats Club NFTs”. NFT Now. 2021. 16 Feb. 2022 <https://avengedsevenfold.com/news/nft-now-avenged-sevenfold-reinventing-fan-club-with-deathbats-club/>. Cong, Lin William, Xi Li, Ke Tang, and Yang Yang. “Crypto Wash Trading.” SSRN 2021. 15 Feb. 2022 <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3530220>. Das, Dipanjan, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, and Giovanni Vigna. "Understanding Security Issues in the NFT Ecosystem." ArXiv 2021. 16 Feb. 2022 <https://arxiv.org/abs/2111.08893>. Dash, Anil. “NFTs Weren’t Supposed to End like This.” The Atlantic 2021. 16 Feb. 2022 <https://www.theatlantic.com/ideas/archive/2021/04/nfts-werent-supposed-end-like/618488/>. Diablo, Don. “Destination Hexagonia.” SuperRare 2021. 16 Feb. 2022 <https://superrare.com/artwork-v2/d%CE%BEstination-h%CE%BExagonia-by-don-diablo-23154>. Entriken, William, Dieter Shirley, Jacob Evans, and Nastassia Sachs. “EIP-721: Non-Fungible Token Standard.” Ethereum Improvement Proposals, 2022. 16 Feb. 2022 <https://arxiv.org/abs/2111.08893>. Fashion Law, The. “From Baby Birkins to MetaBirkins, Brands Are Facing Issues in the Metaverse.” 2021. 16 Feb. 2022 <https://www.thefashionlaw.com/from-baby-birkins-to-metabirkins-brands-are-being-plagued-in-the-metaverse/>. Fazli, Mohammah Amin, Ali Owfi, and Mohammad Reza Taesiri. "Under the Skin of Foundation NFT Auctions." ArXiv 2021. 16 Feb. 2022 <https://arxiv.org/abs/2109.12321>. Friends with Benefits. “Pussy Riot Drink My Blood”. 2021. 28 Jan. 2022 <https://gallery.fwb.help/pussy-riot-drink-my-blood>. Gough, Opal. "Blockchain: A New Opportunity for Record Labels." International Journal of Music Business Research 7.1 (2018): 26-44. Gottsegen, Will. “What’s Next for Friends with Benefits.” Yahoo! Finance 2021. 16 Feb. 2022 <https://au.finance.yahoo.com/news/next-friends-benefits-204036081.html>. Heap, Imogen. “Blockchain Could Help Musicians Make Money Again.” Harvard Business Review 2017. 16 Feb. 2022 <https://hbr.org/2017/06/blockchain-could-help-musicians-make-money-again>. Herndon, Holly. Holly+ 2021. 1 Feb. 2022 <https://holly.mirror.xyz>. Hu, Cherie, Diana Gremore, Katherine Rodgers, and Alexander Flores. "Introducing $STREAM: A New Tokenized Research Framework for the Music Industry." Water and Music 2021. 14 Feb. 2022 <https://www.waterandmusic.com/introducing-stream-a-new-tokenized-research-framework-for-the-music-industry/>. Leaving Records. “Leaving Records Introducing GENRE DAO.” Leaving Records 2021. 12 Jan. 2022 <https://leavingrecords.mirror.xyz/>. LePenne, Guénolé, Ingo Fiedler, and Lennart Ante. “Wash Trading at Cryptocurrency Exchanges.” Finance Research Letters 43 (2021). Gottsegen, Will. “What’s Next for Friend’s with Benefits?” Coin Desk 2021. 28 Jan. 2021 <https://www.coindesk.com/layer2/culture-week/2021/12/16/whats-next-for-friends-with-benefits>. Goodin, Dan. “Really Stupid ‘Smart Contract’ Bug Let Hacker Steal $31 Million in Digital Coin.” ARS Technica 2021. 16 Feb. 2022 <https://arstechnica.com/information-technology/2021/12/hackers-drain-31-million-from-cryptocurrency-service-monox-finance/>. Grimes. “Mars.” Nifty Gateway 2021. 16 Feb. 2022 <https://niftygateway.com/itemdetail/primary/0xe04cc101c671516ac790a6a6dc58f332b86978bb/2>. Newstead, Al. “Artists Outraged at Website Allegedly Selling Their Music as NFTS: What You Need to Know.” ABC Triple J 2022. 16 Feb. 2022 <https://www.abc.net.au/triplej/news/musicnews/hitpiece-explainer--artists-outraged-at-website-allegedly-selli/13739470>. O’Dair, Marcus, and Zuleika Beaven. "The Networked Record Industry: How Blockchain Technology Could Transform the Record Industry." Strategic Change 26.5 (2017): 471-80. Pearson, Jordan. “OpenSea Sure Has a Lot of Hitler NFTs for Sale.” Vice: Motherboard 2021. 16 Feb. 2022 <https://www.vice.com/en/article/akgx9j/opensea-sure-has-a-lot-of-hitler-nfts-for-sale>. Poleg, Dror. In Praise of Ponzis. 2021. 16 Feb. 2022 <https://www.drorpoleg.com/in-praise-of-ponzis/>. Purtill, James. “Artists Report Discovering Their Work Is Being Stolen and Sold as NFTs.” ABC News: Science 2021. 16 Feb. 2022 <https://www.abc.net.au/news/science/2021-03-16/nfts-artists-report-their-work-is-being-stolen-and-sold/13249408>. Rae, Madeline. “Analyzing the NFT Mania: Is a JPG Worth Millions.” SAGE Business Cases 2021. 16 Feb. 2022 <https://sk-sagepub-com.ezproxy.lib.rmit.edu.au/cases/analyzing-the-nft-mania-is-a-jpg-worth-millions>. Redman, Jamie. “Political Cartoonist Accuses NFT Platforms Opensea, Rarible of Being 'Tools for Political Censorship'.” Bitcoin.com 2021. 16 Feb. 2022 <https://news.bitcoin.com/political-cartoonist-accuses-nft-platforms-opensea-rarible-of-being-tools-for-political-censorship/>. Rennie, Ellie, Jason Potts, and Ana Pochesneva. Blockchain and the Creative Industries: Provocation Paper. Melbourne: RMIT University. 2019. Resonate. "Pricing." 2022. 16 Feb. 2022 <https://resonate.is/pricing/>. Rethink Music Initiative. Fair Music: Transparency and Payment Flows in the Music Industry. Berklee Institute for Creative Entrepreneurship, 2015. Royal. "How It Works." 2022. 16 Feb. 2022 <https://royal.io/>. Stephen, Bijan. “NFT Mania Is Here, and So Are the Scammers.” The Verge 2021. 15 Feb. 2022 <https://www.theverge.com/2021/3/20/22334527/nft-scams-artists-opensea-rarible-marble-cards-fraud-art>. Sound.xyz. Sound.xyz – Music without the Middleman. 2021. 14 Feb. 2022 <https://sound.mirror.xyz/3_TAJe4y8iJsO0JoVbXYw3BM2kM3042b1s6BQf-vWRo>. Taghdiri, Arya. "How Blockchain Technology Can Revolutionize the Music Industry." Harvard Journal of Sports & Entertainment Law 10 (2019): 173–195. Tomaino, Nick. “The Music Industry Is Waking Up to Ethereum: In Conversation with 3LAU.” SuperRare 2020. 16 Feb. 2022 <https://editorial.superrare.com/2020/10/20/the-music-industry-is-waking-up-to-ethereum-in-conversation-with-3lau/>.
APA, Harvard, Vancouver, ISO, and other styles
47

Walker, Ruth. "Double Quote Unquote: Scholarly Attribution as (a) Speculative Play in the Remix Academy." M/C Journal 16, no. 4 (August 12, 2013). http://dx.doi.org/10.5204/mcj.689.

Full text
Abstract:
Many years ago, while studying in Paris as a novice postgraduate, I was invited to accompany a friend to a seminar with Jacques Derrida. I leapt at the chance even though I was only just learning French. Although I tried hard to follow the discussion, the extent of my participation was probably signing the attendance sheet. Afterwards, caught up on the edges of a small crowd of acolytes in the foyer as we waited out a sudden rainstorm, Derrida turned to me and charmingly complimented me on my forethought in predicting rain, pointing to my umbrella. Flustered, I garbled something in broken French about how I never forgot my umbrella, how desolated I was that he had mislaid his, and would he perhaps desire mine? After a small silence, where he and the other students side-eyed me warily, he declined. For years I dined on this story of meeting a celebrity academic, cheerfully re-enacting my linguistic ineptitude. Nearly a decade later I was taken aback when I overheard a lecturer in philosophy at the University of Sydney re-telling my encounter as a witty anecdote, where an early career academic teased Derrida with a masterful quip, quoting back to him his own attention to someone else’s quote. It turned out that Spurs, one of Derrida’s more obscure early essays, employs an extended riff on an inexplicable citation found in inverted commas in the margins of Nietzsche’s papers: “J’ai oublié mon parapluie” (“I have forgotten my umbrella”). My clumsy response to a polite enquiry was recast in a process of Chinese whispers in my academic community as a snappy spur-of-the-moment witticism. This re-telling didn’t just selectively edit my encounter, but remixed it with a meta-narrative that I had myself referenced, albeit unknowingly. My ongoing interest in the more playful breaches of scholarly conventions of quotation and attribution can be traced back to this incident, where my own presentation of an academic self was appropriated and remixed from fumbler to quipster. I’ve also been struck throughout my teaching career by the seeming disconnect between the stringent academic rules for referencing and citation and the everyday strategies of appropriation that are inherent to popular remix culture. I’m taking the opportunity in this paper to reflect on the practice of scholarly quotation itself, before examining some recent creative provocations to the academic ‘author’ situated inventively at the crossroad between scholarly convention and remix culture. Early in his own teaching career at Oxford University Lewis Carroll, wrote to his younger siblings describing the importance of maintaining his dignity as a new tutor. He outlines the distance his college was at pains to maintain between teachers and their students: “otherwise, you know, they are not humble enough”. Carroll playfully describes the set-up of a tutor sitting at his desk, behind closed doors and without access to today’s communication technologies, relying on a series of college ‘scouts’ to convey information down corridors and staircases to the confused student waiting for instruction below. The lectures, according to Carroll, went something like this: Tutor: What is twice three?Scout: What’s a rice-tree?Sub-scout: When is ice free?Sub-sub-scout: What’s a nice fee??Student (timidly): Half a guinea.Sub-sub-scout: Can’t forge any!Sub-scout: Ho for jinny!Scout: Don’t be a ninny!Tutor (looking offended, tries another question): Divide a hundred by twelve.Scout: Provide wonderful bells!Sub-scout: Go ride under it yourself!Sub-sub-scout: Deride the dunderhead elf!Pupil (surprised): What do you mean?Sub-sub-scout: Doings between!Sub-scout: Blue is the screen!Scout: Soup tureen! And so the lecture proceeds… Carroll’s parody of academic miscommunication and misquoting was reproduced by Pierre Bourdieu at the opening of the book Academic Discourse to illustrate the failures of pedagogical practice in higher education in the mid 1960s, when he found scholarly language relied on codes that were “destined to dazzle rather than to enlighten” (3). Bourdieu et al found that students struggled to reproduce appropriately scholarly discourse and were constrained to write in a badly understood and poorly mastered language, finding reassurance in what he called a ‘rhetoric of despair’: “through a kind of incantatory or sacrificial rite, they try to call up and reinstate the tropes, schemas or words which to them distinguish professorial language” (4). The result was bad writing that karaoke-ed a pseudo academic discourse, accompanied by a habit of thoughtlessly patching together other peoples’ words and phrases. Such sloppy quoting activities of course invite the scholarly taboo of plagiarism or its extreme opposite, hypercitation. Elsewhere, Jacques Derrida developed an important theory of citationality and language, but it is intriguing to note his own considerable unease with conventional acknowledgement practices, of quoting and being quoted: I would like to spare you the tedium, the waste of time, and the subservience that always accompany the classic pedagogical procedures of forging links, referring back to past premises or arguments, justifying one’s own trajectory, method, system, and more or less skilful transitions, re-establishing continuity, and so on. These are but some of the imperatives of classical pedagogy with which, to be sure, one can never break once and for all. Yet, if you were to submit to them rigorously, they would very soon reduce you to silence, tautology and tiresome repetition. (The Ear of the Other, 3) This weariness with a procedural hyper-focus on referencing conventions underlines Derrida’s disquiet with the self-protecting, self-promoting and self-justifying practices that bolster pedagogical tradition and yet inhibit real scholarly work, and risk silencing the authorial voice. Today, remix offers new life to quoting. Media theorist Lev Manovich resisted the notion that the practice of ‘quotation’ was the historical precedent for remixing, aligning it instead to the authorship practice of music ‘sampling’ made possible by new electronic and digital technology. Eduardo Navas agrees that sampling is the key element that makes the act of remixing possible, but links its principles not just to music but to the preoccupation with reading and writing as an extended cultural practice beyond textual writing onto all forms of media (8). A crucial point for Navas is that while remix appropriates and reworks its source material, it relies on the practice of citation to work properly: too close to the original means the remix risks being dismissed as derivative, but at the same time the remixer can’t rely on a source always being known or recognised (7). In other words, the conceptual strategies of remix must rely on some form of referencing or citation of the ideas it sources. It is inarguable that advances in digital technologies have expanded the capacity of scholars to search, cut/copy & paste, collate and link to their research sources. New theoretical and methodological frameworks are being developed to take account of these changing conditions of academic work. For instance, Annette Markham proposes a ‘remix methodology’ for qualitative enquiry, arguing that remix is a powerful tool for thinking about an interpretive and adaptive research practice that takes account of the complexity of contemporary cultural contexts. In a similar vein Cheré Harden Blair has used remix as a theoretical framework to grapple with the issue of plagiarism in the postmodern classroom. If, following Roland Barthes, all writing is “a tissue of quotations drawn from innumerable centers of culture” (146), and if all writing is therefore rewriting, then punishing students for plagiarism becomes problematic. Blair argues that since scholarly writing has become a mosaic of digital and textual productions, then teaching must follow suit, especially since teaching, as a dynamic, shifting and intertextual enterprise, is more suited to the digital revolution than traditional, fixed writing (175). She proposes that teachers provide a space in which remixing, appropriation, patch-writing and even piracy could be allowable, even useful and productive: “a space in which the line is blurry not because students are ignorant of what is right or appropriate, or because digital text somehow contains inherent temptations to plagiarise, but because digital media has, in fact, blurred the line” (183). The clashes between remix and scholarly rules of attribution are directly addressed by the pedagogical provocations of conceptual poet Kenneth Goldsmith, who has developed a program of ‘uncreative writing’ at the University of Pennsylvania, where, among other plagiaristic tasks, he forces students to transcribe whole passages from books, or to download essays from online paper mills and defend them as their own, marking down students who show a ‘shred of originality’. In his own writing and performances, which depend almost exclusively on strategies of appropriation, plagiarism and recontextualisation of often banal sources like traffic reports, Goldsmith says that he is working to de-familiarise normative structures of language. For Goldsmith, reframing language into another context allows it to become new again, so that “we don’t need the new sentence, the old sentence re-framed is good enough”. Goldsmith argues for the role of the contemporary academic and creative writer as an intelligent agent in the management of masses of information. He describes his changing perception of his own work: “I used to be an artist, then I became a poet; then a writer. Now when asked, I simply refer to myself as a word processor” (Perloff 147). For him, what is of interest to the twenty-first century is not so much the quote that ‘rips’ or tears words out of their original context, but finding ways to make new ‘wholes’ out of the accumulations, filterings and remixing of existing words and sentences. Another extraordinary example of the blurring of lines between text, author and the discursive peculiarities of digital media can be found in Jonathan Lethem’s essay ‘An Ecstasy of Influence: A Plagiarism’, which first appeared in Harpers Magazine in 2007. While this essay is about the topic of plagiarism, it is itself plagiarized, composed of quotes that have been woven seamlessly together into a composite whole. Although Lethem provides a key at the end with a list of his sources, he has removed in-text citations and quotation marks, even while directly discussing the practices of mis-quotation and mis-attribution throughout the essay itself. Towards the end of the essay can be found the paragraph: Any text is woven entirely with citations, references, echoes, cultural languages, which cut across it through and through in a vast stereophony. The citations that go to make up a text are anonymous, untraceable, and yet already read; they are quotations without inverted commas. The kernel, the soul — let us go further and say the substance, the bulk, the actual and valuable material of all human utterances — is plagiarism. …By necessity, by proclivity, and by delight, we all quote. Neurological study has lately shown that memory, imagination, and consciousness itself is stitched, quilted, pastiched. If we cut-and-paste ourselves, might we not forgive it of our artworks? (68) Overall, Lethem’s self-reflexive pro-plagiarism essay reminds the reader not only of how ideas in literature have been continuously recycled, quoted, appropriated and remixed, but of how open-source cultures are vital for the creation of new works. Lethem (re)produces rather than authors a body of text that is haunted by ever present/absent quotation marks and references. Zara Dinnen suggests that Lethem’s essay, like almost all contemporary texts produced on a computer, is a provocation to once again re-theorise the notion of the author, as not a rigid point of origin but instead “a relay of alternative and composite modes of production” (212), extending Manovich’s notion of the role of author in the digital age of being perhaps closest to that of a DJ. But Lethem’s essay, however surprising and masterfully intertextual, was produced and disseminated as a linear ‘static’ text. On the other hand, Mark Amerika’s remixthebook project first started out as a series of theoretical performances on his Professor VJ blog and was then extended into a multitrack composition of “applied remixology” that features sampled phrases and ideas from a range of artistic, literary, musical, theoretical and philosophical sources. Wanting his project to be received not as a book but as a hybridised publication and performance art project that appears in both print and digital forms, remixthebook was simultaneously published in a prestigious university press and a website that works as an online hub and teaching tool to test out the theories. In this way, Amerika expands the concept of writing to include multimedia forms composed for both networked environments and also experiments with what he terms “creative risk management” where the artist, also a scholar and a teacher, is “willing to drop all intellectual pretence and turn his theoretical agenda into (a) speculative play” (xi). He explains his process halfway through the print book: Other times we who create innovative works of remix artare fully self-conscious of the rival lineagewe spring forth fromand knowingly take on other remixological styles just to seewhat happens when we move insideother writers’ bodies (of work)This is when remixologically inhabitingthe spirit of another writer’s stylistic tendenciesor at least the subconsciously imagined writerly gesturesthat illuminate his or her live spontaneous performancefeels more like an embodied praxis In some ways this all seems so obvious to me:I mean what is a writer anyway buta simultaneous and continuous fusion ofremixologically inhabited bodies of work? (109) Amerika mashes up the jargon of academic writing with avant-pop forms of digital rhetoric in order to “move inside other writers’ bodies (of work)” in order to test out his theoretical agenda in an “embodied praxis” at the same time that he shakes up the way that contemporary scholarship itself is performed. The remixthebook project inevitably recalls one of the great early-twentieth century plays with scholarly quotation, Walter Benjamin’s The Arcades Project. Instead of avoiding conventional quoting, footnoting and referencing, these are the very fabric of Benjamin’s sprawling project, composed entirely of quotes drawn from nineteenth century philosophy and literature. This early scholarly ‘remixing’ project has been described as bewildering and oppressive, but which others still find relevant and inspirational. Marjorie Perloff, for instance, finds the ‘passages’ in Benjamin’s arcades have “become the digital passages we take through websites and YouTube videos, navigating our way from one Google link to another and over the bridges provided by our favourite search engines and web pages" (49). For Benjamin, the process of collecting quotes was addictive. Hannah Arendt describes his habit of carrying little black notebooks in which "he tirelessly entered in the form of quotations what daily living and reading netted him in the way of 'pearls' and 'coral'. On occasion he read from them aloud, showed them around like items from a choice and precious collection" (45). A similar practice of everyday hypercitation can be found in the contemporary Australian performance artist Danielle Freakley’s project, The Quote Generator. For what was intended in 2006 to be a three year project, but which is still ongoing, Freakley takes the delirious pleasure of finding and fitting the perfect quote to fit an occasion to an extreme. Unlike Benjamin, Freakley didn’t collect and collate quotes, she then relied on them to navigate her way through her daily interactions. As The Quote Generator, Freakley spoke only in quotations drawn from film, literature and popular culture, immediately following each quote with its correct in-text reference, familiar to academic writers as the ‘author/date’ citation system. The awkwardness and seeming artificiality of even short exchanges with someone who responds only in quotes might be bewildering enough, but the inclusion of the citation after the quote maddeningly interrupts and, at the same time, adds another metalevel to a conversation where even the simple platitude ‘thank you’ might be followed by an attribution to ‘Deep Throat 1972’. Longer exchanges become increasingly overwhelming, as Freakley’s piling of quote on quote, and sometimes repeating quotes, demands an attentive listener, as is evident in a 2008 interview with Andrew Denton on the ABC’s Enough Rope: Andrew Denton’s Enough Rope (2008) Denton: So, you’ve been doing this for three years??Freakley: Yes, Optus 1991Denton: How do people respond to you speaking in such an unnatural way?Freakley: It changes, David Bowie 1991. On the streets AKA Breakdance 1984, most people that I know think that I am crazy, Billy Thorpe 1972, a nigger like me is going insane, Cyprus Hill 1979, making as much sense as a Japanese instruction manual, Red Dwarf 1993. Video documentation of Freakley’s encounters with unsuspecting members of the public reveal how frustrating the inclusion of ‘spoken’ references can be, let alone how taken aback people are on realising they never get Freakley’s own words, but are instead receiving layers of quotations. The frustration can quickly turn hostile (Denton at one point tells Freakley to “shut up”) or can prove contaminatory, as people attempt to match or one-up her quotes (see Cook's interview 8). Apparently, when Freakley continued her commitment to the performance at a Perth Centerlink, the staff sent her to a psychiatrist and she was diagnosed with an obsessive-compulsive disorder, then prescribed medication (Schwartzkoff 4). While Benjamin's The Arcades Project invites the reader to scroll through its pages as a kind of textual flaneur, Freakley herself becomes a walking and talking word processor, extending the possibilities of Amerika’s “embodied praxis” in an inescapable remix of other people’s words and phrases. At the beginning of the project, Freakley organised a card collection of quotes categorised into possible conversation topics, and devised a ‘harness’ for easy access. Image: Danielle Freakley’s The Quote Generator harness Eventually, however, Freakley was able to rely on her own memory of an astounding number of quotations, becoming a “near mechanical vessel” (Gottlieb 2009), or, according to her own manifesto, a “regurgitation library to live by”: The Quote Generator reads, and researches as it speaks. The Quote Generator is both the reader and composer/editor. The Quote Generator is not an actor spouting lines on a stage. The Quote Generator assimilates others lines into everyday social life … The Quote Generator, tries to find its own voice, an understanding through throbbing collations of others, constantly gluttonously referencing. Much academic writing quotes/references ravenously. New things cannot be said without constant referral, acknowledgement to what has been already, the intricate detective work in the barking of the academic dog. By her unrelenting appropriation and regurgitating of quotations, Freakley uses sampling as a technique for an extended performance that draws attention to the remixology of everyday life. By replacing conversation with a hyper-insistence on quotes and their simultaneous citation, she draws attention to the artificiality and inescapability of the ‘codes’ that make up not just ordinary conversations, but also conventional academic discourse, what she calls the “barking of the academic dog”. Freakley’s performance has pushed the scholarly conventions of quoting and referencing to their furthest extreme, in what has been described by Daine Singer as a kind of “endurance art” that relies, in large part, on an antagonistic relationship to its audience. In his now legendary 1969 “Double Session” seminar, Derrida, too, experimented with the pedagogical performance of the (re)producing author, teasing his earnest academic audience. It is reported that the seminar began in a dimly lit room lined with blackboards covered with quotations that Derrida, for a while, simply “pointed to in silence” (177). In this seminar, Derrida put into play notions that can be understood to inform remix practices just as much as they do deconstruction: the author, originality, mimesis, imitation, representation and reference. Scholarly conventions, perhaps particularly the quotation practices that insist on the circulation of rigid codes of attribution, and are defended by increasingly out-of-date understandings of contemporary research, writing and teaching practices, are ripe to be played with. Remix offers an expanded discursive framework to do this in creative and entertaining ways. References Amerika, Mark. remixthebook. Minneapolis: University of Minnesota Press, 2011. 29 July 2013 http://www.remixthebook.com/. Arendt, Hannah. “Walter Benjamin: 1892-1940.” In Illuminations. New York, NY: Shocken, 1969: 1-55. Barthes, Roland. “The Death of the Author.” Image Music Text. Trans Stephen Heath. New York: Hill and Wang, 1977: 142-148. Benjamin, Walter. The Arcades Project. Ed. Rolf Tiedemann, trans. Howard Eiland & Kevin McLaughlin. Cambridge, MA: Harvard University Press, 1999. Blaire, Cheré Harden. “Panic and Plagiarism: Authorship and Academic Dishonesty in a Remix Culture.” Media Tropes 2.1 (2009): 159-192. Bourdieu, Pierre, Jean-Claude Passeron, and Monique de Saint Martin. Academic Discourse: Linguistic Misunderstanding and Professorial Power. Trans. Richard Teese. Stanford California: Stanford University Press, 1965. Carroll, Lewis (Charles Dodgson). “Letter to Henrietta and Edwin Dodgson 31 Jan 1855”. 15 July 2013 http://en.wikiquote.org/wiki/Letters_of_Lewis_Carroll. Cook, Richard. “Don’t Quote Me on That.” Time Out Sydney (2008): 8. http://rgcooke.wordpress.com/2008/02/13/interview-danielle-freakley.Denton, Andrew. “Interview: The Quote Generator.” Enough Rope. 29 Feb. 2008. ABC TV. 15 July 2013 http://www.youtube.com/watch?v=AsrGvwXsenE. Derrida, Jacques. Spurs, Nietzsche’s Styles. Trans. Barbara Harlow. London: University of Chicago Press, 1978. Derrida, Jacques. The Ear of the Other: Otobiography, Text, Transference. Trans Peggy Kampf. New York: Shocken Books, 1985. Derrida, Jacques. “The Double Session”. Dissemination. Trans Alan Bass, Chicago, University of Chicago Press, 1981. Dinnen, Zara. "In the Mix: The Potential Convergence of Literature and New Media in Jonathan Letham's 'The Ecstasy of Influence'". Journal of Narrative Theory 42.2 (2012). Freakley, Danielle. The Quote Generator. 2006 to present. 10 July 2013 http://www.thequotegenerator.com/. Goldsmith, Kenneth. Uncreative Writing. New York: University of Colombia Press 2011. Gottlieb, Benjamin. "You Shall Worship No Other Artist God." Art & Culture (2009). 15 July 2013 http://www.artandculture.com/feature/999. Lethem, Jonathan. “The Ecstasy of Influence: A Plagiarism.” Harper’s Magazine, Feb. 2007: 59-71. http://harpers.org/archive/2007/02/the-ecstasy-of-influence/. Manovich, Lev. "What Comes after Remix?" 2007. 15 July 2013 http://manovich.net/LNM/index.html. Markham, Annette. “Remix Methodology.” 2013. 9 July 2013 http://www.markham.internetinquiry.org/category/remix/.Morris, Simon (dir.). Sucking on Words: Kenneth Goldsmith. 2007. http://www.ubu.com/film/goldsmith_sucking.html.Navas, Eduardo. Remix Theory: The Aesthetics of Sampling. New York: Springer Wein, 2012. Perloff, Marjorie. Unoriginal Genius: Poetry by Other Means in the New Century. Chicago: University of Chicago Press, 2010. Schwartzkoff, Louise. “Art Forms Spring into Life at Prima Vera.” Sydney Morning Herald 19 Sep. 2008: Entertainment, 4. http://www.smh.com.au/news/entertainment/arts/art-forms-spring-into-life-at-primavera/2008/09/18/1221331045404.html.Singer, Daine (cur.). “Pains in the Artists: Endurance and Suffering.” Blindside Exhibition. 2007. 2 June 2013 http://www.blindside.org.au/2007/pains-in-the-artists.shtml.
APA, Harvard, Vancouver, ISO, and other styles
48

Deer, Patrick, and Toby Miller. "A Day That Will Live In … ?" M/C Journal 5, no. 1 (March 1, 2002). http://dx.doi.org/10.5204/mcj.1938.

Full text
Abstract:
By the time you read this, it will be wrong. Things seemed to be moving so fast in these first days after airplanes crashed into the World Trade Center, the Pentagon, and the Pennsylvania earth. Each certainty is as carelessly dropped as it was once carelessly assumed. The sounds of lower Manhattan that used to serve as white noise for residents—sirens, screeches, screams—are no longer signs without a referent. Instead, they make folks stare and stop, hurry and hustle, wondering whether the noises we know so well are in fact, this time, coefficients of a new reality. At the time of writing, the events themselves are also signs without referents—there has been no direct claim of responsibility, and little proof offered by accusers since the 11th. But it has been assumed that there is a link to US foreign policy, its military and economic presence in the Arab world, and opposition to it that seeks revenge. In the intervening weeks the US media and the war planners have supplied their own narrow frameworks, making New York’s “ground zero” into the starting point for a new escalation of global violence. We want to write here about the combination of sources and sensations that came that day, and the jumble of knowledges and emotions that filled our minds. Working late the night before, Toby was awoken in the morning by one of the planes right overhead. That happens sometimes. I have long expected a crash when I’ve heard the roar of jet engines so close—but I didn’t this time. Often when that sound hits me, I get up and go for a run down by the water, just near Wall Street. Something kept me back that day. Instead, I headed for my laptop. Because I cannot rely on local media to tell me very much about the role of the US in world affairs, I was reading the British newspaper The Guardian on-line when it flashed a two-line report about the planes. I looked up at the calendar above my desk to see whether it was April 1st. Truly. Then I got off-line and turned on the TV to watch CNN. That second, the phone rang. My quasi-ex-girlfriend I’m still in love with called from the mid-West. She was due to leave that day for the Bay Area. Was I alright? We spoke for a bit. She said my cell phone was out, and indeed it was for the remainder of the day. As I hung up from her, my friend Ana rang, tearful and concerned. Her husband, Patrick, had left an hour before for work in New Jersey, and it seemed like a dangerous separation. All separations were potentially fatal that day. You wanted to know where everyone was, every minute. She told me she had been trying to contact Palestinian friends who worked and attended school near the event—their ethnic, religious, and national backgrounds made for real poignancy, as we both thought of the prejudice they would (probably) face, regardless of the eventual who/what/when/where/how of these events. We agreed to meet at Bruno’s, a bakery on La Guardia Place. For some reason I really took my time, though, before getting to Ana. I shampooed and shaved under the shower. This was a horror, and I needed to look my best, even as men and women were losing and risking their lives. I can only interpret what I did as an attempt to impose normalcy and control on the situation, on my environment. When I finally made it down there, she’d located our friends. They were safe. We stood in the street and watched the Towers. Horrified by the sight of human beings tumbling to their deaths, we turned to buy a tea/coffee—again some ludicrous normalization—but were drawn back by chilling screams from the street. Racing outside, we saw the second Tower collapse, and clutched at each other. People were streaming towards us from further downtown. We decided to be with our Palestinian friends in their apartment. When we arrived, we learnt that Mark had been four minutes away from the WTC when the first plane hit. I tried to call my daughter in London and my father in Canberra, but to no avail. I rang the mid-West, and asked my maybe-former novia to call England and Australia to report in on me. Our friend Jenine got through to relatives on the West Bank. Israeli tanks had commenced a bombardment there, right after the planes had struck New York. Family members spoke to her from under the kitchen table, where they were taking refuge from the shelling of their house. Then we gave ourselves over to television, like so many others around the world, even though these events were happening only a mile away. We wanted to hear official word, but there was just a huge absence—Bush was busy learning to read in Florida, then leading from the front in Louisiana and Nebraska. As the day wore on, we split up and regrouped, meeting folks. One guy was in the subway when smoke filled the car. Noone could breathe properly, people were screaming, and his only thought was for his dog DeNiro back in Brooklyn. From the panic of the train, he managed to call his mom on a cell to ask her to feed “DeNiro” that night, because it looked like he wouldn’t get home. A pregnant woman feared for her unborn as she fled the blasts, pushing the stroller with her baby in it as she did so. Away from these heart-rending tales from strangers, there was the fear: good grief, what horrible price would the US Government extract for this, and who would be the overt and covert agents and targets of that suffering? What blood-lust would this generate? What would be the pattern of retaliation and counter-retaliation? What would become of civil rights and cultural inclusiveness? So a jumble of emotions came forward, I assume in all of us. Anger was not there for me, just intense sorrow, shock, and fear, and the desire for intimacy. Network television appeared to offer me that, but in an ultimately unsatisfactory way. For I think I saw the end-result of reality TV that day. I have since decided to call this ‘emotionalization’—network TV’s tendency to substitute analysis of US politics and economics with a stress on feelings. Of course, powerful emotions have been engaged by this horror, and there is value in addressing that fact and letting out the pain. I certainly needed to do so. But on that day and subsequent ones, I looked to the networks, traditional sources of current-affairs knowledge, for just that—informed, multi-perspectival journalism that would allow me to make sense of my feelings, and come to a just and reasoned decision about how the US should respond. I waited in vain. No such commentary came forward. Just a lot of asinine inquiries from reporters that were identical to those they pose to basketballers after a game: Question—‘How do you feel now?’ Answer—‘God was with me today.’ For the networks were insistent on asking everyone in sight how they felt about the end of las torres gemelas. In this case, we heard the feelings of survivors, firefighters, viewers, media mavens, Republican and Democrat hacks, and vacuous Beltway state-of-the-nation pundits. But learning of the military-political economy, global inequality, and ideologies and organizations that made for our grief and loss—for that, there was no space. TV had forgotten how to do it. My principal feeling soon became one of frustration. So I headed back to where I began the day—The Guardian web site, where I was given insightful analysis of the messy factors of history, religion, economics, and politics that had created this situation. As I dealt with the tragedy of folks whose lives had been so cruelly lost, I pondered what it would take for this to stop. Or whether this was just the beginning. I knew one thing—the answers wouldn’t come from mainstream US television, no matter how full of feelings it was. And that made Toby anxious. And afraid. He still is. And so the dreams come. In one, I am suddenly furloughed from my job with an orchestra, as audience numbers tumble. I make my evening-wear way to my locker along with the other players, emptying it of bubble gum and instrument. The next night, I see a gigantic, fifty-feet high wave heading for the city beach where I’ve come to swim. Somehow I am sheltered behind a huge wall, as all the people around me die. Dripping, I turn to find myself in a media-stereotype “crack house” of the early ’90s—desperate-looking black men, endless doorways, sudden police arrival, and my earnest search for a passport that will explain away my presence. I awake in horror, to the realization that the passport was already open and stamped—racialization at work for Toby, every day and in every way, as a white man in New York City. Ana’s husband, Patrick, was at work ten miles from Manhattan when “it” happened. In the hallway, I overheard some talk about two planes crashing, but went to teach anyway in my usual morning stupor. This was just the usual chatter of disaster junkies. I didn’t hear the words, “World Trade Center” until ten thirty, at the end of the class at the college I teach at in New Jersey, across the Hudson river. A friend and colleague walked in and told me the news of the attack, to which I replied “You must be fucking joking.” He was a little offended. Students were milling haphazardly on the campus in the late summer weather, some looking panicked like me. My first thought was of some general failure of the air-traffic control system. There must be planes falling out of the sky all over the country. Then the height of the towers: how far towards our apartment in Greenwich Village would the towers fall? Neither of us worked in the financial district a mile downtown, but was Ana safe? Where on the college campus could I see what was happening? I recognized the same physical sensation I had felt the morning after Hurricane Andrew in Miami seeing at a distance the wreckage of our shattered apartment across a suburban golf course strewn with debris and flattened power lines. Now I was trapped in the suburbs again at an unbridgeable distance from my wife and friends who were witnessing the attacks first hand. Were they safe? What on earth was going on? This feeling of being cut off, my path to the familiar places of home blocked, remained for weeks my dominant experience of the disaster. In my office, phone calls to the city didn’t work. There were six voice-mail messages from my teenaged brother Alex in small-town England giving a running commentary on the attack and its aftermath that he was witnessing live on television while I dutifully taught my writing class. “Hello, Patrick, where are you? Oh my god, another plane just hit the towers. Where are you?” The web was choked: no access to newspapers online. Email worked, but no one was wasting time writing. My office window looked out over a soccer field to the still woodlands of western New Jersey: behind me to the east the disaster must be unfolding. Finally I found a website with a live stream from ABC television, which I watched flickering and stilted on the tiny screen. It had all already happened: both towers already collapsed, the Pentagon attacked, another plane shot down over Pennsylvania, unconfirmed reports said, there were other hijacked aircraft still out there unaccounted for. Manhattan was sealed off. George Washington Bridge, Lincoln and Holland tunnels, all the bridges and tunnels from New Jersey I used to mock shut down. Police actions sealed off the highways into “the city.” The city I liked to think of as the capital of the world was cut off completely from the outside, suddenly vulnerable and under siege. There was no way to get home. The phone rang abruptly and Alex, three thousand miles away, told me he had spoken to Ana earlier and she was safe. After a dozen tries, I managed to get through and spoke to her, learning that she and Toby had seen people jumping and then the second tower fall. Other friends had been even closer. Everyone was safe, we thought. I sat for another couple of hours in my office uselessly. The news was incoherent, stories contradictory, loops of the planes hitting the towers only just ready for recycling. The attacks were already being transformed into “the World Trade Center Disaster,” not yet the ahistorical singularity of the emergency “nine one one.” Stranded, I had to spend the night in New Jersey at my boss’s house, reminded again of the boundless generosity of Americans to relative strangers. In an effort to protect his young son from the as yet unfiltered images saturating cable and Internet, my friend’s TV set was turned off and we did our best to reassure. We listened surreptitiously to news bulletins on AM radio, hoping that the roads would open. Walking the dog with my friend’s wife and son we crossed a park on the ridge on which Upper Montclair sits. Ten miles away a huge column of smoke was rising from lower Manhattan, where the stunning absence of the towers was clearly visible. The summer evening was unnervingly still. We kicked a soccer ball around on the front lawn and a woman walked distracted by, shocked and pale up the tree-lined suburban street, suffering her own wordless trauma. I remembered that though most of my students were ordinary working people, Montclair is a well-off dormitory for the financial sector and high rises of Wall Street and Midtown. For the time being, this was a white-collar disaster. I slept a short night in my friend’s house, waking to hope I had dreamed it all, and took the commuter train in with shell-shocked bankers and corporate types. All men, all looking nervously across the river toward glimpses of the Manhattan skyline as the train neared Hoboken. “I can’t believe they’re making us go in,” one guy had repeated on the station platform. He had watched the attacks from his office in Midtown, “The whole thing.” Inside the train we all sat in silence. Up from the PATH train station on 9th street I came onto a carless 6th Avenue. At 14th street barricades now sealed off downtown from the rest of the world. I walked down the middle of the avenue to a newspaper stand; the Indian proprietor shrugged “No deliveries below 14th.” I had not realized that the closer to the disaster you came, the less information would be available. Except, I assumed, for the evidence of my senses. But at 8 am the Village was eerily still, few people about, nothing in the sky, including the twin towers. I walked to Houston Street, which was full of trucks and police vehicles. Tractor trailers sat carrying concrete barriers. Below Houston, each street into Soho was barricaded and manned by huddles of cops. I had walked effortlessly up into the “lockdown,” but this was the “frozen zone.” There was no going further south towards the towers. I walked the few blocks home, found my wife sleeping, and climbed into bed, still in my clothes from the day before. “Your heart is racing,” she said. I realized that I hadn’t known if I would get back, and now I never wanted to leave again; it was still only eight thirty am. Lying there, I felt the terrible wonder of a distant bystander for the first-hand witness. Ana’s face couldn’t tell me what she had seen. I felt I needed to know more, to see and understand. Even though I knew the effort was useless: I could never bridge that gap that had trapped me ten miles away, my back turned to the unfolding disaster. The television was useless: we don’t have cable, and the mast on top of the North Tower, which Ana had watched fall, had relayed all the network channels. I knew I had to go down and see the wreckage. Later I would realize how lucky I had been not to suffer from “disaster envy.” Unbelievably, in retrospect, I commuted into work the second day after the attack, dogged by the same unnerving sensation that I would not get back—to the wounded, humbled former center of the world. My students were uneasy, all talked out. I was a novelty, a New Yorker living in the Village a mile from the towers, but I was forty-eight hours late. Out of place in both places. I felt torn up, but not angry. Back in the city at night, people were eating and drinking with a vengeance, the air filled with acrid sicklysweet smoke from the burning wreckage. Eyes stang and nose ran with a bitter acrid taste. Who knows what we’re breathing in, we joked nervously. A friend’s wife had fallen out with him for refusing to wear a protective mask in the house. He shrugged a wordlessly reassuring smile. What could any of us do? I walked with Ana down to the top of West Broadway from where the towers had commanded the skyline over SoHo; downtown dense smoke blocked the view to the disaster. A crowd of onlookers pushed up against the barricades all day, some weeping, others gawping. A tall guy was filming the grieving faces with a video camera, which was somehow the worst thing of all, the first sign of the disaster tourism that was already mushrooming downtown. Across the street an Asian artist sat painting the street scene in streaky black and white; he had scrubbed out two white columns where the towers would have been. “That’s the first thing I’ve seen that’s made me feel any better,” Ana said. We thanked him, but he shrugged blankly, still in shock I supposed. On the Friday, the clampdown. I watched the Mayor and Police Chief hold a press conference in which they angrily told the stream of volunteers to “ground zero” that they weren’t needed. “We can handle this ourselves. We thank you. But we don’t need your help,” Commissioner Kerik said. After the free-for-all of the first couple of days, with its amazing spontaneities and common gestures of goodwill, the clampdown was going into effect. I decided to go down to Canal Street and see if it was true that no one was welcome anymore. So many paths through the city were blocked now. “Lock down, frozen zone, war zone, the site, combat zone, ground zero, state troopers, secured perimeter, national guard, humvees, family center”: a disturbing new vocabulary that seemed to stamp the logic of Giuliani’s sanitized and over-policed Manhattan onto the wounded hulk of the city. The Mayor had been magnificent in the heat of the crisis; Churchillian, many were saying—and indeed, Giuliani quickly appeared on the cover of Cigar Afficionado, complete with wing collar and the misquotation from Kipling, “Captain Courageous.” Churchill had not believed in peacetime politics either, and he never got over losing his empire. Now the regime of command and control over New York’s citizens and its economy was being stabilized and reimposed. The sealed-off, disfigured, and newly militarized spaces of the New York through which I have always loved to wander at all hours seemed to have been put beyond reach for the duration. And, in the new post-“9/11” post-history, the duration could last forever. The violence of the attacks seemed to have elicited a heavy-handed official reaction that sought to contain and constrict the best qualities of New York. I felt more anger at the clampdown than I did at the demolition of the towers. I knew this was unreasonable, but I feared the reaction, the spread of the racial harassment and racial profiling that I had already heard of from my students in New Jersey. This militarizing of the urban landscape seemed to negate the sprawling, freewheeling, boundless largesse and tolerance on which New York had complacently claimed a monopoly. For many the towers stood for that as well, not just as the monumental outposts of global finance that had been attacked. Could the American flag mean something different? For a few days, perhaps—on the helmets of firemen and construction workers. But not for long. On the Saturday, I found an unmanned barricade way east along Canal Street and rode my bike past throngs of Chinatown residents, by the Federal jail block where prisoners from the first World Trade Center bombing were still being held. I headed south and west towards Tribeca; below the barricades in the frozen zone, you could roam freely, the cops and soldiers assuming you belonged there. I felt uneasy, doubting my own motives for being there, feeling the blood drain from my head in the same numbing shock I’d felt every time I headed downtown towards the site. I looped towards Greenwich Avenue, passing an abandoned bank full of emergency supplies and boxes of protective masks. Crushed cars still smeared with pulverized concrete and encrusted with paperwork strewn by the blast sat on the street near the disabled telephone exchange. On one side of the avenue stood a horde of onlookers, on the other television crews, all looking two blocks south towards a colossal pile of twisted and smoking steel, seven stories high. We were told to stay off the street by long-suffering national guardsmen and women with southern accents, kids. Nothing happening, just the aftermath. The TV crews were interviewing worn-out, dust-covered volunteers and firemen who sat quietly leaning against the railings of a park filled with scraps of paper. Out on the West Side highway, a high-tech truck was offering free cellular phone calls. The six lanes by the river were full of construction machinery and military vehicles. Ambulances rolled slowly uptown, bodies inside? I locked my bike redundantly to a lamppost and crossed under the hostile gaze of plainclothes police to another media encampment. On the path by the river, two camera crews were complaining bitterly in the heat. “After five days of this I’ve had enough.” They weren’t talking about the trauma, bodies, or the wreckage, but censorship. “Any blue light special gets to roll right down there, but they see your press pass and it’s get outta here. I’ve had enough.” I fronted out the surly cops and ducked under the tape onto the path, walking onto a Pier on which we’d spent many lazy afternoons watching the river at sunset. Dust everywhere, police boats docked and waiting, a crane ominously dredging mud into a barge. I walked back past the camera operators onto the highway and walked up to an interview in process. Perfectly composed, a fire chief and his crew from some small town in upstate New York were politely declining to give details about what they’d seen at “ground zero.” The men’s faces were dust streaked, their eyes slightly dazed with the shock of a horror previously unimaginable to most Americans. They were here to help the best they could, now they’d done as much as anyone could. “It’s time for us to go home.” The chief was eloquent, almost rehearsed in his precision. It was like a Magnum press photo. But he was refusing to cooperate with the media’s obsessive emotionalism. I walked down the highway, joining construction workers, volunteers, police, and firemen in their hundreds at Chambers Street. No one paid me any attention; it was absurd. I joined several other watchers on the stairs by Stuyvesant High School, which was now the headquarters for the recovery crews. Just two or three blocks away, the huge jagged teeth of the towers’ beautiful tracery lurched out onto the highway above huge mounds of debris. The TV images of the shattered scene made sense as I placed them into what was left of a familiar Sunday afternoon geography of bike rides and walks by the river, picnics in the park lying on the grass and gazing up at the infinite solidity of the towers. Demolished. It was breathtaking. If “they” could do that, they could do anything. Across the street at tables military policeman were checking credentials of the milling volunteers and issuing the pink and orange tags that gave access to ground zero. Without warning, there was a sudden stampede running full pelt up from the disaster site, men and women in fatigues, burly construction workers, firemen in bunker gear. I ran a few yards then stopped. Other people milled around idly, ignoring the panic, smoking and talking in low voices. It was a mainly white, blue-collar scene. All these men wearing flags and carrying crowbars and flashlights. In their company, the intolerance and rage I associated with flags and construction sites was nowhere to be seen. They were dealing with a torn and twisted otherness that dwarfed machismo or bigotry. I talked to a moustachioed, pony-tailed construction worker who’d hitched a ride from the mid-west to “come and help out.” He was staying at the Y, he said, it was kind of rough. “Have you been down there?” he asked, pointing towards the wreckage. “You’re British, you weren’t in World War Two were you?” I replied in the negative. “It’s worse ’n that. I went down last night and you can’t imagine it. You don’t want to see it if you don’t have to.” Did I know any welcoming ladies? he asked. The Y was kind of tough. When I saw TV images of President Bush speaking to the recovery crews and steelworkers at “ground zero” a couple of days later, shouting through a bullhorn to chants of “USA, USA” I knew nothing had changed. New York’s suffering was subject to a second hijacking by the brokers of national unity. New York had never been America, and now its terrible human loss and its great humanity were redesignated in the name of the nation, of the coming war. The signs without a referent were being forcibly appropriated, locked into an impoverished patriotic framework, interpreted for “us” by a compliant media and an opportunistic regime eager to reign in civil liberties, to unloose its war machine and tighten its grip on the Muslim world. That day, drawn to the river again, I had watched F18 fighter jets flying patterns over Manhattan as Bush’s helicopters came in across the river. Otherwise empty of air traffic, “our” skies were being torn up by the military jets: it was somehow the worst sight yet, worse than the wreckage or the bands of disaster tourists on Canal Street, a sign of further violence yet to come. There was a carrier out there beyond New York harbor, there to protect us: the bruising, blustering city once open to all comers. That felt worst of all. In the intervening weeks, we have seen other, more unstable ways of interpreting the signs of September 11 and its aftermath. Many have circulated on the Internet, past the blockages and blockades placed on urban spaces and intellectual life. Karl-Heinz Stockhausen’s work was banished (at least temporarily) from the canon of avant-garde electronic music when he described the attack on las torres gemelas as akin to a work of art. If Jacques Derrida had described it as an act of deconstruction (turning technological modernity literally in on itself), or Jean Baudrillard had announced that the event was so thick with mediation it had not truly taken place, something similar would have happened to them (and still may). This is because, as Don DeLillo so eloquently put it in implicit reaction to the plaintive cry “Why do they hate us?”: “it is the power of American culture to penetrate every wall, home, life and mind”—whether via military action or cultural iconography. All these positions are correct, however grisly and annoying they may be. What GK Chesterton called the “flints and tiles” of nineteenth-century European urban existence were rent asunder like so many victims of high-altitude US bombing raids. As a First-World disaster, it became knowable as the first-ever US “ground zero” such precisely through the high premium immediately set on the lives of Manhattan residents and the rarefied discussion of how to commemorate the high-altitude towers. When, a few weeks later, an American Airlines plane crashed on take-off from Queens, that borough was left open to all comers. Manhattan was locked down, flown over by “friendly” bombers. In stark contrast to the open if desperate faces on the street of 11 September, people went about their business with heads bowed even lower than is customary. Contradictory deconstructions and valuations of Manhattan lives mean that September 11 will live in infamy and hyper-knowability. The vengeful United States government and population continue on their way. Local residents must ponder insurance claims, real-estate values, children’s terrors, and their own roles in something beyond their ken. New York had been forced beyond being the center of the financial world. It had become a military target, a place that was receiving as well as dispatching the slings and arrows of global fortune. Citation reference for this article MLA Style Deer, Patrick and Miller, Toby. "A Day That Will Live In … ?" M/C: A Journal of Media and Culture 5.1 (2002). [your date of access] < http://www.media-culture.org.au/0203/adaythat.php>. Chicago Style Deer, Patrick and Miller, Toby, "A Day That Will Live In … ?" M/C: A Journal of Media and Culture 5, no. 1 (2002), < http://www.media-culture.org.au/0203/adaythat.php> ([your date of access]). APA Style Deer, Patrick and Miller, Toby. (2002) A Day That Will Live In … ?. M/C: A Journal of Media and Culture 5(1). < http://www.media-culture.org.au/0203/adaythat.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography