Articoli di riviste sul tema "Peer-to-peer architecture (Computer networks) – Quality control"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Peer-to-peer architecture (Computer networks) – Quality control.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-37 articoli di riviste per l'attività di ricerca sul tema "Peer-to-peer architecture (Computer networks) – Quality control".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Alqahtani, Amal, Heba Kurdi e Majed Abdulghani. "HadithTrust: Trust Management Approach Inspired by Hadith Science for Peer-to-Peer Platforms". Electronics 10, n. 12 (16 giugno 2021): 1442. http://dx.doi.org/10.3390/electronics10121442.

Testo completo
Abstract (sommario):
Peer-to-peer (P2P) platforms are gaining increasing popularity due to their scalability, robustness and self-organization. In P2P systems, peers interact directly with each other to share resources or exchange services without a central authority to manage the interaction. However, these features expose P2P platforms to malicious attacks that reduce the level of trust between peers and in extreme situations, may cause the entire system to shut down. Therefore, it is essential to employ a trust management system that establishes trust relationships among peers. Current P2P trust management systems use binary categorization to classify peers as trustworthy or not trustworthy. However, in the real world, trustworthiness is a vague concept; peers have different levels of trustworthiness that affect their overall trust value. Therefore, in this paper, we developed a novel trust management algorithm for P2P platforms based on Hadith science where Hadiths are systematically classified into multiple levels of trustworthiness, based on the quality of narrator and content. To benchmark our proposed system, HadithTrust, we used two state-of-art trust management systems, EigenTrust and InterTrust, with no-trust algorithm as a baseline scenario. Various experimental results demonstrated the superiority of HadithTrust considering eight performance measures.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Alaya, Bechir, e Rehanullah Khan. "QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives". Computer Journal 63, n. 10 (1 luglio 2020): 1547–63. http://dx.doi.org/10.1093/comjnl/bxaa060.

Testo completo
Abstract (sommario):
Abstract The amount of online video content is exponentially increasing, which spurs its access demands. Providing optimal quality of service (QoS) for this ever-increasing video data is a challenging task due to the number of QoS constraints. The system resources, the distributed system platform and the transport protocol thus all need to collaborate to guarantee an acceptable level of QoS for the optimal video streaming process. In this paper, we present a comprehensive survey on QoS management for the video-on-demand systems. First, we focus on load management and replication algorithms in content delivery networks and peer-to-peer (P2P) networks for their shortcomings. We also address the problem of admission control and resource allocation with the objectives of congestion avoidance and frame-loss reduction. Besides, we introduce and discuss various replication schemes. For both the client–server architecture and P2P networks, we highlight the need for a specific storage management policy to preserve system reliability and content availability. We also focus on content distribution and streaming protocols scaling. We deduce that content availability is linked to the characteristics and the performance of the streaming protocols. Finally, we create a comparison table that presents the different contributions of the discussed approaches as well as their limitations. We believe that such a comprehensive survey provides useful insights and contributes to the related domains.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Lou, Xiaosong, e Kai Hwang. "Quality of data delivery in peer-to-peer video streaming". ACM Transactions on Multimedia Computing, Communications, and Applications 8, n. 1S (febbraio 2012): 1–23. http://dx.doi.org/10.1145/2089085.2089089.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Gupta, Ankur, e Lalit K. Awasthi. "Toward a Quality-of-Service Framework for Peer-to-Peer Applications". International Journal of Distributed Systems and Technologies 1, n. 3 (luglio 2010): 1–23. http://dx.doi.org/10.4018/jdst.2010070101.

Testo completo
Abstract (sommario):
P2P networks have caught the imagination of the research community and application developers with their sheer scalability and fault-tolerance characteristics. However, only content-sharing applications based on the P2P concept have reached the desired level of maturity. The potential of the P2P concept for designing the next-generation of real-world distributed applications can be realized only if a comprehensive framework quantifying the performance related aspects of all classes of P2P applications is available. Researchers have proposed some QoS (Quality-of-Service) parameters for content-sharing P2P applications based on response time and delay, but these do not cover the gamut of application domains that the P2P concept is applicable to. Hence, this research paper proposes an early QoS framework covering various classes of P2P applications; content distribution, distributed computing and communication and collaboration. Early results from the prototype implementation of the Peer Enterprises framework (a cross-organizational P2P collaborative application) are used as a basis for formulation of the QoS parameters. The individual performance measures which comprise the QoS framework are also discussed in detail along with some thoughts on how these can be complied with. The proposed framework would hopefully lead to quantifiable Service-Level Agreements for a variety of peer-to-peer services and applications.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Badis, Lyes, Mourad Amad, Djamil Aïssani e Sofiane Abbar. "P2PCF: A collaborative filtering based recommender system for peer to peer social networks". Journal of High Speed Networks 27, n. 1 (29 marzo 2021): 13–31. http://dx.doi.org/10.3233/jhs-210649.

Testo completo
Abstract (sommario):
The recent privacy incidents reported in major media about global social networks raised real public concerns about centralized architectures. P2P social networks constitute an interesting paradigm to give back users control over their data and relations. While basic social network functionalities such as commenting, following, sharing, and publishing content are widely available, more advanced features related to information retrieval and recommendation are still challenging. This is due to the absence of a central server that has a complete view of the network. In this paper, we propose a new recommender system called P2PCF. We use collaborative filtering approach to recommend content in P2P social networks. P2PCF enables privacy preserving and tackles the cold start problem for both users and content. Our proposed approach assumes that the rating matrix is distributed within peers, in such a way that each peer only sees interactions made by her friends on her timeline. Recommendations are then computed locally within each peer before they are sent back to the requester. Our evaluations prove the effectiveness of our proposal compared to a centralized scheme in terms of recall and coverage.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sizov, V. A., D. M. Malinichev e V. V. Mochalov. "Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System". Open Education 24, n. 2 (22 aprile 2020): 73–79. http://dx.doi.org/10.21686/1818-4243-2020-2-73-79.

Testo completo
Abstract (sommario):
The aim of the study is to increase the effectiveness of information security management for state information systems (SIS) with terminal access devices by improving regulatory legal acts that should be logically interconnected and not contradict each other, as well as use a single professional thesaurus that allows understanding and describe information security processes.Currently, state information systems with terminal access devices are used to ensure the realization of the legitimate interests of citizens in information interaction with public authorities [1].One of the types of such systems are public systems [2]. They are designed to provide electronic services to citizens, such as paying taxes, obtaining certificates, filing of applications and other information. The processed personal data may belong to special, biometric, publicly available and other categories [3]. Various categories of personal data, concentrated in a large volume about a large number of citizens, can lead to significant damage as a result of their leakage, which means that this creates information risks.There are several basic types of architectures of state information systems: systems based on the “thin clientpeer-to-peer network systems; file server systems; data processing centers; systems with remote user access; the use of different types of operating systems (heterogeneity of the environment); use of applications independent of operating systems; use of dedicated communication channels [4]. Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". Materials and research methods. The protection of the state information system is regulated by a large number of legal acts that are constantly being improved with changes and additions to the content. At the substantive level, it includes many stages, such as the formation of SIS requirements, the development of a security system, its implementation, and certification. The protected information is processed in order to enforce the law and ensure the functioning of the authorities. The need to protect confidential information is determined by the legislation of the Russian Federation [5, 6]. Therefore, to assess the quality of the regulatory framework of information security for terminal access devices of the state information system, the analysis of the main regulatory legal acts is carried out and on the basis of it, proposals are developed by analogy to improve existing regulatory documents in the field of information security.Results. The paper has developed proposals for improving the regulatory framework of information security for terminal access devices of the state information system- for uniformity and unification, the terms with corresponding definitions are justified for their establishment in the documents of the Federal Service for Technical and Export Control (FSTEC) or Rosstandart;- rules for the formation of requirements for terminals, which should be equivalent requirements for computer equipment in the “Concept for the protection of computer equipment and automated systems from unauthorized access to information ".Conclusion. General recommendations on information protection in state information systems using the “thin client" architecture are proposed, specific threats that are absent in the FSTEC threat bank are justified, and directions for further information security for the class of state information systems under consideration are identified. Due to the large number of stakeholders involved in the coordination and development of unified solutions, a more specific consideration of the problems and issues raised is possible only with the participation of representatives of authorized federal executive bodies and business representatives for discussion.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Yu, Zhen, William Sears e Yong Guan. "PeerCredential: a reputation-based trust framework for Peer-to-Peer applications". International Journal of Information and Computer Security 1, n. 3 (2007): 256. http://dx.doi.org/10.1504/ijics.2007.013955.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

BEYAH, RAHEEM, RAGHUPATHY SIVAKUMAR e JOHN COPELAND. "GALO: A DEPLOYABLE FRAMEWORK FOR PROVIDING BETTER THAN BEST-EFFORT QUALITY OF SERVICE". Journal of Interconnection Networks 07, n. 03 (settembre 2006): 319–51. http://dx.doi.org/10.1142/s0219265906001727.

Testo completo
Abstract (sommario):
In this paper we propose a deployable approach to improving QoS by using a generic, extendable, overlay architecture; the Generalized Application Layer Overlay (GALO). The goals of this work are to 1) create an overlay architecture which allows us to sample specific path quality metrics among different paths; 2) utilize the proposed overlay architecture in order to implement our proposed QoS-based routing schemes, Application Layer Switching (ALSW) and Application Layer Striping (ALST). Perhaps the most significant contribution of this research is that we are able to achieve better than best-effort QoS without modifying intermediate nodes (i.e., routers), thus encouraging immediate deployment. Additionally, this research is performed on an actual wide area network (WAN) testbed, comprised of universities across the nation. Also, we assemble this architecture as a peer-to-peer framework, encouraging collaborating individuals with average workstations to improve the QoS of their traffic.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Huang, Junjie, Liang Tan, Sun Mao e Keping Yu. "Blockchain Network Propagation Mechanism Based on P4P Architecture". Security and Communication Networks 2021 (4 agosto 2021): 1–12. http://dx.doi.org/10.1155/2021/8363131.

Testo completo
Abstract (sommario):
Blockchain is a mainstream technology in which many untrustworthy nodes work together to maintain a distributed ledger with advantages such as decentralization, traceability, and tamper-proof. The network layer communication mechanism in its architecture is the core of the networking method, message propagation, and data verification among blockchain nodes, which is the basis to ensure blockchain’s performance and key features. When blocks are propagated in peer-to-peer (P2P) networks with gossip protocol, the high propagation delay of the protocol itself reduces the propagation speed of the blocks, which is prone to the chain forking phenomenon and causes double payment attacks. To accelerate the propagation speed and reduce the fork probability, this paper proposes a blockchain network propagation mechanism based on proactive network provider participation for P2P (P4P) architecture. This mechanism first obtains the information of network topology and link status in a region based on the internet service provider (ISP), then it calculates the shortest path and link overhead of peer nodes using P4P technology, prioritizes the nodes with good local bandwidth conditions for transmission, realizes the optimization of node connections, improves the quality of service (QoS) and quality of experience (QoE) of blockchain networks, and enables blockchain nodes to exchange blocks and transactions through the secure propagation path. Simulation experiments show that the proposed propagation mechanism outperforms the original propagation mechanism of the blockchain network in terms of system overhead, rate of data success transmission, routing hops, and propagation delay.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Wang, Longze, Yu Xie, Delong Zhang, Jinxin Liu, Siyu Jiang, Yan Zhang e Meicheng Li. "Credible Peer-to-Peer Trading with Double-Layer Energy Blockchain Network in Distributed Electricity Markets". Electronics 10, n. 15 (28 luglio 2021): 1815. http://dx.doi.org/10.3390/electronics10151815.

Testo completo
Abstract (sommario):
Blockchain-based peer-to-peer (P2P) energy trading is one of the most viable solutions to incentivize prosumers in distributed electricity markets. However, P2P energy trading through an open-end blockchain network is not conducive to mutual credit and the privacy protection of stakeholders. Therefore, improving the credibility of P2P energy trading is an urgent problem for distributed electricity markets. In this paper, a novel double-layer energy blockchain network is proposed that stores private trading data separately from publicly available information. This blockchain network is based on optimized cross-chain interoperability technology and fully considers the special attributes of energy trading. Firstly, an optimized ring mapping encryption algorithm is designed to resist malicious nodes. Secondly, a consensus verification subgroup is built according to contract performance, consensus participation and trading enthusiasm. This subgroup verifies the consensus information through the credit-threshold digital signature. Thirdly, an energy trading model is embedded in the blockchain network, featuring dynamic bidding and credit incentives. Finally, the Erenhot distributed electricity market in China is utilized for example analysis, which demonstrates the proposed method could improve the credibility of P2P trading and realize effective supervision.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Tojo, Takuya, Tomoya Enokido e Makoto Takizawa. "Notification-Based QOS Control Protocol for Group Communication". Journal of Interconnection Networks 04, n. 02 (giugno 2003): 211–25. http://dx.doi.org/10.1142/s0219265903000830.

Testo completo
Abstract (sommario):
This paper discusses a group communication protocol to exchange multimedia messages in a group of multiple peer processes. Quality of Service (QoS) required by an application has to be supported. In traditional protocols like RTP, a process can reliably deliver messages to one or more than one process. In the group communication, each process sends a message to multiple processes while receiving messages from multiple processes in a group. Due to the limited computation and communication capacity, we cannot adopt traditional one-to-one or one-to-many transmission ways to the group communication. We propose a notification-based data transmission procedure to exchange multimedia messages among multiple processes so as to satisfy QoS requirement.
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Tommasi, Franco, Valerio De Luca e Catiuscia Melle. "QoS monitoring in real-time streaming overlays based on lock-free data structures". Multimedia Tools and Applications 80, n. 14 (11 marzo 2021): 20929–70. http://dx.doi.org/10.1007/s11042-020-10198-9.

Testo completo
Abstract (sommario):
AbstractPeer-to-peer streaming is a well-known technology for the large-scale distribution of real-time audio/video contents. Delay requirements are very strict in interactive real-time scenarios (such as synchronous distance learning), where playback lag should be of the order of seconds. Playback continuity is another key aspect in these cases: in presence of peer churning and network congestion, a peer-to-peer overlay should quickly rearrange connections among receiving nodes to avoid freezing phenomena that may compromise audio/video understanding. For this reason, we designed a QoS monitoring algorithm that quickly detects broken or congested links: each receiving node is able to independently decide whether it should switch to a secondary sending node, called “fallback node”. The architecture takes advantage of a multithreaded design based on lock-free data structures, which improve the performance by avoiding synchronization among threads. We will show the good responsiveness of the proposed approach on machines with different computational capabilities: measured times prove both departures of nodes and QoS degradations are promptly detected and clients can quickly restore a stream reception. According to PSNR and SSIM, two well-known full-reference video quality metrics, QoE remains acceptable on receiving nodes of our resilient overlay also in presence of swap procedures.
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Al-Haija, Qasem Abu, e Abdulaziz A. Alsulami. "High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks". Electronics 10, n. 17 (31 agosto 2021): 2113. http://dx.doi.org/10.3390/electronics10172113.

Testo completo
Abstract (sommario):
The Bitcoin cryptocurrency is a worldwide prevalent virtualized digital currency conceptualized in 2008 as a distributed transactions system. Bitcoin transactions make use of peer-to-peer network nodes without a third-party intermediary, and the transactions can be verified by the node. Although Bitcoin networks have exhibited high efficiency in the financial transaction systems, their payment transactions are vulnerable to several ransomware attacks. For that reason, investigators have been working on developing ransomware payment identification techniques for bitcoin transactions’ networks to prevent such harmful cyberattacks. In this paper, we propose a high performance Bitcoin transaction predictive system that investigates the Bitcoin payment transactions to learn data patterns that can recognize and classify ransomware payments for heterogeneous bitcoin networks. Specifically, our system makes use of two supervised machine learning methods to learn the distinguishing patterns in Bitcoin payment transactions, namely, shallow neural networks (SNN) and optimizable decision trees (ODT). To validate the effectiveness of our solution approach, we evaluate our machine learning based predictive models on a recent Bitcoin transactions dataset in terms of classification accuracy as a key performance indicator and other key evaluation metrics such as the confusion matrix, positive predictive value, true positive rate, and the corresponding prediction errors. As a result, our superlative experimental result was registered to the model-based decision trees scoring 99.9% and 99.4% classification detection (two-class classifier) and accuracy (multiclass classifier), respectively. Hence, the obtained model accuracy results are superior as they surpassed many state-of-the-art models developed to identify ransomware payments in bitcoin transactions.
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Wessa, Patrick. "Quality Control of Statistical Learning Environments and Prediction of Learning Outcomes through Reproducible Computing". International Journal of Computers Communications & Control 4, n. 2 (1 giugno 2009): 185. http://dx.doi.org/10.15837/ijccc.2009.2.2426.

Testo completo
Abstract (sommario):
This article introduces a new approach to statistics education that allows us to accurately measure and control key aspects of the computations and communication processes that are involved in non-rote learning within the pedagogical paradigm of Constructivism. The solution that is presented relies on a newly developed technology (hosted at www.freestatistics.org) and computing framework (hosted at www.wessa.net) that supports reproducibility and reusability of statistical research results that are presented in a so-called Compendium. Reproducible computing leads to responsible learning behaviour, and a stream of high-quality communications that emerges when students are engaged in peer review activities. More importantly, the proposed solution provides a series of objective measurements of actual learning processes that are otherwise unobservable. A comparison between actual and reported data, demonstrates that reported learning process measurements are highly misleading in unexpected ways. However, reproducible computing and objective measurements of actual learning behaviour, reveal important guidelines that allow us to improve the effectiveness of learning and the e-learning system.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Hansson, Andreas, Kees Goossens e Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip". VLSI Design 2007 (30 aprile 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.

Testo completo
Abstract (sommario):
Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions introduce message dependencies that affect deadlock properties of the SoC as a whole. Even when NoC and IP dependency graphs are cycle-free in isolation, put together they may still create cycles. Traditionally, SoCs rely solely on request-response protocols. However, emerging SoCs adopt higher-level protocols for cache coherency, slave locking, and peer-to-peer streaming, thereby increasing the complexity in the interaction between the NoC and the IPs. In this paper, we analyze message-dependent deadlock, arising due to protocol interactions between the NoC and the IP modules. We compare the possible solutions and show that deadlock avoidance, in the presence of higher-level protocols, poses a serious challenge for many current NoC architectures. We evaluate the solutions qualitatively, and for a number of designs we quantify the area cost for the two most economical solutions, strict ordering and end-to-end flow control. We show that the latter, which avoids deadlock for all protocols, adds an area and power cost of 4% and 6%, respectively, of a typical Æthereal NoC instance.
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Buciu, Ioan. "A Letter From the Associate Executive Editor". International Journal of Computers Communications & Control 3, n. 3 (1 settembre 2008): 221. http://dx.doi.org/10.15837/ijccc.2008.3.2390.

Testo completo
Abstract (sommario):
<p>As of the production of its third volume, issue 3, year 2008, the Journal of Computers, Communications &amp; Control (IJCCC) entered a new era. I was pleasantly surprised when in March, 2008, a message arrived from Ioan Dzitac, the Associate Editor-in-Chief of IJCCC, notified me about the inclusion of this new periodical in the prestigious Master Journal List of Thomson Reuters Database. Two months later, more pleasant news came: IJCCC was covered in Science Citation Index Expanded (also known as SciSearch) as its quality figure of merit. This incredible achievement is emphasized by the journal’s age. Started in 2006 as a quarterly peer-reviewed periodical, this almost new-born journal knew an increased interest ever since, due to its increasing quality over this short time period. To ensure high publication quality, all published manuscripts passed through a peer-review process. This process provides authors with valuable critiques of their work by at least three independent experts in the topic field of their manuscripts, helping the editors to assess the scientific and technical merit of the work described. <br />We are all aware of the Thomson Scientific Journal selection process and how selective this is. Several factors are considered and have to be fulfilled when evaluating journals for coverage, including the publication timeliness, editorial content, international diversity, citation analysis and, finally, the journal’s electronic format. Out of these, the relative weakness of the IJCCC resides in the citation issue measured by its impact factor. However, as IJCC is a new journal, no citation history exists to date. For the future, a special attention shall be paid to this issue as its value is a strong indicator related to the journal’s importance and popularity in its scientific field.</p>
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Guru, Divya, Supraja Perumal e Vijayakumar Varadarajan. "Approaches towards Blockchain Innovation: A Survey and Future Directions". Electronics 10, n. 10 (20 maggio 2021): 1219. http://dx.doi.org/10.3390/electronics10101219.

Testo completo
Abstract (sommario):
A blockchain is a decentralized peer to peer platform which provides security services based on some key concepts, namely authentication, confidentiality, integrity and authorization. It is the process of recording and keeping track of the resources without the intervention of a centralized authority. This paper provides an overview of blockchains, the structure of blockchains, consensus algorithms, etc., It compares the algorithms based on their utility and limitations. Though blockchains provide secure communication, there are some minimal data leaks which are discussed. Various security issues in blockchains are discussed such as denial of service attacks, etc., In addition to security, some other blockchain challenges are presented like scalability, reliability, interoperability, privacy and consensus mechanisms for integration with AI, IoT and edge computing. This paper also explains about the importance of blockchains in the fields of smart healthcare, smart grid, and smart financial systems. Overall, this paper gives the glimpse of various protocols, algorithms, applications, challenges and opportunities that are found in the blockchain domain.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Fatokun, Tomilayo, Avishek Nag e Sachin Sharma. "Towards a Blockchain Assisted Patient Owned System for Electronic Health Records". Electronics 10, n. 5 (2 marzo 2021): 580. http://dx.doi.org/10.3390/electronics10050580.

Testo completo
Abstract (sommario):
Security and privacy of patients’ data is a major concern in the healthcare industry. In this paper, we propose a system that activates robust security and privacy of patients’ medical records as well as enables interoperability and data exchange between the different healthcare providers. The work proposes the shift from patient’s electronic health records being managed and controlled by the healthcare industry to a patient-centric application where patients are in control of their data. The aim of this research is to build an Electronic Healthcare Record (EHR) system that is layered on the Ethereum blockchain platform and smart contract in order to eliminate the need for third-party systems. With this system, the healthcare provider can search for patient’s data and request the patients’ consent to access it. Patients manage their data which enables an expedited data exchange across EHR systems. Each patient’s data are stored on the peer-to-peer node ledger. The proposed patient-centric EHR platform is cross-platform compliant, as it can be accessed via personal computers and mobile devices and facilitates interoperability across healthcare providers as patients’ medical records are gathered from different healthcare providers and stored in a unified format. The proposed framework is tested on a private Ethereum network using Ganache. The results show the effectiveness of the system with respect to security, privacy, performance and interoperability.
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Chi, Tao, e Ming Chen. "Interconnection algorithm of a wide range of pervasive devices for the Internet of things". International Journal of Distributed Sensor Networks 14, n. 1 (gennaio 2018): 155014771875601. http://dx.doi.org/10.1177/1550147718756014.

Testo completo
Abstract (sommario):
With the rapid development of wireless communications for network of things, more and more models for such networks-on-chip architectures have been created and used in a wide range of applications. In this article, the behaviors of wireless communications for such networks-on-chip architectures are analyzed at two layers. The physical layer behaviors consist of what frequency is used, how and when signals are transmitted, and how transceivers’ responses are decoded. The medium access control layer behavior consists of how to provide a reliable link between two peer medium access control entities. For the optimization objective of each layer, the specific problems surrounding the design of combined radio frequency identification/Bluetooth/Wi-Fi chips are considered at their respective layer, and then, corresponding optimization methods are carried out. The problem of optimization is defined as a linear programming problem in which each active transceiver is assigned to a channel on condition that all the constraint is met on every link. Each optimization procedure proposed in this article is performed through the adaptation of its objective, from each one of these layers, in order to minimize interference previously specified. In principle, the optimization can be made layer by layer separately. The optimization criteria consist of a specification of the behaviors of wireless communications (radio frequency identification, Bluetooth, Wi-Fi) and a set of constraints and goals. Our approach is to perform it independently within the given task, where the given task can be achieved with its sequencing graph entities, including automate selection, binding, and scheduling. We have implemented our algorithms on a field-programmable gate array and applied them to some off-the-shelf products. This methodology looks promising, not only for the results presented and obtained through computer simulations but also for its generality concerning to the kind of wireless network system used. Therefore, such methodology is expandable either to multi-core networks-on-chip architecture or also to the off-the-shelf products.
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Palomo-Duarte, Manuel, Antonio García-Domínguez e Antonio Balderas. "Assessment in Software Development for Competitive Environments: An AI Strategy Development Case Study". Electronics 10, n. 13 (29 giugno 2021): 1566. http://dx.doi.org/10.3390/electronics10131566.

Testo completo
Abstract (sommario):
Competitions are being widely used to motivate students in diverse learning processes, including those in computer programming. This paper presents a methodology for designing and assessing competitive learning scenarios that allow students to develop three different coding skills: the ability to compete against unknown competitors, the ability to compete against known competitors and the ability to compete against refined versions of known competitors. The proposal is based on peer code review, implemented as an improvement cycle after the dissemination of the code among participants. A case study evaluating the methodology was conducted with two cohorts of students in an undergraduate course. The analysis of the obtained grades suggests that while performance after our assistance was improved, students could still fail or succeed independently of the assistance. Complementary data from student questionnaires and supervisor observations are aligned with this finding. As a conclusion, the evidence supports the validity of the methodology. Additionally, several guidelines based on the experience are provided to transfer the proposal to other environments.
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Lacave, Carmen, e Ana Isabel Molina. "The Impact of COVID-19 in Collaborative Programming. Understanding the Needs of Undergraduate Computer Science Students". Electronics 10, n. 14 (19 luglio 2021): 1728. http://dx.doi.org/10.3390/electronics10141728.

Testo completo
Abstract (sommario):
Collaborative learning activities have become a common practice in current university studies due to the implantation of the EHEA. However, the COVID-19 pandemic has led to a radical and abrupt change in the teaching–learning model used in most universities, and in the way students’ group work is carried out. Given this new situation, our interest is focused on discovering how computer science students have approached group programming tasks. For this purpose, we have designed a cross-sectional pilot study to explore, from both social and technological points of view, how students carried out their group programming activities during the shutdown of universities, how they are doing them now, when social distance must be maintained, and what they have missed in both situations. The results of the study indicate that during the imposed confinement, the students adopted a programming model based on work division or distributed peer programming, and very few made use of synchronous distributed collaboration tools. After the lockdown, the students mostly opted for a model based on collaborative programming and there was an increased use of synchronous distributed collaboration tools. The specific communication, synchronization, and coordination functionalities they considered most useful or necessary were also analyzed. Among the desirable features included in a software for synchronous distributed programming, the students considered that having an audio-channel can be very useful and, possibly, the most agile method to communicate. The video signal is not considered as very necessary, being in many cases rather a source of distraction, while textual communication through a chat, to which they are very accustomed, is also well valued. In addition, version control and the possibility of recovering previous states of the practical projects were highly appreciated by the students, and they considered it necessary to record the individual contributions of each member of the team to the result.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Franco, Marta, Carlos Monfort, Antonio Piñas-Mesa e Esther Rincon. "Could Avatar Therapy Enhance Mental Health in Chronic Patients? A Systematic Review". Electronics 10, n. 18 (9 settembre 2021): 2212. http://dx.doi.org/10.3390/electronics10182212.

Testo completo
Abstract (sommario):
The use of avatars in the psychological treatment of some chronic diseases is in their infancy, and it represents a growing field of research with many possibilities for innovation. However, there is a lack of studies seeking to determine if avatar-based therapies could improve mental health in chronic care settings. In fact, to the best of our knowledge, this is the first systematic review addressing this research topic. The objectives of this study were to review the scientific literature on those studies involving avatar-based therapies for chronic patients, as well as different ways to develop them and their efficacy on mental health outcomes. Two main questions were addressed: (1) Are avatar-based strategies useful to improve mental health in chronic patients? (2) Which is the best way to develop avatar-based strategies regarding chronic diseases? A systematic review of the peer-reviewed literature was conducted in March 2021. The results were, not only useful for establishing suitable ways to develop avatar-based strategies to improve mental health in chronic care, but also for providing an ad hoc taxonomy regarding this research topic. Five modalities were established according to technological complexity and avatar presentation. Most of the studies were effective (61.1%) in enhancing mental health in chronic care.
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Elmenreich, Wilfried, e Imre J. Rudas. "Special Issue on Computational Cybernetics". Journal of Advanced Computational Intelligence and Intelligent Informatics 9, n. 4 (20 luglio 2005): 345. http://dx.doi.org/10.20965/jaciii.2005.p0345.

Testo completo
Abstract (sommario):
This issue contains selected papers from the International IEEE Conference on Computational Cybernetics that took place in Vienna 2004 in Austria at the Vienna University of Technology. Computational Cybernetics is the synergetic integration of Cybernetics and Computational Intelligence techniques. Cybernetics was defined by Wiener as "the science of control and communication, in the animal and the machine". The word "cybernetics" itself stems from the Greek "kybernetes" that means pilot or governor. While the roots of cybernetics go back to the time when James Watt equipped his steam engine with a Governor, that is a simple feedback mechanism for regulation of steam flow, the computational component was a child of the 20th century with the rise of information processing machines. The science of cybernetics and the science of computer science have in common, that both infiltrated many fields of application such as mathematics, telecommunication, regulated engines, living systems/medicine, social systems, and economical systems. Thus, on the one hand, the science of computational cybernetics encompasses a wide field, like the comparative study of automatic control systems, mechanical, biological (living), social and economical systems, communication theory, signal processing, information technology, control theory, the theory of adaptive systems, and the theory of complex systems (game theory, operational research). On the other hand, this research allows for finding common roots and common behavior among this broad field. This dichotomy between a broad overarching topic and the focus on computational cybernetics establishes the basis for interesting talks and discussions between scientists of different disciplines. We have selected 11 papers from the conference covering the fields of system design and modeling, neural networks, control theory, robotics and pattern recognition, which resemble the great variety of computational cybernetics. After the conference, each of these papers has undergone another peer review cycle in which the papers had been improved in order to fit this journal's topic and quality. It is our hope that the papers in this issue will inspire and help our readers in the development of advanced intelligent systems at the service of mankind.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Ibrahim, Dogan. "Message from editor". Global Journal of Computer Sciences: Theory and Research 7, n. 1 (27 novembre 2017): i. http://dx.doi.org/10.18844/gjcs.v7i1.2700.

Testo completo
Abstract (sommario):
Dear Readers, It is a great honor for us to publish Volume 7, Issue 1 of Global Journal of Computer Sciences: Theory and Research. Global Journal of Computer Sciences: Theory and Research (GJCS) is an international online journal for scientists and professionals involved in all aspects of computer sciences. This journal serves as an international platform that fosters theoretical and practical issues and new applications for all scientists and professionals from the field of computer sciences including original research and innovative applications from all parts of the world. Aim of this issue is to give the researchers an opportunity to share the results of their academic studies. There are different research topics discussed in the articles. For example, Musa Peker, Ali Sasar, Osman Ozkaraca and Gurbuz Akcay examined estimation of HbA1c value using artificial neural networks. Fatih Tekmen and Ozgun Tanriover provided an an assessment of a government website by focusing on website usability evaluation with quickly applicable guidelines. In addition, Abdallah Tubaishat and Sara Sumaidaa carried out research on implementation guidelines for green data centres. Mohamed Rahou, Fethi Sebaa and Abdelmadjid Cheikh Sid Ahmed Benmansour discussed error compensation in NC machine tools. Amel Ourici, Wafa Tourab and Merabet Leila examined direct control of active and reactive power of a doubly fed induction machine. Sekhane Hocine and Labed Djamel investigated standard IEEE test systems 57-bus and Algerian 59-bus together and they concluded that the results of power flow compared with the popular MATPOWER software environment show the exactitude of our code calculation, and the enhancement of voltage profile, especially in buses where STATCOM is placed. Finally, Cigdem Bakir proposed a speech recognition system for Turkish language with hybrid method. A total number of ten (10) manuscripts were submitted for this issue and each paper has been subjected to double-blind peer review process by the reviewers specialized in the related field. At the end of the review process, a total number of seven (7) high quality research papers were selected and accepted for publication. We present many thanks to all the contributors who helped us to publish this issue. Best regards Prof. Dr. Dogan Ibrahim Editor – in Chief
Gli stili APA, Harvard, Vancouver, ISO e altri
25

"Acknowledgment to Reviewers of Electronics in 2020". Electronics 10, n. 3 (25 gennaio 2021): 283. http://dx.doi.org/10.3390/electronics10030283.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Abadeer, Mina N., Rowayda A. Sadek e Gamal I. Selim. "REAL-TIME INTERACTIVE MECHANISM FOR LIVE STREAMING ON PEER-TO-PEER NETWORKS". International Journal of Computing, 14 giugno 2020, 208–15. http://dx.doi.org/10.47839/ijc.19.2.1763.

Testo completo
Abstract (sommario):
Quality of live video streaming technology is based on quality of Experiences parameters (QoE). Approaching the peer-to-peer (P2P) or peer-assisted networks as a sympathetic solution is highly required, especially in light of its authentic scalability and its extremely low initial cost requirements. However, the design of robust, efficient, and performing P2P streaming systems remains a high challenge when real-time constraints are part of the quality of service (QoS), as in TV distribution or conferencing applications. One of the P2P main issues that affect the quality of streaming is the neighbor selection methodology. The proposed work presents an effective mesh-based neighbor selection approaches for video streaming – Uniform Peer Distribution Algorithm (UPDA) – based on QoS and QoE Parameters. UPDA shortens the latency to be ranging from 10 ms to 50 ms servicing up to 4000 online peers under failure / recovery tests. Simulation results demonstrate that the proposed UPDA achieves good performance in End-to End delay with a percentage of 10.4 % and packet delay variation about 2% compared to random neighbor selection method.
Gli stili APA, Harvard, Vancouver, ISO e altri
27

"Acknowledgment to Reviewers of Journal of Sensor and Actuator Networks in 2020". Journal of Sensor and Actuator Networks 10, n. 1 (16 gennaio 2021): 4. http://dx.doi.org/10.3390/jsan10010004.

Testo completo
Abstract (sommario):
Peer review is the driving force of journal development, and reviewers are gatekeepers who ensure that Journal of Sensor and Actuator Networks maintains its standards for the high quality of its published papers [...]
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Yogarayan, Sumendra, Siti Fatimah Abdul Razak, Afizan Azman e Mohd Fikri Azli Abdullah. "A Mini Review of Peer-to-Peer (P2P) for Vehicular Communication". Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 9, n. 1 (23 marzo 2021). http://dx.doi.org/10.11591/ijeei.v9i1.2736.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
29

"Acknowledgment to Reviewers of Systems in 2020". Systems 9, n. 1 (30 gennaio 2021): 11. http://dx.doi.org/10.3390/systems9010011.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Dieter, Michael. "Amazon Noir". M/C Journal 10, n. 5 (1 ottobre 2007). http://dx.doi.org/10.5204/mcj.2709.

Testo completo
Abstract (sommario):
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Li, Na, e Habibeh Nazif. "Systematic literature review on business process re-engineering approaches in logistics". Kybernetes ahead-of-print, ahead-of-print (26 luglio 2021). http://dx.doi.org/10.1108/k-09-2020-0579.

Testo completo
Abstract (sommario):
PurposeBPR is “the central reconsideration and thorough restructuring of business procedures to enhance the critical and contemporary aspects of performance like the expense, quality, service, and speed”. Also, as it's a key factor for guaranteeing businesses' achievement, however, the profound discussion about the BPR is very rare as far as we know. We need more studies regarding the subject due to the absence of BPR works in the logistics industry. Hence, this study investigates the Systematic Literature Review (SLR) of BPR for logistics companies, leading the managers and writers active in BPR, and making them aware of the present, past and future trends in this discipline.Design/methodology/approachAs BPR is a necessary foundation for ensuring enterprise systems' success, this study will systematically investigate the BPR in logistics. The proposed BPR in logistics research classification framework is based on a comprehensive literature review, which concentrates on peer-reviewed journal papers published until 2019. A total of 22 academic sources have been retrieved and analyzed in terms of research purpose and nature, the employed method, theoretical approach and analysis level.FindingsThe findings of this paper showed that BPR companies outperform the non-BPR ones regarding information computing, technology uses, organizational architecture, coordination and all key logistics procedures. The results can motivate non-BPR logistics organizations to reassess the feasibility of these plans.Research limitations/implicationsThis paper provides an overview of BPR to young academics. Also, it identifies some distinct research gaps that could be worth studying. However, this paper may be restricted by choice of dimensions and the selection of relevant articles. In turn, researchers need to become more innovative in terms of their research techniques when examining BPR implementation.Practical implicationsThis paper guides researchers and practitioners to insight into published research work and their findings. The findings are valuable to logistics firms in an emerging market, as logistics resources may affect logistics service costs and quality. Also, it discusses indications for future research in BPR. It emphasizes the need to bridge the lacuna between BPR theory and evidence-based practice. Furthermore, it provides a better understanding of BPR implementation, which can be applied toward overcoming operational difficulties during the implementation process.Originality/valueThis paper fulfills an identified need for a comprehensive classification framework of BPR in logistics studies. We can consider it as the first-evaluated methodically gathered workaround BPR in logistics. It essentially provides both academics and practitioners with a conceptual map of existing BPR in logistics research and points out future research opportunities.
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Rossiter, Ned. "Creative Industries and the Limits of Critique from". M/C Journal 6, n. 3 (1 giugno 2003). http://dx.doi.org/10.5204/mcj.2208.

Testo completo
Abstract (sommario):
‘Every space has become ad space’. Steve Hayden, Wired Magazine, May 2003. Marshall McLuhan’s (1964) dictum that media technologies constitute a sensory extension of the body shares a conceptual affinity with Ernst Jünger’s notion of ‘“organic construction” [which] indicates [a] synergy between man and machine’ and Walter Benjamin’s exploration of the mimetic correspondence between the organic and the inorganic, between human and non-human forms (Bolz, 2002: 19). The logo or brand is co-extensive with various media of communication – billboards, TV advertisements, fashion labels, book spines, mobile phones, etc. Often the logo is interchangeable with the product itself or a way or life. Since all social relations are mediated, whether by communications technologies or architectonic forms ranging from corporate buildings to sporting grounds to family living rooms, it follows that there can be no outside for sociality. The social is and always has been in a mutually determining relationship with mediating forms. It is in this sense that there is no outside. Such an idea has become a refrain amongst various contemporary media theorists. Here’s a sample: There is no outside position anymore, nor is this perceived as something desirable. (Lovink, 2002a: 4) Both “us” and “them” (whoever we are, whoever they are) are all always situated in this same virtual geography. There’s no outside …. There is nothing outside the vector. (Wark, 2002: 316) There is no more outside. The critique of information is in the information itself. (Lash, 2002: 220) In declaring a universality for media culture and information flows, all of the above statements acknowledge the political and conceptual failure of assuming a critical position outside socio-technically constituted relations. Similarly, they recognise the problems inherent in the “ideology critique” of the Frankfurt School who, in their distinction between “truth” and “false-consciousness”, claimed a sort of absolute knowledge for the critic that transcended the field of ideology as it is produced by the culture industry. Althusser’s more complex conception of ideology, material practices and subject formation nevertheless also fell prey to the pretence of historical materialism as an autonomous “science” that is able to determine the totality, albeit fragmented, of lived social relations. One of the key failings of ideology critique, then, is its incapacity to account for the ways in which the critic, theorist or intellectual is implicated in the operations of ideology. That is, such approaches displace the reflexivity and power relationships between epistemology, ontology and their constitution as material practices within socio-political institutions and historical constellations, which in turn are the settings for the formation of ideology. Scott Lash abandons the term ideology altogether due to its conceptual legacies within German dialectics and French post-structuralist aporetics, both of which ‘are based in a fundamental dualism, a fundamental binary, of the two types of reason. One speaks of grounding and reconciliation, the other of unbridgeability …. Both presume a sphere of transcendence’ (Lash, 2002: 8). Such assertions can be made at a general level concerning these diverse and often conflicting approaches when they are reduced to categories for the purpose of a polemic. However, the work of “post-structuralists” such as Foucault, Deleuze and Guattari and the work of German systems theorist Niklas Luhmann is clearly amenable to the task of critique within information societies (see Rossiter, 2003). Indeed, Lash draws on such theorists in assembling his critical dispositif for the information age. More concretely, Lash (2002: 9) advances his case for a new mode of critique by noting the socio-technical and historical shift from ‘constitutive dualisms of the era of the national manufacturing society’ to global information cultures, whose constitutive form is immanent to informational networks and flows. Such a shift, according to Lash, needs to be met with a corresponding mode of critique: Ideologycritique [ideologiekritik] had to be somehow outside of ideology. With the disappearance of a constitutive outside, informationcritique must be inside of information. There is no outside any more. (2002: 10) Lash goes on to note, quite rightly, that ‘Informationcritique itself is branded, another object of intellectual property, machinically mediated’ (2002: 10). It is the political and conceptual tensions between information critique and its regulation via intellectual property regimes which condition critique as yet another brand or logo that I wish to explore in the rest of this essay. Further, I will question the supposed erasure of a “constitutive outside” to the field of socio-technical relations within network societies and informational economies. Lash is far too totalising in supposing a break between industrial modes of production and informational flows. Moreover, the assertion that there is no more outside to information too readily and simplistically assumes informational relations as universal and horizontally organised, and hence overlooks the significant structural, cultural and economic obstacles to participation within media vectors. That is, there certainly is an outside to information! Indeed, there are a plurality of outsides. These outsides are intertwined with the flows of capital and the imperial biopower of Empire, as Hardt and Negri (2000) have argued. As difficult as it may be to ascertain the boundaries of life in all its complexity, borders, however defined, nonetheless exist. Just ask the so-called “illegal immigrant”! This essay identifies three key modalities comprising a constitutive outside: material (uneven geographies of labour-power and the digital divide), symbolic (cultural capital), and strategic (figures of critique). My point of reference in developing this inquiry will pivot around an analysis of the importation in Australia of the British “Creative Industries” project and the problematic foundation such a project presents to the branding and commercialisation of intellectual labour. The creative industries movement – or Queensland Ideology, as I’ve discussed elsewhere with Danny Butt (2002) – holds further implications for the political and economic position of the university vis-à-vis the arts and humanities. Creative industries constructs itself as inside the culture of informationalism and its concomitant economies by the very fact that it is an exercise in branding. Such branding is evidenced in the discourses, rhetoric and policies of creative industries as adopted by university faculties, government departments and the cultural industries and service sectors seeking to reposition themselves in an institutional environment that is adjusting to ongoing structural reforms attributed to the demands by the “New Economy” for increased labour flexibility and specialisation, institutional and economic deregulation, product customisation and capital accumulation. Within the creative industries the content produced by labour-power is branded as copyrights and trademarks within the system of Intellectual Property Regimes (IPRs). However, as I will go on to show, a constitutive outside figures in material, symbolic and strategic ways that condition the possibility of creative industries. The creative industries project, as envisioned by the Blair government’s Department of Culture, Media and Sport (DCMS) responsible for the Creative Industry Task Force Mapping Documents of 1998 and 2001, is interested in enhancing the “creative” potential of cultural labour in order to extract a commercial value from cultural objects and services. Just as there is no outside for informationcritique, for proponents of the creative industries there is no culture that is worth its name if it is outside a market economy. That is, the commercialisation of “creativity” – or indeed commerce as a creative undertaking – acts as a legitimising function and hence plays a delimiting role for “culture” and, by association, sociality. And let us not forget, the institutional life of career academics is also at stake in this legitimating process. The DCMS cast its net wide when defining creative sectors and deploys a lexicon that is as vague and unquantifiable as the next mission statement by government and corporate bodies enmeshed within a neo-liberal paradigm. At least one of the key proponents of the creative industries in Australia is ready to acknowledge this (see Cunningham, 2003). The list of sectors identified as holding creative capacities in the CITF Mapping Document include: film, music, television and radio, publishing, software, interactive leisure software, design, designer fashion, architecture, performing arts, crafts, arts and antique markets, architecture and advertising. The Mapping Document seeks to demonstrate how these sectors consist of ‘... activities which have their origin in individual creativity, skill and talent and which have the potential for wealth and job creation through generation and exploitation of intellectual property’ (CITF: 1998/2001). The CITF’s identification of intellectual property as central to the creation of jobs and wealth firmly places the creative industries within informational and knowledge economies. Unlike material property, intellectual property such as artistic creations (films, music, books) and innovative technical processes (software, biotechnologies) are forms of knowledge that do not diminish when they are distributed. This is especially the case when information has been encoded in a digital form and distributed through technologies such as the internet. In such instances, information is often attributed an “immaterial” and nonrivalrous quality, although this can be highly misleading for both the conceptualisation of information and the politics of knowledge production. Intellectual property, as distinct from material property, operates as a scaling device in which the unit cost of labour is offset by the potential for substantial profit margins realised by distribution techniques availed by new information and communication technologies (ICTs) and their capacity to infinitely reproduce the digital commodity object as a property relation. Within the logic of intellectual property regimes, the use of content is based on the capacity of individuals and institutions to pay. The syndication of media content ensures that market saturation is optimal and competition is kept to a minimum. However, such a legal architecture and hegemonic media industry has run into conflict with other net cultures such as open source movements and peer-to-peer networks (Lovink, 2002b; Meikle, 2002), which is to say nothing of the digital piracy of software and digitally encoded cinematic forms. To this end, IPRs are an unstable architecture for extracting profit. The operation of Intellectual Property Regimes constitutes an outside within creative industries by alienating labour from its mode of information or form of expression. Lash is apposite on this point: ‘Intellectual property carries with it the right to exclude’ (Lash, 2002: 24). This principle of exclusion applies not only to those outside the informational economy and culture of networks as result of geographic, economic, infrastructural, and cultural constraints. The very practitioners within the creative industries are excluded from control over their creations. It is in this sense that a legal and material outside is established within an informational society. At the same time, this internal outside – to put it rather clumsily – operates in a constitutive manner in as much as the creative industries, by definition, depend upon the capacity to exploit the IP produced by its primary source of labour. For all the emphasis the Mapping Document places on exploiting intellectual property, it’s really quite remarkable how absent any elaboration or considered development of IP is from creative industries rhetoric. It’s even more astonishing that media and cultural studies academics have given at best passing attention to the issues of IPRs. Terry Flew (2002: 154-159) is one of the rare exceptions, though even here there is no attempt to identify the implications IPRs hold for those working in the creative industries sectors. Perhaps such oversights by academics associated with the creative industries can be accounted for by the fact that their own jobs rest within the modern, industrial institution of the university which continues to offer the security of a salary award system and continuing if not tenured employment despite the onslaught of neo-liberal reforms since the 1980s. Such an industrial system of traditional and organised labour, however, does not define the labour conditions for those working in the so-called creative industries. Within those sectors engaged more intensively in commercialising culture, labour practices closely resemble work characterised by the dotcom boom, which saw young people working excessively long hours without any of the sort of employment security and protection vis-à-vis salary, health benefits and pension schemes peculiar to traditional and organised labour (see McRobbie, 2002; Ross, 2003). During the dotcom mania of the mid to late 90s, stock options were frequently offered to people as an incentive for offsetting the often minimum or even deferred payment of wages (see Frank, 2000). It is understandable that the creative industries project holds an appeal for managerial intellectuals operating in arts and humanities disciplines in Australia, most particularly at Queensland University of Technology (QUT), which claims to have established the ‘world’s first’ Creative Industries faculty (http://www.creativeindustries.qut.com/). The creative industries provide a validating discourse for those suffering anxiety disorders over what Ruth Barcan (2003) has called the ‘usefulness’ of ‘idle’ intellectual pastimes. As a project that endeavours to articulate graduate skills with labour markets, the creative industries is a natural extension of the neo-liberal agenda within education as advocated by successive governments in Australia since the Dawkins reforms in the mid 1980s (see Marginson and Considine, 2000). Certainly there’s a constructive dimension to this: graduates, after all, need jobs and universities should display an awareness of market conditions; they also have a responsibility to do so. And on this count, I find it remarkable that so many university departments in my own field of communications and media studies are so bold and, let’s face it, stupid, as to make unwavering assertions about market demands and student needs on the basis of doing little more than sniffing the wind! Time for a bit of a reality check, I’d say. And this means becoming a little more serious about allocating funds and resources towards market research and analysis based on the combination of needs between students, staff, disciplinary values, university expectations, and the political economy of markets. However, the extent to which there should be a wholesale shift of the arts and humanities into a creative industries model is open to debate. The arts and humanities, after all, are a set of disciplinary practices and values that operate as a constitutive outside for creative industries. Indeed, in their creative industries manifesto, Stuart Cunningham and John Hartley (2002) loath the arts and humanities in such confused, paradoxical and hypocritical ways in order to establish the arts and humanities as a cultural and ideological outside. To this end, to subsume the arts and humanities into the creative industries, if not eradicate them altogether, is to spell the end of creative industries as it’s currently conceived at the institutional level within academe. Too much specialisation in one post-industrial sector, broad as it may be, ensures a situation of labour reserves that exceed market needs. One only needs to consider all those now unemployed web-designers that graduated from multi-media programs in the mid to late 90s. Further, it does not augur well for the inevitable shift from or collapse of a creative industries economy. Where is the standing reserve of labour shaped by university education and training in a post-creative industries economy? Diehard neo-liberals and true-believers in the capacity for perpetual institutional flexibility would say that this isn’t a problem. The university will just “organically” adapt to prevailing market conditions and shape their curriculum and staff composition accordingly. Perhaps. Arguably if the university is to maintain a modality of time that is distinct from the just-in-time mode of production characteristic of informational economies – and indeed, such a difference is a quality that defines the market value of the educational commodity – then limits have to be established between institutions of education and the corporate organisation or creative industry entity. The creative industries project is a reactionary model insofar as it reinforces the status quo of labour relations within a neo-liberal paradigm in which bids for industry contracts are based on a combination of rich technological infrastructures that have often been subsidised by the state (i.e. paid for by the public), high labour skills, a low currency exchange rate and the lowest possible labour costs. In this respect it is no wonder that literature on the creative industries omits discussion of the importance of unions within informational, networked economies. What is the place of unions in a labour force constituted as individualised units? The conditions of possibility for creative industries within Australia are at once its frailties. In many respects, the success of the creative industries sector depends upon the ongoing combination of cheap labour enabled by a low currency exchange rate and the capacity of students to access the skills and training offered by universities. Certainly in relation to matters such as these there is no outside for the creative industries. There’s a great need to explore alternative economic models to the content production one if wealth is to be successfully extracted and distributed from activities in the new media sectors. The suggestion that the creative industries project initiates a strategic response to the conditions of cultural production within network societies and informational economies is highly debateable. The now well documented history of digital piracy in the film and software industries and the difficulties associated with regulating violations to proprietors of IP in the form of copyright and trademarks is enough of a reason to look for alternative models of wealth extraction. And you can be sure this will occur irrespective of the endeavours of the creative industries. To conclude, I am suggesting that those working in the creative industries, be they content producers or educators, need to intervene in IPRs in such a way that: 1) ensures the alienation of their labour is minimised; 2) collectivising “creative” labour in the form of unions or what Wark (2001) has termed the “hacker class”, as distinct from the “vectoralist class”, may be one way of achieving this; and 3) the advocates of creative industries within the higher education sector in particular are made aware of the implications IPRs have for graduates entering the workforce and adjust their rhetoric, curriculum, and policy engagements accordingly. Works Cited Barcan, Ruth. ‘The Idleness of Academics: Reflections on the Usefulness of Cultural Studies’. Continuum: Journal of Media & Cultural Studies (forthcoming, 2003). Bolz, Norbert. ‘Rethinking Media Aesthetics’, in Geert Lovink, Uncanny Networks: Dialogues with the Virtual Intelligentsia. Cambridge, Mass.: MIT Press, 2002, 18-27. Butt, Danny and Rossiter, Ned. ‘Blowing Bubbles: Post-Crash Creative Industries and the Withering of Political Critique in Cultural Studies’. Paper presented at Ute Culture: The Utility of Culture and the Uses of Cultural Studies, Cultural Studies Association of Australia Conference, Melbourne, 5-7 December, 2002. Posted to fibreculture mailing list, 10 December, 2002, http://www.fibreculture.org/archives/index.html Creative Industry Task Force: Mapping Document, DCMS (Department of Culture, Media and Sport), London, 1998/2001. http://www.culture.gov.uk/creative/mapping.html Cunningham, Stuart. ‘The Evolving Creative Industries: From Original Assumptions to Contemporary Interpretations’. Seminar Paper, QUT, Brisbane, 9 May, 2003, http://www.creativeindustries.qut.com/research/cirac/documen... ...ts/THE_EVOLVING_CREATIVE_INDUSTRIES.pdf Cunningham, Stuart; Hearn, Gregory; Cox, Stephen; Ninan, Abraham and Keane, Michael. Brisbane’s Creative Industries 2003. Report delivered to Brisbane City Council, Community and Economic Development, Brisbane: CIRAC, 2003. http://www.creativeindustries.qut.com/research/cirac/documen... ...ts/bccreportonly.pdf Flew, Terry. New Media: An Introduction. Oxford: Oxford University Press, 2002. Frank, Thomas. One Market under God: Extreme Capitalism, Market Populism, and the End of Economic Democracy. New York: Anchor Books, 2000. Hartley, John and Cunningham, Stuart. ‘Creative Industries: from Blue Poles to fat pipes’, in Malcolm Gillies (ed.) The National Humanities and Social Sciences Summit: Position Papers. Canberra: DEST, 2002. Hayden, Steve. ‘Tastes Great, Less Filling: Ad Space – Will Advertisers Learn the Hard Lesson of Over-Development?’. Wired Magazine 11.06 (June, 2003), http://www.wired.com/wired/archive/11.06/ad_spc.html Hardt, Michael and Negri, Antonio. Empire. Cambridge, Mass.: Harvard University Press, 2000. Lash, Scott. Critique of Information. London: Sage, 2002. Lovink, Geert. Uncanny Networks: Dialogues with the Virtual Intelligentsia. Cambridge, Mass.: MIT Press, 2002a. Lovink, Geert. Dark Fiber: Tracking Critical Internet Culture. Cambridge, Mass.: MIT Press, 2002b. McLuhan, Marshall. Understanding Media: The Extensions of Man. London: Routledge and Kegan Paul, 1964. McRobbie, Angela. ‘Clubs to Companies: Notes on the Decline of Political Culture in Speeded up Creative Worlds’, Cultural Studies 16.4 (2002): 516-31. Marginson, Simon and Considine, Mark. The Enterprise University: Power, Governance and Reinvention in Australia. Cambridge: Cambridge University Press, 2000. Meikle, Graham. Future Active: Media Activism and the Internet. Sydney: Pluto Press, 2002. Ross, Andrew. No-Collar: The Humane Workplace and Its Hidden Costs. New York: Basic Books, 2003. Rossiter, Ned. ‘Processual Media Theory’, in Adrian Miles (ed.) Streaming Worlds: 5th International Digital Arts & Culture (DAC) Conference. 19-23 May. Melbourne: RMIT University, 2003, 173-184. http://hypertext.rmit.edu.au/dac/papers/Rossiter.pdf Sassen, Saskia. Losing Control? Sovereignty in an Age of Globalization. New York: Columbia University Press, 1996. Wark, McKenzie. ‘Abstraction’ and ‘Hack’, in Hugh Brown, Geert Lovink, Helen Merrick, Ned Rossiter, David Teh, Michele Willson (eds). Politics of a Digital Present: An Inventory of Australian Net Culture, Criticism and Theory. Melbourne: Fibreculture Publications, 2001, 3-7, 99-102. Wark, McKenzie. ‘The Power of Multiplicity and the Multiplicity of Power’, in Geert Lovink, Uncanny Networks: Dialogues with the Virtual Intelligentsia. Cambridge, Mass.: MIT Press, 2002, 314-325. Links http://hypertext.rmit.edu.au/dac/papers/Rossiter.pdf http://www.creativeindustries.qut.com/ http://www.creativeindustries.qut.com/research/cirac/documents/THE_EVOLVING_CREATIVE_INDUSTRIES.pdf http://www.creativeindustries.qut.com/research/cirac/documents/bccreportonly.pdf http://www.culture.gov.uk/creative/mapping.html http://www.fibreculture.org/archives/index.html http://www.wired.com/wired/archive/11.06/ad_spc.html Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Rossiter, Ned. "Creative Industries and the Limits of Critique from " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0306/11-creativeindustries.php>. APA Style Rossiter, N. (2003, Jun 19). Creative Industries and the Limits of Critique from . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0306/11-creativeindustries.php>
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Livingstone, Randall M. "Let’s Leave the Bias to the Mainstream Media: A Wikipedia Community Fighting for Information Neutrality". M/C Journal 13, n. 6 (23 novembre 2010). http://dx.doi.org/10.5204/mcj.315.

Testo completo
Abstract (sommario):
Although I'm a rich white guy, I'm also a feminist anti-racism activist who fights for the rights of the poor and oppressed. (Carl Kenner)Systemic bias is a scourge to the pillar of neutrality. (Cerejota)Count me in. Let's leave the bias to the mainstream media. (Orcar967)Because this is so important. (CuttingEdge)These are a handful of comments posted by online editors who have banded together in a virtual coalition to combat Western bias on the world’s largest digital encyclopedia, Wikipedia. This collective action by Wikipedians both acknowledges the inherent inequalities of a user-controlled information project like Wikpedia and highlights the potential for progressive change within that same project. These community members are taking the responsibility of social change into their own hands (or more aptly, their own keyboards).In recent years much research has emerged on Wikipedia from varying fields, ranging from computer science, to business and information systems, to the social sciences. While critical at times of Wikipedia’s growth, governance, and influence, most of this work observes with optimism that barriers to improvement are not firmly structural, but rather they are socially constructed, leaving open the possibility of important and lasting change for the better.WikiProject: Countering Systemic Bias (WP:CSB) considers one such collective effort. Close to 350 editors have signed on to the project, which began in 2004 and itself emerged from a similar project named CROSSBOW, or the “Committee Regarding Overcoming Serious Systemic Bias on Wikipedia.” As a WikiProject, the term used for a loose group of editors who collaborate around a particular topic, these editors work within the Wikipedia site and collectively create a social network that is unified around one central aim—representing the un- and underrepresented—and yet they are bound by no particular unified set of interests. The first stage of a multi-method study, this paper looks at a snapshot of WP:CSB’s activity from both content analysis and social network perspectives to discover “who” geographically this coalition of the unrepresented is inserting into the digital annals of Wikipedia.Wikipedia and WikipediansDeveloped in 2001 by Internet entrepreneur Jimmy Wales and academic Larry Sanger, Wikipedia is an online collaborative encyclopedia hosting articles in nearly 250 languages (Cohen). The English-language Wikipedia contains over 3.2 million articles, each of which is created, edited, and updated solely by users (Wikipedia “Welcome”). At the time of this study, Alexa, a website tracking organisation, ranked Wikipedia as the 6th most accessed site on the Internet. Unlike the five sites ahead of it though—Google, Facebook, Yahoo, YouTube (owned by Google), and live.com (owned by Microsoft)—all of which are multibillion-dollar businesses that deal more with information aggregation than information production, Wikipedia is a non-profit that operates on less than $500,000 a year and staffs only a dozen paid employees (Lih). Wikipedia is financed and supported by the WikiMedia Foundation, a charitable umbrella organisation with an annual budget of $4.6 million, mainly funded by donations (Middleton).Wikipedia editors and contributors have the option of creating a user profile and participating via a username, or they may participate anonymously, with only an IP address representing their actions. Despite the option for total anonymity, many Wikipedians have chosen to visibly engage in this online community (Ayers, Matthews, and Yates; Bruns; Lih), and researchers across disciplines are studying the motivations of these new online collectives (Kane, Majchrzak, Johnson, and Chenisern; Oreg and Nov). The motivations of open source software contributors, such as UNIX programmers and programming groups, have been shown to be complex and tied to both extrinsic and intrinsic rewards, including online reputation, self-satisfaction and enjoyment, and obligation to a greater common good (Hertel, Niedner, and Herrmann; Osterloh and Rota). Investigation into why Wikipedians edit has indicated multiple motivations as well, with community engagement, task enjoyment, and information sharing among the most significant (Schroer and Hertel). Additionally, Wikipedians seem to be taking up the cause of generativity (a concern for the ongoing health and openness of the Internet’s infrastructures) that Jonathan Zittrain notably called for in The Future of the Internet and How to Stop It. Governance and ControlAlthough the technical infrastructure of Wikipedia is built to support and perhaps encourage an equal distribution of power on the site, Wikipedia is not a land of “anything goes.” The popular press has covered recent efforts by the site to reduce vandalism through a layer of editorial review (Cohen), a tightening of control cited as a possible reason for the recent dip in the number of active editors (Edwards). A number of regulations are already in place that prevent the open editing of certain articles and pages, such as the site’s disclaimers and pages that have suffered large amounts of vandalism. Editing wars can also cause temporary restrictions to editing, and Ayers, Matthews, and Yates point out that these wars can happen anywhere, even to Burt Reynold’s page.Academic studies have begun to explore the governance and control that has developed in the Wikipedia community, generally highlighting how order is maintained not through particular actors, but through established procedures and norms. Konieczny tested whether Wikipedia’s evolution can be defined by Michels’ Iron Law of Oligopoly, which predicts that the everyday operations of any organisation cannot be run by a mass of members, and ultimately control falls into the hands of the few. Through exploring a particular WikiProject on information validation, he concludes:There are few indicators of an oligarchy having power on Wikipedia, and few trends of a change in this situation. The high level of empowerment of individual Wikipedia editors with regard to policy making, the ease of communication, and the high dedication to ideals of contributors succeed in making Wikipedia an atypical organization, quite resilient to the Iron Law. (189)Butler, Joyce, and Pike support this assertion, though they emphasise that instead of oligarchy, control becomes encapsulated in a wide variety of structures, policies, and procedures that guide involvement with the site. A virtual “bureaucracy” emerges, but one that should not be viewed with the negative connotation often associated with the term.Other work considers control on Wikipedia through the framework of commons governance, where “peer production depends on individual action that is self-selected and decentralized rather than hierarchically assigned. Individuals make their own choices with regard to resources managed as a commons” (Viegas, Wattenberg and McKeon). The need for quality standards and quality control largely dictate this commons governance, though interviewing Wikipedians with various levels of responsibility revealed that policies and procedures are only as good as those who maintain them. Forte, Larco, and Bruckman argue “the Wikipedia community has remained healthy in large part due to the continued presence of ‘old-timers’ who carry a set of social norms and organizational ideals with them into every WikiProject, committee, and local process in which they take part” (71). Thus governance on Wikipedia is a strong representation of a democratic ideal, where actors and policies are closely tied in their evolution. Transparency, Content, and BiasThe issue of transparency has proved to be a double-edged sword for Wikipedia and Wikipedians. The goal of a collective body of knowledge created by all—the “expert” and the “amateur”—can only be upheld if equal access to page creation and development is allotted to everyone, including those who prefer anonymity. And yet this very option for anonymity, or even worse, false identities, has been a sore subject for some in the Wikipedia community as well as a source of concern for some scholars (Santana and Wood). The case of a 24-year old college dropout who represented himself as a multiple Ph.D.-holding theology scholar and edited over 16,000 articles brought these issues into the public spotlight in 2007 (Doran; Elsworth). Wikipedia itself has set up standards for content that include expectations of a neutral point of view, verifiability of information, and the publishing of no original research, but Santana and Wood argue that self-policing of these policies is not adequate:The principle of managerial discretion requires that every actor act from a sense of duty to exercise moral autonomy and choice in responsible ways. When Wikipedia’s editors and administrators remain anonymous, this criterion is simply not met. It is assumed that everyone is behaving responsibly within the Wikipedia system, but there are no monitoring or control mechanisms to make sure that this is so, and there is ample evidence that it is not so. (141) At the theoretical level, some downplay these concerns of transparency and autonomy as logistical issues in lieu of the potential for information systems to support rational discourse and emancipatory forms of communication (Hansen, Berente, and Lyytinen), but others worry that the questionable “realities” created on Wikipedia will become truths once circulated to all areas of the Web (Langlois and Elmer). With the number of articles on the English-language version of Wikipedia reaching well into the millions, the task of mapping and assessing content has become a tremendous endeavour, one mostly taken on by information systems experts. Kittur, Chi, and Suh have used Wikipedia’s existing hierarchical categorisation structure to map change in the site’s content over the past few years. Their work revealed that in early 2008 “Culture and the arts” was the most dominant category of content on Wikipedia, representing nearly 30% of total content. People (15%) and geographical locations (14%) represent the next largest categories, while the natural and physical sciences showed the greatest increase in volume between 2006 and 2008 (+213%D, with “Culture and the arts” close behind at +210%D). This data may indicate that contributing to Wikipedia, and thus spreading knowledge, is growing amongst the academic community while maintaining its importance to the greater popular culture-minded community. Further work by Kittur and Kraut has explored the collaborative process of content creation, finding that too many editors on a particular page can reduce the quality of content, even when a project is well coordinated.Bias in Wikipedia content is a generally acknowledged and somewhat conflicted subject (Giles; Johnson; McHenry). The Wikipedia community has created numerous articles and pages within the site to define and discuss the problem. Citing a survey conducted by the University of Würzburg, Germany, the “Wikipedia:Systemic bias” page describes the average Wikipedian as:MaleTechnically inclinedFormally educatedAn English speakerWhiteAged 15-49From a majority Christian countryFrom a developed nationFrom the Northern HemisphereLikely a white-collar worker or studentBias in content is thought to be perpetuated by this demographic of contributor, and the “founder effect,” a concept from genetics, linking the original contributors to this same demographic has been used to explain the origins of certain biases. Wikipedia’s “About” page discusses the issue as well, in the context of the open platform’s strengths and weaknesses:in practice editing will be performed by a certain demographic (younger rather than older, male rather than female, rich enough to afford a computer rather than poor, etc.) and may, therefore, show some bias. Some topics may not be covered well, while others may be covered in great depth. No educated arguments against this inherent bias have been advanced.Royal and Kapila’s study of Wikipedia content tested some of these assertions, finding identifiable bias in both their purposive and random sampling. They conclude that bias favoring larger countries is positively correlated with the size of the country’s Internet population, and corporations with larger revenues work in much the same way, garnering more coverage on the site. The researchers remind us that Wikipedia is “more a socially produced document than a value-free information source” (Royal & Kapila).WikiProject: Countering Systemic BiasAs a coalition of current Wikipedia editors, the WikiProject: Countering Systemic Bias (WP:CSB) attempts to counter trends in content production and points of view deemed harmful to the democratic ideals of a valueless, open online encyclopedia. WP:CBS’s mission is not one of policing the site, but rather deepening it:Generally, this project concentrates upon remedying omissions (entire topics, or particular sub-topics in extant articles) rather than on either (1) protesting inappropriate inclusions, or (2) trying to remedy issues of how material is presented. Thus, the first question is "What haven't we covered yet?", rather than "how should we change the existing coverage?" (Wikipedia, “Countering”)The project lays out a number of content areas lacking adequate representation, geographically highlighting the dearth in coverage of Africa, Latin America, Asia, and parts of Eastern Europe. WP:CSB also includes a “members” page that editors can sign to show their support, along with space to voice their opinions on the problem of bias on Wikipedia (the quotations at the beginning of this paper are taken from this “members” page). At the time of this study, 329 editors had self-selected and self-identified as members of WP:CSB, and this group constitutes the population sample for the current study. To explore the extent to which WP:CSB addressed these self-identified areas for improvement, each editor’s last 50 edits were coded for their primary geographical country of interest, as well as the conceptual category of the page itself (“P” for person/people, “L” for location, “I” for idea/concept, “T” for object/thing, or “NA” for indeterminate). For example, edits to the Wikipedia page for a single person like Tony Abbott (Australian federal opposition leader) were coded “Australia, P”, while an edit for a group of people like the Manchester United football team would be coded “England, P”. Coding was based on information obtained from the header paragraphs of each article’s Wikipedia page. After coding was completed, corresponding information on each country’s associated continent was added to the dataset, based on the United Nations Statistics Division listing.A total of 15,616 edits were coded for the study. Nearly 32% (n = 4962) of these edits were on articles for persons or people (see Table 1 for complete coding results). From within this sub-sample of edits, a majority of the people (68.67%) represented are associated with North America and Europe (Figure A). If we break these statistics down further, nearly half of WP:CSB’s edits concerning people were associated with the United States (36.11%) and England (10.16%), with India (3.65%) and Australia (3.35%) following at a distance. These figures make sense for the English-language Wikipedia; over 95% of the population in the three Westernised countries speak English, and while India is still often regarded as a developing nation, its colonial British roots and the emergence of a market economy with large, technology-driven cities are logical explanations for its representation here (and some estimates make India the largest English-speaking nation by population on the globe today).Table A Coding Results Total Edits 15616 (I) Ideas 2881 18.45% (L) Location 2240 14.34% NA 333 2.13% (T) Thing 5200 33.30% (P) People 4962 31.78% People by Continent Africa 315 6.35% Asia 827 16.67% Australia 175 3.53% Europe 1411 28.44% NA 110 2.22% North America 1996 40.23% South America 128 2.58% The areas of the globe of main concern to WP:CSB proved to be much less represented by the coalition itself. Asia, far and away the most populous continent with more than 60% of the globe’s people (GeoHive), was represented in only 16.67% of edits. Africa (6.35%) and South America (2.58%) were equally underrepresented compared to both their real-world populations (15% and 9% of the globe’s population respectively) and the aforementioned dominance of the advanced Westernised areas. However, while these percentages may seem low, in aggregate they do meet the quota set on the WP:CSB Project Page calling for one out of every twenty edits to be “a subject that is systematically biased against the pages of your natural interests.” By this standard, the coalition is indeed making headway in adding content that strategically counterbalances the natural biases of Wikipedia’s average editor.Figure ASocial network analysis allows us to visualise multifaceted data in order to identify relationships between actors and content (Vego-Redondo; Watts). Similar to Davis’s well-known sociological study of Southern American socialites in the 1930s (Scott), our Wikipedia coalition can be conceptualised as individual actors united by common interests, and a network of relations can be constructed with software such as UCINET. A mapping algorithm that considers both the relationship between all sets of actors and each actor to the overall collective structure produces an image of our network. This initial network is bimodal, as both our Wikipedia editors and their edits (again, coded for country of interest) are displayed as nodes (Figure B). Edge-lines between nodes represents a relationship, and here that relationship is the act of editing a Wikipedia article. We see from our network that the “U.S.” and “England” hold central positions in the network, with a mass of editors crowding around them. A perimeter of nations is then held in place by their ties to editors through the U.S. and England, with a second layer of editors and poorly represented nations (Gabon, Laos, Uzbekistan, etc.) around the boundaries of the network.Figure BWe are reminded from this visualisation both of the centrality of the two Western powers even among WP:CSB editoss, and of the peripheral nature of most other nations in the world. But we also learn which editors in the project are contributing most to underrepresented areas, and which are less “tied” to the Western core. Here we see “Wizzy” and “Warofdreams” among the second layer of editors who act as a bridge between the core and the periphery; these are editors with interests in both the Western and marginalised nations. Located along the outer edge, “Gallador” and “Gerrit” have no direct ties to the U.S. or England, concentrating all of their edits on less represented areas of the globe. Identifying editors at these key positions in the network will help with future research, informing interview questions that will investigate their interests further, but more significantly, probing motives for participation and action within the coalition.Additionally, we can break the network down further to discover editors who appear to have similar interests in underrepresented areas. Figure C strips down the network to only editors and edits dealing with Africa and South America, the least represented continents. From this we can easily find three types of editors again: those who have singular interests in particular nations (the outermost layer of editors), those who have interests in a particular region (the second layer moving inward), and those who have interests in both of these underrepresented regions (the center layer in the figure). This last group of editors may prove to be the most crucial to understand, as they are carrying the full load of WP:CSB’s mission.Figure CThe End of Geography, or the Reclamation?In The Internet Galaxy, Manuel Castells writes that “the Internet Age has been hailed as the end of geography,” a bold suggestion, but one that has gained traction over the last 15 years as the excitement for the possibilities offered by information communication technologies has often overshadowed structural barriers to participation like the Digital Divide (207). Castells goes on to amend the “end of geography” thesis by showing how global information flows and regional Internet access rates, while creating a new “map” of the world in many ways, is still closely tied to power structures in the analog world. The Internet Age: “redefines distance but does not cancel geography” (207). The work of WikiProject: Countering Systemic Bias emphasises the importance of place and representation in the information environment that continues to be constructed in the online world. This study looked at only a small portion of this coalition’s efforts (~16,000 edits)—a snapshot of their labor frozen in time—which itself is only a minute portion of the information being dispatched through Wikipedia on a daily basis (~125,000 edits). Further analysis of WP:CSB’s work over time, as well as qualitative research into the identities, interests and motivations of this collective, is needed to understand more fully how information bias is understood and challenged in the Internet galaxy. The data here indicates this is a fight worth fighting for at least a growing few.ReferencesAlexa. “Top Sites.” Alexa.com, n.d. 10 Mar. 2010 ‹http://www.alexa.com/topsites>. Ayers, Phoebe, Charles Matthews, and Ben Yates. How Wikipedia Works: And How You Can Be a Part of It. San Francisco, CA: No Starch, 2008.Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008.Butler, Brian, Elisabeth Joyce, and Jacqueline Pike. Don’t Look Now, But We’ve Created a Bureaucracy: The Nature and Roles of Policies and Rules in Wikipedia. Paper presented at 2008 CHI Annual Conference, Florence.Castells, Manuel. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford UP, 2001.Cohen, Noam. “Wikipedia.” New York Times, n.d. 12 Mar. 2010 ‹http://www.nytimes.com/info/wikipedia/>. Doran, James. “Wikipedia Chief Promises Change after ‘Expert’ Exposed as Fraud.” The Times, 6 Mar. 2007 ‹http://technology.timesonline.co.uk/tol/news/tech_and_web/article1480012.ece>. Edwards, Lin. “Report Claims Wikipedia Losing Editors in Droves.” Physorg.com, 30 Nov 2009. 12 Feb. 2010 ‹http://www.physorg.com/news178787309.html>. Elsworth, Catherine. “Fake Wikipedia Prof Altered 20,000 Entries.” London Telegraph, 6 Mar. 2007 ‹http://www.telegraph.co.uk/news/1544737/Fake-Wikipedia-prof-altered-20000-entries.html>. Forte, Andrea, Vanessa Larco, and Amy Bruckman. “Decentralization in Wikipedia Governance.” Journal of Management Information Systems 26 (2009): 49-72.Giles, Jim. “Internet Encyclopedias Go Head to Head.” Nature 438 (2005): 900-901.Hansen, Sean, Nicholas Berente, and Kalle Lyytinen. “Wikipedia, Critical Social Theory, and the Possibility of Rational Discourse.” The Information Society 25 (2009): 38-59.Hertel, Guido, Sven Niedner, and Stefanie Herrmann. “Motivation of Software Developers in Open Source Projects: An Internet-Based Survey of Contributors to the Linex Kernel.” Research Policy 32 (2003): 1159-1177.Johnson, Bobbie. “Rightwing Website Challenges ‘Liberal Bias’ of Wikipedia.” The Guardian, 1 Mar. 2007. 8 Mar. 2010 ‹http://www.guardian.co.uk/technology/2007/mar/01/wikipedia.news>. Kane, Gerald C., Ann Majchrzak, Jeremaih Johnson, and Lily Chenisern. A Longitudinal Model of Perspective Making and Perspective Taking within Fluid Online Collectives. Paper presented at the 2009 International Conference on Information Systems, Phoenix, AZ, 2009.Kittur, Aniket, Ed H. Chi, and Bongwon Suh. What’s in Wikipedia? Mapping Topics and Conflict Using Socially Annotated Category Structure. Paper presented at the 2009 CHI Annual Conference, Boston, MA.———, and Robert E. Kraut. Harnessing the Wisdom of Crowds in Wikipedia: Quality through Collaboration. Paper presented at the 2008 Association for Computing Machinery’s Computer Supported Cooperative Work Annual Conference, San Diego, CA.Konieczny, Piotr. “Governance, Organization, and Democracy on the Internet: The Iron Law and the Evolution of Wikipedia.” Sociological Forum 24 (2009): 162-191.———. “Wikipedia: Community or Social Movement?” Interface: A Journal for and about Social Movements 1 (2009): 212-232.Langlois, Ganaele, and Greg Elmer. “Wikipedia Leeches? The Promotion of Traffic through a Collaborative Web Format.” New Media & Society 11 (2009): 773-794.Lih, Andrew. The Wikipedia Revolution. New York, NY: Hyperion, 2009.McHenry, Robert. “The Real Bias in Wikipedia: A Response to David Shariatmadari.” OpenDemocracy.com 2006. 8 Mar. 2010 ‹http://www.opendemocracy.net/media-edemocracy/wikipedia_bias_3621.jsp>. Middleton, Chris. “The World of Wikinomics.” Computer Weekly, 20 Jan. 2009: 22-26.Oreg, Shaul, and Oded Nov. “Exploring Motivations for Contributing to Open Source Initiatives: The Roles of Contribution, Context and Personal Values.” Computers in Human Behavior 24 (2008): 2055-2073.Osterloh, Margit and Sandra Rota. “Trust and Community in Open Source Software Production.” Analyse & Kritik 26 (2004): 279-301.Royal, Cindy, and Deepina Kapila. “What’s on Wikipedia, and What’s Not…?: Assessing Completeness of Information.” Social Science Computer Review 27 (2008): 138-148.Santana, Adele, and Donna J. Wood. “Transparency and Social Responsibility Issues for Wikipedia.” Ethics of Information Technology 11 (2009): 133-144.Schroer, Joachim, and Guido Hertel. “Voluntary Engagement in an Open Web-Based Encyclopedia: Wikipedians and Why They Do It.” Media Psychology 12 (2009): 96-120.Scott, John. Social Network Analysis. London: Sage, 1991.Vego-Redondo, Fernando. Complex Social Networks. Cambridge: Cambridge UP, 2007.Viegas, Fernanda B., Martin Wattenberg, and Matthew M. McKeon. “The Hidden Order of Wikipedia.” Online Communities and Social Computing (2007): 445-454.Watts, Duncan. Six Degrees: The Science of a Connected Age. New York, NY: W. W. Norton & Company, 2003Wikipedia. “About.” n.d. 8 Mar. 2010 ‹http://en.wikipedia.org/wiki/Wikipedia:About>. ———. “Welcome to Wikipedia.” n.d. 8 Mar. 2010 ‹http://en.wikipedia.org/wiki/Main_Page>.———. “Wikiproject:Countering Systemic Bias.” n.d. 12 Feb. 2010 ‹http://en.wikipedia.org/wiki/Wikipedia:WikiProject_Countering_systemic_bias#Members>. Zittrain, Jonathan. The Future of the Internet and How to Stop It. New Haven, CT: Yale UP, 2008.
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Cinque, Toija. "A Study in Anxiety of the Dark". M/C Journal 24, n. 2 (27 aprile 2021). http://dx.doi.org/10.5204/mcj.2759.

Testo completo
Abstract (sommario):
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Losh, Elizabeth. "Artificial Intelligence". M/C Journal 10, n. 5 (1 ottobre 2007). http://dx.doi.org/10.5204/mcj.2710.

Testo completo
Abstract (sommario):
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Cheong, Pauline Hope. "Faith Tweets: Ambient Religious Communication and Microblogging Rituals". M/C Journal 13, n. 2 (3 maggio 2010). http://dx.doi.org/10.5204/mcj.223.

Testo completo
Abstract (sommario):
There’s no reason to think that Jesus wouldn’t have Facebooked or twittered if he came into the world now. Can you imagine his killer status updates? Reverend Schenck, New York, All Saints Episcopal Church (Mapes) The fundamental problem of religious communication is how best to represent and mediate the sacred. (O’Leary 787) What would Jesus tweet? Historically, the quest for sacred connections has relied on the mediation of faith communication via technological implements, from the use of the drum to mediate the Divine, to the use of the mechanical clock by monks as reminders to observe the canonical hours of prayer (Mumford). Today, religious communication practices increasingly implicate Web 2.0, or interactive, user-generated content like blogs (Cheong, Halavis & Kwon), and microblogs like “tweets” of no more than 140 characters sent via Web-based applications like text messaging, instant messaging, e-mail, or on the Web. According to the Pew Internet and American Life Project’s latest report in October 2009, 19% of online adults said that they used a microblogging service to send messages from a computer or mobile device to family and friends who have signed up to receive them (Fox, Zickuhr & Smith). The ascendency of microblogging leads to interesting questions of how new media use alters spatio-temporal dynamics in peoples’ everyday consciousness, including ways in which tweeting facilitates ambient religious interactions. The notion of ambient strikes a particularly resonant chord for religious communication: many faith traditions advocate the practice of sacred mindfulness, and a consistent piety in light of holy devotion to an omnipresent and omniscient Divine being. This paper examines how faith believers appropriate the emergent microblogging practices to create an encompassing cultural surround to include microblogging rituals which promote regular, heightened prayer awareness. Faith tweets help constitute epiphany and a persistent sense of sacred connected presence, which in turn rouses an identification of a higher moral purpose and solidarity with other local and global believers. Amidst ongoing tensions about microblogging, religious organisations and their leadership have also begun to incorporate Twitter into their communication practices and outreach, to encourage the extension of presence beyond the church walls. Faith Tweeting and Mobile Mediated Prayers Twitter’s Website describes itself as a new media service that help users communicate and stay connected through the exchange of quick, frequent answers to the question, “What are you doing?” Some evangelical Christian groups harness these coincident messaging flows to create meaningful pathways for personal, intercessory and synchronised prayer. Using hashtags in a Twitter post creates a community convention or grouping around faith ideas and allows others to access them. Popular faith related hashtags include #twurch (Twitter + church), #prayer, #JIL (Jesus is Lord) and #pray4 (as in, #pray4 my mother). Just as mobile telephony assists distal family members to build “connected presence” (Christensen), I suggest that faith tweets stimulating mobile mediated prayers help build a sense of closeness and “religious connected presence” amongst the distributed family of faith believers, to recreate and reaffirm Divine and corporeal bonds. Consider the Calvin Institute of Worship’s set up of six different Twitter feeds to “pray the hours”. Praying the hours is an ancient practice of praying set prayers throughout certain times of the day, as marked in the Book of Common Prayer in the Christian tradition. Inspired by the Holy Scripture’s injunction to “pray without ceasing” ( 1 Thessalonians 5:17), users can sign up to receive hourly personal or intercessory prayers sent in brief verses or view a Tweetgrid with prayer feeds, to prompt continuous prayer or help those who are unsure of what words to pray. In this way, contemporary believers may reinvent the century-old practice of constant faith mediation as Twitter use helps to reintegrate scripture into people’s daily lives. Faith tweets that goad personal and intercessory prayer also makes ambient religious life salient, and preserves self-awareness of sanctified moments during normal, everyday activities. Furthermore, while the above “praying the hours” performance promotes a specific integration of scripture or prayer into individuals’ daily rhythms, other faith tweets are more focused on evangelism: to reach others through recurrent prayers or random inspirational messages sent throughout the day. For instance, as BBC News reports, religious leaders such as Cardinal Brady, head of Ireland’s Catholic Church, encourage parishioners to use Twitter to spread “the gift of prayer”, as they microblog their daily prayers for their friends and family. Cardinal Brady commented that, “such a sea of prayer is sure to strengthen our sense of solidarity with one another and remind us those who receive them that others really do care" (emphasis mine). Indeed, Cardinal Brady’s observation is instructive to the “Twitness” of faithful microbloggers who desire to shape the blogosphere, and create new faith connections. “JesusTweeters” is a faith-based social networking site, and a service which allows users to send out messages from any random tweet from the Bible Tweet Library, or their own personal messages on a scheduled basis. The site reports that over 500 members of JesusTweeters, each with an average of 500 followers, have signed up to help “spread the Word” worldwide through Twitter. This is an interesting emergent form of Twitter action, as it translates to more than 2.5 million faith tweets being circulated online daily. Moreover, Twitter encourages ‘connected presence’ whereby the use of microblogging enables online faith believers to enjoy an intimate, ‘always on’ virtual presence with their other congregational members during times of physical absence. In the recently released e-book The Reason Your Church Must Twitter, subtitled Making Your Ministry Contagious, author and self-proclaimed ‘technology evangelist’ Anthony Coppedge advocates churches to adopt Twitter as part of their overall communication strategy to maintain relational connectedness beyond the boundaries of established institutional practices. In his book, Coppedge argues that Twitter can be used as a “megaphone” for updates and announcements or as a “conversation” to spur sharing of ideas and prayer exchanges. In line with education scholars who promote Twitter as a pedagogical tool to enhance free-flowing interactions outside of the classroom (Dunlap & Lowenthal), Coppedge encourages pastors to tweet “life application points” from their sermons to their congregational members throughout the week, to reinforce the theme of their Sunday lesson. Ministry leaders are also encouraged to adopt Twitter to “become highly accessible” to members and communicate with their volunteers, in order to build stronger ecumenical relationships. Communication technology scholar Michele Jackson notes that Twitter is a form of visible “lifelogging” as interactants self-disclose their lived-in moments (731). In the case of faith tweets, co-presence is constructed when instantaneous Twitter updates announce new happenings on the church campus, shares prayer requests, confirms details of new events and gives public commendations to celebrate victories of staff members. In this way, microblogging helps to build a portable church where fellow believers can connect to each-other via the thread of frequent, running commentaries of their everyday lives. To further develop ‘connected presence’, a significant number of Churches have also begun to incorporate real-time Twitter streams during their Sunday services. For example, to stimulate congregational members’ sharing of their spontaneous reactions to the movement of the Holy Spirit, Westwind Church in Michigan has created a dozen “Twitter Sundays” where members are free to tweet at any time and at any worship service (Rochman). At Woodlands Church in Houston, a new service was started in 2009 which encourages parishioners to tweet their thoughts, reflections and questions throughout the service. The tweets are reviewed by church staff and they are posted as scrolling visual messages on a screen behind the pastor while he preaches (Patel). It is interesting to note that recurring faith tweets spatially filling the sanctuary screens blurs the visual hierarchies between the pastor as foreground and congregations as background to the degree that tweet voices from the congregation are blended into the church worship service. The interactive use of Twitter also differs from the forms of personal silent meditation and private devotional prayer that, traditionally, most liturgical church services encourage. In this way, key to new organisational practices within religious organisations is what some social commentators are now calling “ambient intimacy”, an enveloping social awareness of one’s social network (Pontin). Indeed, several pastors have acknowledged that faith tweets have enabled them to know their congregational members’ reflections, struggles and interests better and thus they are able to improve their teaching and caring ministry to meet congregants’ evolving spiritual needs (Mapes).Microblogging Rituals and Tweeting Tensions In many ways, faith tweets can be comprehended as microblogging rituals which have an ambient quality in engendering individuals’ spiritual self and group consciousness. The importance of examining emergent cyber-rituals is underscored by Stephen O’Leary in his 1996 seminal article on Cyberspace as Sacred Space. Writing in an earlier era of digital connections, O’Leary discussed e-mail and discussion forum cyber-rituals and what ritual gains in the virtual environment aside from its conventional physiological interactions. Drawing from Walter Ong’s understanding of the “secondary orality” accompanying the shift to electronic media, he argued that cyber-ritual as performative utterances restructure and reintegrate the minds and emotions of their participants, such that they are more aware of their interior self and a sense of communal group membership. Here, the above illustrative examples show how Twitter functions as the context for contemporary, mediated ritual practices to help believers construct a connected presence and affirm their religious identities within an environment where wired communication is a significant part of everyday life. To draw from Walter Ong’s words, microblogging rituals create a new textual and visual “sensorium” that has insightful implications for communication and media scholars. Faith tweeting by restructuring believers’ consciousness and generating a heightened awareness of relationship between the I, You and the Thou opens up possibilities for community building and revitalised religiosity to counteract claims of secularisation in technologically advanced and developed countries. “Praying the hours” guided by scripturally inspired faith tweets, for example, help seekers and believers experience epiphany and practice their faith in a more holistic way as they de-familarize mundane conditions and redeem a sense of the sacred from their everyday surrounds. Through the intermittent sharing of intercessory prayer tweets, faithful followers enact prayer chains and perceive themselves to be immersed in invariable spiritual battle to ward off evil ideology or atheistic beliefs. Moreover, the erosion of the authority of the church is offset by changed leadership practices within religious organisations which have experimented and actively incorporated Twitter into their daily institutional practices. To the extent that laity are willing to engage, creative practices to encourage congregational members to tweet during and after the service help revivify communal sentiments and a higher moral purpose through identification and solidarity with clergy leaders and other believers. Yet this ambience has its possible drawbacks as some experience tensions in their perception and use of Twitter as new technology within the church. Microblogging rituals may have negative implications for individual believers and religious organisations as they can weaken or pervert the existing relational links. As Pauline Cheong and Jessie Poon have pointed out, use of the Internet within religious organisations may bring about an alternative form of “perverse religious social capital building” as some clergy view that online communication detracts from real time relations and physical rituals. Indeed, some religious leaders have already articulated their concerns about Twitter and new tensions they experience in balancing the need to engage with new media audiences and the need for quiet reflection that spiritual rites such as confession of sins and the Holy Communion entail. According to the critics of faith tweeting, microblogging is time consuming and contributes to cognitive overload by taking away one’s attention to what is noteworthy at the moment. For Pastor Hayes of California for example, Twitter distracts his congregation’s focus on the sermon and thus he only recommends his members to tweet after the service. In an interview with the Houston Chronicle, he said: “If two people are talking at the same time, somebody’s not listening”, and “You cannot do two things at once and expect you’re not going to miss something” (Patel). Furthermore, similar to prior concerns voiced with new technologies, there are concerns over inappropriate tweet content that can comprise of crudity, gossip, malevolent and hate messages, which may be especially corrosive to faith communities that strive to model virtues like love, temperance and truth-telling (Vitello). In turn, some congregational members are also experiencing frustrations as they negotiate church boundaries and other members’ disapproval of their tweeting practices during service and church events. Censure of microblogging has taken the form of official requests for tweeting members to leave the sanctuary, to less formal social critique and the application of peer pressure to halt tweeting during religious proceedings and activities (Mapes). As a result of these connectivity tensions, varying recommendations have been recently published as fresh efforts to manage religious communication taking place in ambience. For instance, Coppedge recommends every tweeting church to include Twitter usage in their “church communications policy” to promote accountability within the organisation. The policy should include guidelines against excessive use of Twitter as spam, and for at least one leader to subscribe and monitor every Twitter account used. Furthermore, the Interpreter magazine of the United Methodist Church worldwide featured recommendations by Rev. Safiyah Fosua who listed eight important attributes for pastors wishing to incorporate Twitter during their worship services (Rice). These attributes are: highly adaptive; not easily distracted; secure in their presentation style; not easily taken aback when people appear to be focused on something other than listenin; into quality rather than volume; not easily rattled by things that are new; secure enough as a preacher to let God work through whatever is tweeted even if it is not the main points of the sermon; and carried on the same current the congregation is travelling on. For the most part, these attributes underscore how successful (read wired) contemporary religious leaders should be tolerant of ambient religious communication and of blurring hierarchies of information control when faced with microblogging and the “inexorable advance of multimodal connectedness” (Schroeder 1). To conclude, the rise of faith tweeting opens up a new portal to investigate accretive changes to culture as microblogging rituals nurture piety expressed in continuous prayer, praise and ecclesial updates. The emergent Twitter sensorium demonstrates the variety of ways in which religious adherents appropriate new media within the ken and tensions of their daily lives. References BBC News. “Twitter Your Prayer says Cardinal.” 27 April 2009. ‹http://news.bbc.co.uk/go/pr/fr/-/2/hi/uk_news/northern_ireland/8020285.stm›. Cheong, P.H., A. Halavis and K. Kwon. “The Chronicles of Me: Understanding Blogging as a Religious Practice. Journal of Media and Religion 7 (2008): 107-131. Cheong, P.H., and J.P.H. Poon. “‘WWW.Faith.Org’: (Re)structuring Communication and Social Capital Building among Religious Organizations.” Information, Communication and Society 11.1 (2008): 89-110. Christensen, Toke Haunstrup. “‘Connected Presence’ in Distributed Family Life.” New Media and Society 11 (2009): 433-451. Coppedge, Anthony. “The Reason Your Church Must Twitter: Making Your Ministry Contagious.” 2009. ‹http://www.twitterforchurches.com/›. Dunlap, Joanna, and Patrick Lowenthal. “Tweeting the Night Away: Using Twitter to Enhance Social Presence.” Journal of Information Systems Education 20.2 (2009): 129-135. Fox, Susannah, Kathryn Zickuhr, and Aaron Smith. “Twitter and Status Updating" Pew Internet & American Life Project, 2009. Oct. 2009 ‹http://www.pewinternet.org/~/media//Files/Reports/2009/PIP_Twitter_Fall_2009_web.pdf›. Jackson, Michele. “The Mash-Up: A New Archetype for Communication.” Journal of Computer-Mediated Communication 14.3 (2009): 730-734. Mapes, Diane. “Holy Twitter! Tweeting from the Pews.” 2009. 3 June 2009 ‹http://www.nbcwashington.com/.../Holy_Twitter__Tweeting_from_the_pews.html›. Mumford, Lewis. Technics and Civilization. New York: Harcourt, 1934. Patel, Purva. “Tweeting during Church Services Gets Blessing of Pastors.” Houston Chronicle (2009). 10 Oct. 2009 ‹http://www.chron.com/disp/story.mpl/metropolitan/6662287.html›. O’Leary, Stephen. ”Cyberspace as Sacred Space: Communicating Religion on Computer Networks.” Journal of the American Academy of Religion 64.4 (1996): 781-808. Pontin, Jason. “Twitter and Ambient Intimacy: How Evan Williams Helped Create the New Social Medium of Microblogging.” MIT Review 2007. 15 Nov. 2009 ‹http://www.technologyreview.com/communications/19713/?a=f›. Rice, Kami. “The New Worship Question: To Tweet or Not to Tweet.” Interpreter Magazine (Nov.-Dec. 2009). ‹http://www.interpretermagazine.org/interior.asp?ptid=43&mid=13871›. Rochman, Bonnie. “Twittering in Church, with the Pastor’s O.K.” Time 3 May 2009. ‹http://www.time.com/time/business/article/0,8599,1895463,00.html›. Schroeder, Ralph. “Mobile Phones and the Inexorable Advance of Multimodal Connectedness.” New Media and Society 12.1 (2010): 75-90. Vitello, Paul. “Lead Us to Tweet, and Forgive the Trespassers.” New York Times 5 July 2009. ‹http://www.nytimes.com/2009/07/05/technology/internet/05twitter.html›.
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Watson, Robert. "E-Press and Oppress". M/C Journal 8, n. 2 (1 giugno 2005). http://dx.doi.org/10.5204/mcj.2345.

Testo completo
Abstract (sommario):
From elephants to ABBA fans, silicon to hormone, the following discussion uses a new research method to look at printed text, motion pictures and a teenage rebel icon. If by ‘print’ we mean a mechanically reproduced impression of a cultural symbol in a medium, then printing has been with us since before microdot security prints were painted onto cars, before voice prints, laser prints, network servers, record pressings, motion picture prints, photo prints, colour woodblock prints, before books, textile prints, and footprints. If we accept that higher mammals such as elephants have a learnt culture, then it is possible to extend a definition of printing beyond Homo sapiens. Poole reports that elephants mechanically trumpet reproductions of human car horns into the air surrounding their society. If nothing else, this cross-species, cross-cultural reproduction, this ‘ability to mimic’ is ‘another sign of their intelligence’. Observation of child development suggests that the first significant meaningful ‘impression’ made on the human mind is that of the face of the child’s nurturer – usually its mother. The baby’s mind forms an ‘impression’, a mental print, a reproducible memory data set, of the nurturer’s face, voice, smell, touch, etc. That face is itself a cultural construct: hair style, makeup, piercings, tattoos, ornaments, nutrition-influenced skin and smell, perfume, temperature and voice. A mentally reproducible pattern of a unique face is formed in the mind, and we use that pattern to distinguish ‘familiar and strange’ in our expanding social orbit. The social relations of patterned memory – of imprinting – determine the extent to which we explore our world (armed with research aids such as text print) or whether we turn to violence or self-harm (Bretherton). While our cultural artifacts (such as vellum maps or networked voice message servers) bravely extend our significant patterns into the social world and the traversed environment, it is useful to remember that such artifacts, including print, are themselves understood by our original pattern-reproduction and impression system – the human mind, developed in childhood. The ‘print’ is brought to mind differently in different discourses. For a reader, a ‘print’ is a book, a memo or a broadsheet, whether it is the Indian Buddhist Sanskrit texts ordered to be printed in 593 AD by the Chinese emperor Sui Wen-ti (Silk Road) or the US Defense Department memo authorizing lower ranks to torture the prisoners taken by the Bush administration (Sanchez, cited in ABC). Other fields see prints differently. For a musician, a ‘print’ may be the sheet music which spread classical and popular music around the world; it may be a ‘record’ (as in a ‘recording’ session), where sound is impressed to wax, vinyl, charged silicon particles, or the alloys (Smith, “Elpida”) of an mp3 file. For the fine artist, a ‘print’ may be any mechanically reproduced two-dimensional (or embossed) impression of a significant image in media from paper to metal, textile to ceramics. ‘Print’ embraces the Japanese Ukiyo-e colour prints of Utamaro, the company logos that wink from credit card holographs, the early photographs of Talbot, and the textured patterns printed into neolithic ceramics. Computer hardware engineers print computational circuits. Homicide detectives investigate both sweaty finger prints and the repeated, mechanical gaits of suspects, which are imprinted into the earthy medium of a crime scene. For film makers, the ‘print’ may refer to a photochemical polyester reproduction of a motion picture artifact (the reel of ‘celluloid’), or a DVD laser disc impression of the same film. Textualist discourse has borrowed the word ‘print’ to mean ‘text’, so ‘print’ may also refer to the text elements within the vision track of a motion picture: the film’s opening titles, or texts photographed inside the motion picture story such as the sword-cut ‘Z’ in Zorro (Niblo). Before the invention of writing, the main mechanically reproduced impression of a cultural symbol in a medium was the humble footprint in the sand. The footprints of tribes – and neighbouring animals – cut tracks in the vegetation and the soil. Printed tracks led towards food, water, shelter, enemies and friends. Having learnt to pattern certain faces into their mental world, children grew older and were educated in the footprints of family and clan, enemies and food. The continuous impression of significant foot traffic in the medium of the earth produced the lines between significant nodes of prewriting and pre-wheeled cultures. These tracks were married to audio tracks, such as the song lines of the Australian Aborigines, or the ballads of tramping culture everywhere. A typical tramping song has the line, ‘There’s a track winding back to an old-fashion shack along the road to Gundagai,’ (O’Hagan), although this colonial-style song was actually written for radio and became an international hit on the airwaves, rather than the tramping trails. The printed tracks impressed by these cultural flows are highly contested and diverse, and their foot prints are woven into our very language. The names for printed tracks have entered our shared memory from the intersection of many cultures: ‘Track’ is a Germanic word entering English usage comparatively late (1470) and now used mainly in audio visual cultural reproduction, as in ‘soundtrack’. ‘Trek’ is a Dutch word for ‘track’ now used mainly by ecotourists and science fiction fans. ‘Learn’ is a Proto-Indo-European word: the verb ‘learn’ originally meant ‘to find a track’ back in the days when ‘learn’ had a noun form which meant ‘the sole of the foot’. ‘Tract’ and ‘trace’ are Latin words entering English print usage before 1374 and now used mainly in religious, and electronic surveillance, cultural reproduction. ‘Trench’ in 1386 was a French path cut through a forest. ‘Sagacity’ in English print in 1548 was originally the ability to track or hunt, in Proto-Indo-European cultures. ‘Career’ (in English before 1534) was the print made by chariots in ancient Rome. ‘Sleuth’ (1200) was a Norse noun for a track. ‘Investigation’ (1436) was Latin for studying a footprint (Harper). The arrival of symbolic writing scratched on caves, hearth stones, and trees (the original meaning of ‘book’ is tree), brought extremely limited text education close to home. Then, with baked clay tablets, incised boards, slate, bamboo, tortoise shell, cast metal, bark cloth, textiles, vellum, and – later – paper, a portability came to text that allowed any culture to venture away from known ‘foot’ paths with a reduction in the risk of becoming lost and perishing. So began the world of maps, memos, bills of sale, philosophic treatises and epic mythologies. Some of this was printed, such as the mechanical reproduction of coins, but the fine handwriting required of long, extended, portable texts could not be printed until the invention of paper in China about 2000 years ago. Compared to lithic architecture and genes, portable text is a fragile medium, and little survives from the millennia of its innovators. The printing of large non-text designs onto bark-paper and textiles began in neolithic times, but Sui Wen-ti’s imperial memo of 593 AD gives us the earliest written date for printed books, although we can assume they had been published for many years previously. The printed book was a combination of Indian philosophic thought, wood carving, ink chemistry and Chinese paper. The earliest surviving fragment of paper-print technology is ‘Mantras of the Dharani Sutra’, a Buddhist scripture written in the Sanskrit language of the Indian subcontinent, unearthed at an early Tang Dynasty site in Xian, China – making the fragment a veteran piece of printing, in the sense that Sanskrit books had been in print for at least a century by the early Tang Dynasty (Chinese Graphic Arts Net). At first, paper books were printed with page-size carved wooden boards. Five hundred years later, Pi Sheng (c.1041) baked individual reusable ceramic characters in a fire and invented the durable moveable type of modern printing (Silk Road 2000). Abandoning carved wooden tablets, the ‘digitizing’ of Chinese moveable type sped up the production of printed texts. In turn, Pi Sheng’s flexible, rapid, sustainable printing process expanded the political-cultural impact of the literati in Asian society. Digitized block text on paper produced a bureaucratic, literate elite so powerful in Asia that Louis XVI of France copied China’s print-based Confucian system of political authority for his own empire, and so began the rise of the examined public university systems, and the civil service systems, of most European states (Watson, Visions). By reason of its durability, its rapid mechanical reproduction, its culturally agreed signs, literate readership, revered authorship, shared ideology, and distributed portability, a ‘print’ can be a powerful cultural network which builds and expands empires. But print also attacks and destroys empires. A case in point is the Spanish conquest of Aztec America: The Aztecs had immense libraries of American literature on bark-cloth scrolls, a technology which predated paper. These libraries were wiped out by the invading Spanish, who carried a different book before them (Ewins). In the industrial age, the printing press and the gun were seen as the weapons of rebellions everywhere. In 1776, American rebels staffed their ‘Homeland Security’ units with paper makers, knowing that defeating the English would be based on printed and written documents (Hahn). Mao Zedong was a book librarian; Mao said political power came out of the barrel of a gun, but Mao himself came out of a library. With the spread of wireless networked servers, political ferment comes out of the barrel of the cell phone and the internet chat room these days. Witness the cell phone displays of a plane hitting a tower that appear immediately after 9/11 in the Middle East, or witness the show trials of a few US and UK lower ranks who published prints of their torturing activities onto the internet: only lower ranks who published prints were arrested or tried. The control of secure servers and satellites is the new press. These days, we live in a global library of burning books – ‘burning’ in the sense that ‘print’ is now a charged silicon medium (Smith, “Intel”) which is usually made readable by connecting the chip to nuclear reactors and petrochemically-fired power stations. World resources burn as we read our screens. Men, women, children burn too, as we watch our infotainment news in comfort while ‘their’ flickering dead faces are printed in our broadcast hearths. The print we watch is not the living; it is the voodoo of the living in the blackout behind the camera, engaging the blood sacrifice of the tormented and the unfortunate. Internet texts are also ‘on fire’ in the third sense of their fragility and instability as a medium: data bases regularly ‘print’ fail-safe copies in an attempt to postpone the inevitable mechanical, chemical and electrical failure that awaits all electronic media in time. Print defines a moral position for everyone. In reporting conflict, in deciding to go to press or censor, any ‘print’ cannot avoid an ethical context, starting with the fact that there is a difference in power between print maker, armed perpetrators, the weak, the peaceful, the publisher, and the viewer. So many human factors attend a text, video or voice ‘print’: its very existence as an aesthetic object, even before publication and reception, speaks of unbalanced, and therefore dynamic, power relationships. For example, Graham Greene departed unscathed from all the highly dangerous battlefields he entered as a novelist: Riot-torn Germany, London Blitz, Belgian Congo, Voodoo Haiti, Vietnam, Panama, Reagan’s Washington, and mafia Europe. His texts are peopled with the injustices of the less fortunate of the twentieth century, while he himself was a member of the fortunate (if not happy) elite, as is anyone today who has the luxury of time to read Greene’s works for pleasure. Ethically a member of London and Paris’ colonizers, Greene’s best writing still electrifies, perhaps partly because he was in the same line of fire as the victims he shared bread with. In fact, Greene hoped daily that he would escape from the dreadful conflicts he fictionalized via a body bag or an urn of ashes (see Sherry). In reading an author’s biography we have one window on the ethical dimensions of authority and print. If a print’s aesthetics are sometimes enduring, its ethical relationships are always mutable. Take the stylized logo of a running athlete: four limbs bent in a rotation of action. This dynamic icon has symbolized ‘good health’ in Hindu and Buddhist culture, from Madras to Tokyo, for thousands of years. The cross of bent limbs was borrowed for the militarized health programs of 1930s Germany, and, because of what was only a brief, recent, isolated yet monstrously horrific segment of its history in print, the bent-limbed swastika is now a vilified symbol in the West. The sign remains ‘impressed’ differently on traditional Eastern culture, and without the taint of Nazism. Dramatic prints are emotionally charged because, in depicting Homo sapiens in danger, or passionately in love, they elicit a hormonal reaction from the reader, the viewer, or the audience. The type of emotions triggered by a print vary across the whole gamut of human chemistry. A recent study of three genres of motion picture prints shows a marked differences in the hormonal responses of men compared to women when viewing a romance, an actioner, and a documentary (see Schultheiss, Wirth, and Stanton). Society is biochemically diverse in its engagement with printed culture, which raises questions about equality in the arts. Motion picture prints probably comprise around one third of internet traffic, in the form of stolen digitized movie files pirated across the globe via peer-to-peer file transfer networks (p2p), and burnt as DVD laser prints (BBC). There is also a US 40 billion dollar per annum legitimate commerce in DVD laser pressings (Grassl), which would suggest an US 80 billion per annum world total in legitimate laser disc print culture. The actively screen literate, or the ‘sliterati’ as I prefer to call them, research this world of motion picture prints via their peers, their internet information channels, their television programming, and their web forums. Most of this activity occurs outside the ambit of universities and schools. One large site of sliterate (screen literate) practice outside most schooling and official research is the net of online forums at imdb.com (International Movie Data Base). Imdb.com ‘prints’ about 25,000,000 top pages per month to client browsers. Hundreds of sliterati forums are located at imdb, including a forum for the Australian movie, Muriel’s Wedding (Hogan). Ten years after the release of Muriel’s Wedding, young people who are concerned with victimization and bullying still log on to http://us.imdb.com/title/tt0110598/board/> and put their thoughts into print: I still feel so bad for Muriel in the beginning of the movie, when the girls ‘dump’ her, and how much the poor girl cried and cried! Those girls were such biartches…I love how they got their comeuppance! bunniesormaybemidgets’s comment is typical of the current discussion. Muriel’s Wedding was a very popular film in its first cinema edition in Australia and elsewhere. About 30% of the entire over-14 Australian population went to see this photochemical polyester print in the cinemas on its first release. A decade on, the distributors printed a DVD laser disc edition. The story concerns Muriel (played by Toni Collette), the unemployed daughter of a corrupt, ‘police state’ politician. Muriel is bullied by her peers and she withdraws into a fantasy world, deluding herself that a white wedding will rescue her from the torments of her blighted life. Through theft and deceit (the modus operandi of her father) Muriel escapes to the entertainment industry and finds a ‘wicked’ girlfriend mentor. From a rebellious position of stubborn independence, Muriel plays out her fantasy. She gets her white wedding, before seeing both her father and her new married life as hollow shams which have goaded her abandoned mother to suicide. Redefining her life as a ‘game’ and assuming responsibility for her independence, Muriel turns her back on the mainstream, image-conscious, female gang of her oppressed youth. Muriel leaves the story, having rekindled her friendship with her rebel mentor. My methodological approach to viewing the laser disc print was to first make a more accessible, coded record of the entire movie. I was able to code and record the print in real time, using a new metalanguage (Watson, “Eyes”). The advantage of Coding is that ‘thinks’ the same way as film making, it does not sidetrack the analyst into prose. The Code splits the movie print into Vision Action [vision graphic elements, including text] (sound) The Coding splits the vision track into normal action and graphic elements, such as text, so this Coding is an ideal method for extracting all the text elements of a film in real time. After playing the film once, I had four and a half tightly packed pages of the coded story, including all its text elements in square brackets. Being a unique, indexed hard copy, the Coded copy allowed me immediate access to any point of the Muriel’s Wedding saga without having to search the DVD laser print. How are ‘print’ elements used in Muriel’s Wedding? Firstly, a rose-coloured monoprint of Muriel Heslop’s smiling face stares enigmatically from the plastic surface of the DVD picture disc. The print is a still photo captured from her smile as she walked down the aisle of her white wedding. In this print, Toni Collette is the Mona Lisa of Australian culture, except that fans of Muriel’s Wedding know the meaning of that smile is a magical combination of the actor’s art: the smile is both the flush of dreams come true and the frightening self deception that will kill her mother. Inserting and playing the disc, the text-dominant menu appears, and the film commences with the text-dominant opening titles. Text and titles confer a legitimacy on a work, whether it is a trade mark of the laser print owners, or the household names of stars. Text titles confer status relationships on both the presenters of the cultural artifact and the viewer who has entered into a legal license agreement with the owners of the movie. A title makes us comfortable, because the mind always seeks to name the unfamiliar, and a set of text titles does that job for us so that we can navigate the ‘tracks’ and settle into our engagement with the unfamiliar. The apparent ‘truth’ and ‘stability’ of printed text calms our fears and beguiles our uncertainties. Muriel attends the white wedding of a school bully bride, wearing a leopard print dress she has stolen. Muriel’s spotted wild animal print contrasts with the pure white handmade dress of the bride. In Muriel’s leopard textile print, we have the wild, rebellious, impoverished, inappropriate intrusion into the social ritual and fantasy of her high-status tormentor. An off-duty store detective recognizes the printed dress and calls the police. The police are themselves distinguished by their blue-and-white checked prints and other mechanically reproduced impressions of cultural symbols: in steel, brass, embroidery, leather and plastics. Muriel is driven in the police car past the stenciled town sign (‘Welcome To Porpoise Spit’ heads a paragraph of small print). She is delivered to her father, a politician who presides over the policing of his town. In a state where the judiciary, police and executive are hijacked by the same tyrant, Muriel’s father, Bill, pays off the police constables with a carton of legal drugs (beer) and Muriel must face her father’s wrath, which he proceeds to transfer to his detested wife. Like his daughter, the father also wears a spotted brown print costume, but his is a batik print from neighbouring Indonesia (incidentally, in a nation that takes the political status of its batik prints very seriously). Bill demands that Muriel find the receipt for the leopard print dress she claims she has purchased. The legitimate ownership of the object is enmeshed with a printed receipt, the printed evidence of trade. The law (and the paramilitary power behind the law) are legitimized, or contested, by the presence or absence of printed text. Muriel hides in her bedroom, surround by poster prints of the pop group ABBA. Torn-out prints of other people’s weddings adorn her mirror. Her face is embossed with the clown-like primary colours of the marionette as she lifts a bouquet to her chin and stares into the real time ‘print’ of her mirror image. Bill takes the opportunity of a business meeting with Japanese investors to feed his entire family at ‘Charlie Chan’’s restaurant. Muriel’s middle sister sloppily wears her father’s state election tee shirt, printed with the text: ‘Vote 1, Bill Heslop. You can’t stop progress.’ The text sets up two ironic gags that are paid off on the dialogue track: “He lost,’ we are told. ‘Progress’ turns out to be funding the concreting of a beach. Bill berates his daughter Muriel: she has no chance of becoming a printer’s apprentice and she has failed a typing course. Her dysfunction in printed text has been covered up by Bill: he has bribed the typing teacher to issue a printed diploma to his daughter. In the gambling saloon of the club, under the arrays of mechanically repeated cultural symbols lit above the poker machines (‘A’ for ace, ‘Q’ for queen, etc.), Bill’s secret girlfriend Diedre risks giving Muriel a cosmetics job. Another text icon in lights announces the surf nightclub ‘Breakers’. Tania, the newly married queen bitch who has made Muriel’s teenage years a living hell, breaks up with her husband, deciding to cash in his negotiable text documents – his Bali honeymoon tickets – and go on an island holiday with her girlfriends instead. Text documents are the enduring site of agreements between people and also the site of mutations to those agreements. Tania dumps Muriel, who sobs and sobs. Sobs are a mechanical, percussive reproduction impressed on the sound track. Returning home, we discover that Muriel’s older brother has failed a printed test and been rejected for police recruitment. There is a high incidence of print illiteracy in the Heslop family. Mrs Heslop (Jeannie Drynan), for instance, regularly has trouble at the post office. Muriel sees a chance to escape the oppression of her family by tricking her mother into giving her a blank cheque. Here is the confluence of the legitimacy of a bank’s printed negotiable document with the risk and freedom of a blank space for rebel Muriel’s handwriting. Unable to type, her handwriting has the power to steal every cent of her father’s savings. She leaves home and spends the family’s savings at an island resort. On the island, the text print-challenged Muriel dances to a recording (sound print) of ABBA, her hand gestures emphasizing her bewigged face, which is made up in an impression of her pop idol. Her imitation of her goddesses – the ABBA women, her only hope in a real world of people who hate or avoid her – is accompanied by her goddesses’ voices singing: ‘the mystery book on the shelf is always repeating itself.’ Before jpeg and gif image downloads, we had postcard prints and snail mail. Muriel sends a postcard to her family, lying about her ‘success’ in the cosmetics business. The printed missal is clutched by her father Bill (Bill Hunter), who proclaims about his daughter, ‘you can’t type but you really impress me’. Meanwhile, on Hibiscus Island, Muriel lies under a moonlit palm tree with her newly found mentor, ‘bad girl’ Ronda (Rachel Griffiths). In this critical scene, where foolish Muriel opens her heart’s yearnings to a confidante she can finally trust, the director and DP have chosen to shoot a flat, high contrast blue filtered image. The visual result is very much like the semiabstract Japanese Ukiyo-e woodblock prints by Utamaro. This Japanese printing style informed the rise of European modern painting (Monet, Van Gogh, Picasso, etc., were all important collectors and students of Ukiyo-e prints). The above print and text elements in Muriel’s Wedding take us 27 minutes into her story, as recorded on a single page of real-time handwritten Coding. Although not discussed here, the Coding recorded the complete film – a total of 106 minutes of text elements and main graphic elements – as four pages of Code. Referring to this Coding some weeks after it was made, I looked up the final code on page four: taxi [food of the sea] bq. Translation: a shop sign whizzes past in the film’s background, as Muriel and Ronda leave Porpoise Spit in a taxi. Over their heads the text ‘Food Of The Sea’ flashes. We are reminded that Muriel and Ronda are mermaids, fantastic creatures sprung from the brow of author PJ Hogan, and illuminated even today in the pantheon of women’s coming-of-age art works. That the movie is relevant ten years on is evidenced by the current usage of the Muriel’s Wedding online forum, an intersection of wider discussions by sliterate women on imdb.com who, like Muriel, are observers (and in some cases victims) of horrific pressure from ambitious female gangs and bullies. Text is always a minor element in a motion picture (unless it is a subtitled foreign film) and text usually whizzes by subliminally while viewing a film. By Coding the work for [text], all the text nuances made by the film makers come to light. While I have viewed Muriel’s Wedding on many occasions, it has only been in Coding it specifically for text that I have noticed that Muriel is a representative of that vast class of talented youth who are discriminated against by print (as in text) educators who cannot offer her a life-affirming identity in the English classroom. Severely depressed at school, and failing to type or get a printer’s apprenticeship, Muriel finds paid work (and hence, freedom, life, identity, independence) working in her audio visual printed medium of choice: a video store in a new city. Muriel found a sliterate admirer at the video store but she later dumped him for her fantasy man, before leaving him too. One of the points of conjecture on the imdb Muriel’s Wedding site is, did Muriel (in the unwritten future) get back together with admirer Brice Nobes? That we will never know. While a print forms a track that tells us where culture has been, a print cannot be the future, a print is never animate reality. At the end of any trail of prints, one must lift one’s head from the last impression, and negotiate satisfaction in the happening world. References Australian Broadcasting Corporation. “Memo Shows US General Approved Interrogations.” 30 Mar. 2005 http://www.abc.net.au>. British Broadcasting Commission. “Films ‘Fuel Online File-Sharing’.’’ 22 Feb. 2005 http://news.bbc.co.uk/1/hi/technology/3890527.stm>. Bretherton, I. “The Origins of Attachment Theory: John Bowlby and Mary Ainsworth.” 1994. 23 Jan. 2005 http://www.psy.med.br/livros/autores/bowlby/bowlby.pdf>. Bunniesormaybemidgets. Chat Room Comment. “What Did Those Girls Do to Rhonda?” 28 Mar. 2005 http://us.imdb.com/title/tt0110598/board/>. Chinese Graphic Arts Net. Mantras of the Dharani Sutra. 20 Feb. 2005 http://www.cgan.com/english/english/cpg/engcp10.htm>. Ewins, R. Barkcloth and the Origins of Paper. 1991. 20 Feb. 2005 http://www.justpacific.com/pacific/papers/barkcloth~paper.html>. Grassl K.R. The DVD Statistical Report. 14 Mar. 2005 http://www.corbell.com>. Hahn, C. M. The Topic Is Paper. 20 Feb. 2005 http://www.nystamp.org/Topic_is_paper.html>. Harper, D. Online Etymology Dictionary. 14 Mar. 2005 http://www.etymonline.com/>. Mask of Zorro, The. Screenplay by J McCulley. UA, 1920. Muriel’s Wedding. Dir. PJ Hogan. Perf. Toni Collette, Rachel Griffiths, Bill Hunter, and Jeannie Drynan. Village Roadshow, 1994. O’Hagan, Jack. On The Road to Gundagai. 1922. 2 Apr. 2005 http://ingeb.org/songs/roadtogu.html>. Poole, J.H., P.L. Tyack, A.S. Stoeger-Horwath, and S. Watwood. “Animal Behaviour: Elephants Are Capable of Vocal Learning.” Nature 24 Mar. 2005. Sanchez, R. “Interrogation and Counter-Resistance Policy.” 14 Sept. 2003. 30 Mar. 2005 http://www.abc.net.au>. Schultheiss, O.C., M.M. Wirth, and S.J. Stanton. “Effects of Affiliation and Power Motivation Arousal on Salivary Progesterone and Testosterone.” Hormones and Behavior 46 (2005). Sherry, N. The Life of Graham Greene. 3 vols. London: Jonathan Cape 2004, 1994, 1989. Silk Road. Printing. 2000. 20 Feb. 2005 http://www.silk-road.com/artl/printing.shtml>. Smith, T. “Elpida Licenses ‘DVD on a Chip’ Memory Tech.” The Register 20 Feb. 2005 http://www.theregister.co.uk/2005/02>. —. “Intel Boffins Build First Continuous Beam Silicon Laser.” The Register 20 Feb. 2005 http://www.theregister.co.uk/2005/02>. Watson, R. S. “Eyes And Ears: Dramatic Memory Slicing and Salable Media Content.” Innovation and Speculation, ed. Brad Haseman. Brisbane: QUT. [in press] Watson, R. S. Visions. Melbourne: Curriculum Corporation, 1994. Citation reference for this article MLA Style Watson, Robert. "E-Press and Oppress: Audio Visual Print Drama, Identity, Text and Motion Picture Rebellion." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/08-watson.php>. APA Style Watson, R. (Jun. 2005) "E-Press and Oppress: Audio Visual Print Drama, Identity, Text and Motion Picture Rebellion," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/08-watson.php>.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia