Journal articles: 'Echo (Online service)' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

June discounts! -30% on all plans during the first week of June.

Get my discount

Relevant bibliographies by topics / Echo (Online service) / Journal articles

To see the other types of publications on this topic, follow the link: Echo (Online service).

Author: Grafiati

Published: 4 June 2021

Last updated: 30 January 2023

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 50 journal articles for your research on the topic 'Echo (Online service).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vicente,NikuE., PeterJaysonA.Moredo, and DalmacitoA.Cordero. "At your ‘online’ service! A continuous service-learning program for college students during the COVID-19 pandemic." Journal of Public Health 43, no.2 (April5, 2021): e401-e402. http://dx.doi.org/10.1093/pubmed/fdab073.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract School health protocols in conducting face-to-face classes must be planned carefully to ensure that students will be safe from the effects of COVID-19. This is what the authors emphasized in a recent correspondence, which we re-echo in this paper in case the situation permits. However, a greater consideration must be given to colleges and universities where the aspect of community/social engagement of the students is already part of the curriculum. There is still a greater risk for students to go to the communities for service and social interaction. With this, we suggest that the service program can still continue through an enhanced electronic service-learning, which maximizes the human resources’ capacity and highlights students’ creativity with equally useful projects.

2

Haydon,HelenM., LiamJ.Caffery, CentaineL.Snoswell, EmmaE.Thomas, Roderick Wright, Rachel Doolan, Lisa Garner, Phil Aitken, and AnthonyC.Smith. "Dementia ECHO: Evaluation of a telementoring programme to increase dementia knowledge and skills in First Nations-led health services." Journal of Telemedicine and Telecare 28, no.10 (November8, 2022): 757–63. http://dx.doi.org/10.1177/1357633x221119610.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction High rates of dementia among Australian First Nations’ peoples have resulted in an increased demand for dementia knowledge and skills among the primary health care professionals in these communities. The Dementia Extension for Community Healthcare Outcomes (ECHO) program aims to be a culturally safe way of increasing local health workforce capacity by facilitating dementia knowledge, skills and confidence among primary care professionals in First Nations community settings. Dementia ECHO is based on the international evidence-based telementoring programme, Project Extension for Community Healthcare Outcomes. Every Dementia ECHO session is delivered by videoconference and comprises a specialist-led presentation and a case discussion from a primary care health service participant. The aims of this study were to assess the uptake and reach of Dementia ECHO; examine the perceived importance of dementia care and dementia education among Aboriginal and Torres Strait Islander Community Controlled Health Service staff; and evaluate the potential impact of Dementia ECHO on health service staff pertaining to dementia knowledge, confidence to provide dementia care and professional isolation. Method Dementia ECHO service activity data maintained by the programme providers was reviewed to determine uptake and reach. A pre-implementation survey examined Aboriginal and Torres Strait Islander Community Controlled Health Service staff perspectives on the importance of dementia education and the priority of a range of health issues. After each Dementia ECHO session, a brief online survey gathered quantitative and qualitative data regarding the potential impact of the session. Results Of 30 completed pre-implementation surveys, all staff rated dementia education as either very important or important. Salient themes highlighting why it is important are presented. When asked to rank six different health priorities, dementia ( n = 10) and chronic disease ( n = 10) were placed as the top priority. The brief post-session feedback provided 44 complete survey responses demonstrating: perceived improvement in dementia knowledge and skills (88.4%); increased confidence to provide dementia care (83%); and a reduction in professional isolation (88%). Conclusion Dementia ECHO addresses a gap in dementia education that is much needed in health professionals with increasing numbers of First Nations people living with dementia. This current study shows that attending an evidence-based telementoring programme, such as Dementia ECHO, can increase dementia knowledge and confidence to care for someone living with dementia and their families.

3

Jenkins, Chris, Janet Diffin, Tracey McTernaghan, Max Watson, and Kate Fleming. "The perceived impact of project ECHO networks in Northern Ireland for health and social care providers, patients, and the health system: A qualitative analysis." Health Informatics Journal 28, no.4 (October 2022): 146045822211354. http://dx.doi.org/10.1177/14604582221135431.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This study assesses the perceived impact and benefits of Project ECHO (Extension for Community Healthcare Outcomes), a tele-mentoring intervention for health and social care providers, patients and the health system in Northern Ireland. Having access to a specialist, a space to share experiences, and being able to disseminate up-to-date best practice were all cited as improving provider knowledge as well as improving quality of care for patients. Healthcare providers reported being more confident in managing patients and that relationships had been improved between different levels of the health system. ECHO was described as improving access to education and training by removing geographic and time barriers. This is one of the first studies to qualitatively analyse impact across a number of different clinical and social care ECHO networks. The results strongly indicate the perceived benefit of ECHO in improving provider, patient and health system outcomes such as increased healthcare provider knowledge and confidence to manage patients at primary levels of the health system. This has implications for future service design, particularly within the context of COVID-19 in which virtual and online training is necessitated by social distancing requirements.

4

Jane, Alanna, Lisa Kanisberg, Anmol Patel, Salina Eldon, Evdokia Anagnostou, Jessica Brian, and Melanie Penner. "41 Content Analysis of the Recommendations from Project Echo Ontario Autism." Paediatrics & Child Health 27, Supplement_3 (October1, 2022): e20-e20. http://dx.doi.org/10.1093/pch/pxac100.040.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background The rising prevalence of autism spectrum disorder (ASD) diagnoses has caused an increased number of community practitioners to care for this population. However, community practitioners report a lack of knowledge and confidence in treating these patients, resulting in unmet healthcare needs. The Extension of Community Healthcare Outcomes (ECHO) Autism model aims to address this through case-based and didactic learning to help guide community practitioners in providing comprehensive, best-practice care for ASD screening, diagnosis, and management of co-occurring conditions. Each ECHO session involves a case presentation followed by a list of recommendations generated by community participants and an interdisciplinary ‘hub’ team. While ECHO Autism has been shown to improve physicians' abilities to care for children with ASD in their practices, recommendations stemming from ECHO cases have yet to be characterized and may help guide future care. Objectives To quantify and characterize the common categories within ECHO Autism Ontario case recommendations. Design/Methods A content analysis of 422 recommendations from 61 ECHO cases was conducted to identify categories of recommendations and their frequencies. Three researchers independently coded recommendations from five ECHO cases, from which an original coding guide was developed. The researchers then independently coded the remaining cases and met regularly with the ECHO lead to modify and consolidate the codes and coding guide. From there, categories and sub-categories from the various codes were identified. Finally, the frequencies of each code and category were calculated. Results Fifty-seven codes were included in the final coding guide and grouped into eight broad categories. Categories included: 1) diagnosis; 2) concurrent mental and physical health conditions; 3) referrals to allied health providers and other specialists; 4) accessing community resources, such as parent and sibling support groups; 5) providing education and guidance to physicians, patients, and families; 6) management strategies such as nutrition, physical activity, and social skills; and 7) patient and family-centered care. A COVID-19 category was added, as many of the later recommendations were adapted to online service delivery. An analysis of the frequency of codes found that 1,384 total in-text codes were distributed amongst the various categories. The three highest frequencies of categories were providing general guidance and education (22%), accessing resources (16%), and referrals (15%). Conclusion This is the first time recommendations from ECHO Autism have been characterized and quantified. Our results, particularly the most common category of providing general guidance and education about ASD, show there is still important work to be done with educating clinicians and families about aspects of ASD. Furthermore, findings from this study should inform Pediatrics residency programs about real-world knowledge gaps in ASD care, and may help create more tailored ASD training programs and educational materials.

5

Jack, Eleanor. "Service user involvement in an undergraduate nursing programme." Journal of Mental Health Training, Education and Practice 15, no.3 (January27, 2020): 125–40. http://dx.doi.org/10.1108/jmhtep-12-2018-0073.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Purpose The purpose of this study is to highlight the impacts that service user involvement can have on the education of UK undergraduate student mental health nurses both personally and professionally. It reports the findings from a short module evaluation of a collaboratively delivered theory unit using a qualitative approach. Design/methodology/approach The study reports the findings from a short module evaluation of a collaboratively delivered theory unit using a qualitative approach embracing two focus groups. Findings The findings from the two focus groups highlight that the service user input (expert by experience) offered a positive learning experience for the students, enabled them to appreciate the meaning of recovery and hope and facilitated the identification of the importance of their role in terms of connecting meaningfully with those they are supporting and reconsidering key priorities for practice. They also suggest that there is theory/practice gap reduction as students were able to connect the service user narratives to the evidence base for deeper understanding and application. Research limitations/implications Although only a brief evaluation of a short theory module within a wider programme involving a small number of participants, the findings echo the wider literature and offers further rationale to support direct service user involvement within mental health education across all healthcare professions. This finding is also relevant, as, increasingly, learning/teaching programmes now seek to implement blended learning with significant online teaching and less face-to-face facilitation of learning. Practical implications This study highlights not only the positive impact of service user input on health-care education but also the benevolent influence skilled narratives can have as a pedagogical approach to learning. Originality/value Although there is much in the literature as to the benefits for student learning in involving service users within higher education institute education, there is limited information as to “how” and “why” this is the case, this article seeks to bridge that gap.

6

Bauer,BrentonS., Ai Len Nguyen-Phan, MichaelK.Ong, Boback Ziaeian, and Kim-Lien Nguyen. "Cardiology electronic consultations: Efficient and safe, but consultant satisfaction is equivocal." Journal of Telemedicine and Telecare 26, no.6 (February25, 2019): 341–48. http://dx.doi.org/10.1177/1357633x19828130.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background Cardiovascular electronic consultation is a new service line in consultative medicine and enables care without in-person office visits. We aimed to evaluate accessibility and time saved as measures of efficiency, determine the safety of cardiology electronic consultations, and assess satisfaction by responding cardiologists. Methods Using a mixed-methods approach and a modified time-driven, activity-based, costing framework, we retrospectively analysed cardiology electronic consultations. A random subset of 500 electronic consultations referred between 2013–2017 were reviewed. Accessibility was determined based upon increased number of patients served without the need for an in-person clinic visit. To assess safety, medical records were reviewed for emergency room visits or hospital admission at six months from the initial electronic consultation date. Responding cardiologist satisfaction was assessed by voluntary completion of an online survey. Results The majority of electronic consultations were related to medication advice, clearance for surgery, evaluation of images, or guidance after abnormal testing. Recommendations included echo (10.8%), stress testing (5.0%), other imaging (4.0%) and other subspecialist referrals (3.8%). Electronic consultations were completed within 0.7±0.5 days of the request, with a time to completion of 5–30 min. Over a six-month follow-up, 13.9% of patients had an in-person visit and 2.2% of patients were hospitalised, but none were directly related to the electronic consultation question. Satisfaction by responding cardiologists was modest. Conclusion In conclusion, within a single-payer system, cardiology electronic consultations represent a convenient and safe alternative for providing consultative cardiovascular care, but further optimization is necessary to minimise electronic consultation fatigue experienced by cardiologists.

7

Keogh,A.M., and D.Farrell. "N16 Inflammatory bowel disease (IBD) Nurses’ role and level of practice in Ireland: a National online survey." Journal of Crohn's and Colitis 14, Supplement_1 (January 2020): S665. http://dx.doi.org/10.1093/ecco-jcc/jjz203.999.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background The role of the IBD nurse is evolving in Ireland. While Ireland has a sound base of expertise and infrastructure for providing IBD services, the lack of a dedicated specialist nurse was found to be the most significant barrier to delivering best care (ISG, 2016). There is currently no data on the role and level of practice of IBD nurse nationally. Methods A cross-sectional, descriptive online survey was undertaken. The 72-item survey was adapted from the tool used in the National UK IBD standards survey (Mason et al 2012) and underpinned by the Standards and Requirements for Clinical Nurse Specialists (NMBI, 2008). The survey was distributed to all members (n = 50) of the inflammatory bowel disease Nurses Association of Ireland (IBDNAI) and members were also invited to share the survey with colleagues not on the database. Results A total of 35 nurses working in IBD services across 22 hospitals nationally completed the survey, including IBD Clinical Nurse Specialists (CNS) (24%), IBD Clinical Nurse Managers II (CNM) (18%), IBD Nurses (12%), IBD Research Nurses (12%), Staff Nurses (9%); Infusion Nurses (6%), and IBD Advanced Nurse Practitioners (6%). The majority of respondents worked in adult IBD services (94%), with most working in their IBD role between 3 to 6 years and within gastroenterology up to 10 years. Only 44% of respondents work exclusively in IBD. The highest level of education reported was masters (40%), degree (40%); however, 75% of respondents have not completed a postgraduate diploma in gastroenterology. Services provided by nurses included patient education (94%), telephone advice line (81%), coordinating biologic service (69%), screening patients prior to administrating biologics (66%), email service for patients (59%), development of initiative for the IBD service (56%), coordinating care of inpatients (53%), follow-up (53%) and rapid access clinics (53%). Over half of respondents (61%) reported working unpaid overtime (typically 1–2 hours per week), with service suspended in their absence (45%). 36% of participants conducted original research and 48% conduct audits on their service. Conclusion IBD nurse’s role and level of practice varies greatly in Ireland. Many nurses are working in diverse roles with a wide variety of titles providing an extensive service to patients, often at a higher level than is recognised within their role title. IBD nurses are highly educated and well experienced; however the lack of specialist education has resulted in nearly as many IBD CNM’s as CNS’s which is causing variation in the title of the IBD nurse. There is a need for the development of a postgraduate programme in gastroenterology to include IBD and more IBD nurse specialists to deliver a quality, evidence-based service.

8

Hamzawi,M., S.Brannick, Y.Hickey, F.Jones, O.BrettKilmurray, J.Sheridan, and G.Cullen. "N15 Feedback from adolescents and parents on the transition process to an Irish Adult IBD service." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i623—i624. http://dx.doi.org/10.1093/ecco-jcc/jjab232.857.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background A nurse-led service improvement project has implemented a structured MDT model of transition for adolescents transitioning their IBD care to adult service in a tertiary hospital over a two-year period. Guidelines recommend obtaining service user and carer/parent perspectives on the process and identifying when additional emotional and psychological support is required. This had not been completed to date by the service. Methods Adolescents (13) and their parents/carer (7) who have been attending the service for 1 year were invited to complete a service-designed, patient experience questionnaire to determine how well they have adapted to adult services. Items from The Brief Illness Perception Questionnaire (B-IPQ) were used to measure how participants understand and are impacted by their IBD. Negative illness perceptions are associated with anxiety, depression and poor quality of life. Results Of the 13 responses from adolescents 85% felt ready to leave children’s services at time of transfer compared to 71% of the parents. 87% of parents had concerns re transfer compared to 31% of adolescents.92% of the adolescents felt they had a chance to talk about their concerns and would also be happy to individually contact the IBD nurses with questions. Only 23% would like the IBD nurses to contact parents directly for information/medical updates. A common theme in the open-ended questions for both the adolescents and parents was the change in responsibility with the questions being directly asked to the adolescent and they are now the point of contact for the service. The most common topics for more information were fatigue, stress, diet, and getting this from a website or individually were the preferred methods. When attending clinic appointments adolescents always want to see a doctor but would like the opportunity to meet with the IBD nurse, dietitian and psychologist when required and 85% would consider using an online self-booking system if available. 50%of the adolescents reported their IBD affected them emotionally and were concerned about their illness. Conclusion Parents had greater concerns than their children regarding transition. Since moving to the adults services the adolescents attending can express their concerns and will independently contact the service. The service needs to consider providing more information about the topics requested and support in infusion services. The introduction to the IBD service of the patient information booklet, dedicated adolescent clinics, pre attendance MDT introduction meetings helped create a positive experience for the adolescents and parents. The MDT model of transition may help facilitate an individualised intervention pathway to address concerns and improve outcomes for this group.

9

Lingum,NavenaR., Lisa Guttman Sokoloff, James Chau, Sid Feldman, Shaen Gingrich, CindyJ.Grief, RaquelM.Meyer, et al. "ECHO Care of the Elderly: Innovative Learning to Build Capacity in Long-term Care." Canadian Geriatrics Journal 24, no.1 (February18, 2021): 36–43. http://dx.doi.org/10.5770/cgj.24.458.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background Older adults are entering long-term care (LTC) homes with more complex care needs than in previous decades, resulting in demands on point-of-care staff to provide additional and specialty services. This study evaluated whether Project ECHO® (Extension for Community Healthcare Outcomes) Care of the Elderly Long-Term Care (COE-LTC)—a case-based online education program—is an effective capacity-building program among interprofessional health-care teams caring for LTC residents. Methods A mixed-method, pre-and-post study comprised of satisfaction, knowledge, and self-efficacy surveys and exploration of experience via semi-structured interviews. Participants were interprofessional health-care providers from LTC homes across Ontario. Results From January–March 2019, 69 providers, nurses/nurse practitioners (42.0%), administrators (26.1%), physicians (24.6%), and allied health professionals (7.3%) participated in 10 weekly, 60-minute online sessions. Overall, weekly session and post-ECHO satisfaction were high across all domains. Both knowledge scores and self-efficacy ratings increased post-ECHO, 3.9% (p = .02) and 9.7 points (p < .001), respectively. Interview findings highlighted participants’ appreciation of access to specialists, recognition of educational needs specific to LTC, and reduction of professional isolation. Conclusion We demonstrated that ECHO COE-LTC can be a successful capacity-building educational model for interprofessional health-care providers in LTC, and may alleviate pressures on the health system in delivering care for residents.

10

Wakeman,R., R.Ainley, I.D.Arnott, K.J.Barrett, G.Bell, S.Berry, G.Bhatnagar, et al. "P129 IBD care in the UK: A comprehensive, novel service assessment with feedback from 10,222 patients and 166 NHS organisations to inform a vision for quality improvement." Journal of Crohn's and Colitis 15, Supplement_1 (May1, 2021): S220—S221. http://dx.doi.org/10.1093/ecco-jcc/jjab076.256.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background The IBD Benchmarking Tool, comprising an online Service Self-Assessment and Patient Survey, has provided a unique and comprehensive picture of Inflammatory Bowel Disease (IBD) care across the UK. The aim was to evaluate current local service performance to facilitate future quality improvement. Methods The IBD Patient Survey (PS) ran from July to November 2019 and the Service Self-Assessment (SSA) from October 2019 to January 2020. Detailed views were collected of the quality of IBD care from patient and clinician perspectives, measured against the UK IBD Standards 2019.1 The IBD UK National Report will be published in April 2021. Results 10,222 patients completed the PS. 89% (9,100/10,222) had found it hard to cope with having Crohn’s or Colitis over the previous year. 72% (6,954/9,640) rated the quality of their care as excellent, very good or good and 28% (2,686/9,640) rated the quality of their care as fair or poor. The top three factors that predicted how highly people with IBD rated their quality of care were: feeling supported by a team of specialists; having regular reviews; and discussing wider life goals and priorities, as part of planning their care. 26% (535/2,089) had waited more than a year for their diagnosis. 41% (849/2,087) had visited Accident & Emergency at least once before being diagnosed. 32% (656/2,057) were not offered any information about their condition when diagnosed. 91% (8,284/9,099) did not have a personalised care plan. Over the previous 12 months, 70% (6,732/9,574) had one or more flares and 72% (1,622/2,250) of inpatient admissions were unplanned. A key finding from the SSA (166 centres: 134 adult, 32 paediatric) was that no adult IBD services reported meeting the IBD Standards’ recommendation for whole time equivalent (WTE) staffing across the IBD team. Where services reported meeting the WTE for IBD nurse specialists, patients were more likely to rate the quality of their care highly and to have regular clinical review of their Crohn’s or Colitis. Conclusion The results highlight four key areas for change: improvements in diagnosis and information provision; personalised care and support for self-management; faster access to specialist advice and treatment; and effective multidisciplinary team (MDT) working. The Report sets out recommendations for action in each of these areas. To our knowledge, this is the first time that healthcare professionals and patients have assessed care against a common set of standards. The IBD Benchmarking Tool provides location-matched service performance and patient experience as an exemplar for others to follow. Reference

11

Raman,K.P., A.Agorogianni, A.Hadjinicolaou, A.Nightingale, A.Mayhew, R.Munro, T.Raine, and E.McDermott. "P432 MyChart application in addressing Inflammatory Bowel Disease patients’ concerns and impact on service utilisation." Journal of Crohn's and Colitis 15, Supplement_1 (May1, 2021): S434—S435. http://dx.doi.org/10.1093/ecco-jcc/jjab076.556.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background MyChart is a novel electronic portal within the electronic patient record provider EPIC. IBD patients were asked to complete an electronic questionnaire via MyChart prior to their infliximab infusions. A threshold was set that any patient who recorded a severe disease activity score (Mayo &gt;/3, Harvey-Bradshaw Index (HBI) &gt;/8) or signalled a concern created an automatic message that was routed to our clinical nurse specialists. Methods Electronic notes of all IBD patients who received infliximab in the month of September 2020 were reviewed. Demographics, activity status of My Chart, type of concerns raised and outcomes, number of inpatient admissions and outpatient appointments pre- and post- the introduction of the online questionnaire were recorded. Clinical remission was defined as Mayo score of &lt;3 or HBI score of &lt;5. Statistical comparisons were performed in GraphPad Prism software using the exact Fisher’s test and student t-test accordingly. Values were deemed significant if p&lt;0.05. Results 140 IBD patients on infliximab were identified; 2 were excluded due to incomplete data. The cohort comprised of 77 males (55.8%) with mean age of 27 years (SD of 15.1).110 (78.70%) patients had a diagnosis of Crohn’s disease whereas 24 (17.0%) had ulcerative colitis and 4 (2.8%) unspecified type IBD. 104 (75.1%) patients were active on MyChart and 83 (58.9% of total; n=138) completed the infliximab questionnaire. Significantly fewer of the patients active on MyChart required scheduled outpatient reviews when compared to those that were inactive (59.6% vs 94.1%; p=0.0001; Table 1). There were no significant differences in terms of demographics, IBD type or clinical remission between the two groups. Strikingly, patients who did not fill in the questionnaire were significantly more likely to have scheduled outpatient review in comparison to those that filled it (83.6% vs 67.4%; p=0.047) despite a higher proportion of the first being in clinical remission at baseline (86.6% vs 67.4%; p=0.047). Furthermore, we evaluated the impact of introducing the online questionnaire by looking at the outpatient reviews and inpatient admissions before and after patients filled it in. The group was significantly less likely to require outpatient reviews (67.5% vs 87.3%; p=0.0061) or inpatient admissions (6.0% vs 17.5%; p=0.03) following introduction of the online questionnaire (Figure 1). Conclusion Overall, patients active on MyChart seemed to be significantly less likely to require outpatient review. This impact seemed particularly evident after filling in an online questionnaire which effectively addressed patient concerns and prevented unwarranted outpatient reviews and inpatient admissions.

12

Dibley,L., K.Kemp, J.Duncan, I.Mason, and Y.Lisa. "N04 Being an IBD Clinical Nurse Specialist in the UK National Health Service: Challenges, Stressors and Coping Mechanisms." Journal of Crohn's and Colitis 15, Supplement_1 (May1, 2021): S609—S610. http://dx.doi.org/10.1093/ecco-jcc/jjab074.818.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Inflammatory Bowel Disease Clinical Nurse Specialists (IBD-CNSs) provide essential therapeutic and emotional support services to patients with often complex disease. The ever-increasing role expectations, treatment modalities and rising patient population places significant demands on IBD-CNSs (Stansfield, 2019), many of whom enter the role soon after qualifying. Posts in the UK-based RCN IBD Nurse Facebook© page suggest stress is high amongst members. Sustaining IBD-CNSs wellbeing is essential for ensuring sustainability of services. Our aim was to explore experiences of being an IBD-CNS in the UK, in order to inform the wider dialogue around workforce and the wellbeing of specialist nurses. Methods This hermeneutic phenomenological study used purposive sampling with maximum variation to recruit Band 6–8 IBD-CNSs who currently, or until recently, worked in NHS Trusts across the UK. Data were collected between July and September 2020, via online or telephone interviews. Focussing on personal perceptions, participants were invited to ‘Tell me what it means to be an IBD-CNS’ with follow-up prompts and probes as needed. Diekelmann et al’s (1989) team analysis method was used. Results Twenty-five IBD-CNSs participated [92% Female; Band 6 (n=3), Band 7 (n=10), Band 8 (n=13); 0.5–19 (mean 5.8) years in post; ex-NHS (n=4)]. Two constitutive patterns: ‘Giving and receiving support’, and ‘Developing potential’ were revealed, informed by relational themes addressing patients’ needs, service design/delivery challenges, workload, professional development opportunities, and peer support. Junior IBD-CNSs worried more about workload and learning the role, whilst senior nurses often struggled with the shift towards management responsibilities which they were expected to take on often without any managerial skills or training. The IBD-CNS role was often poorly understood by senior service managers, whose level of support varied widely. Some participants had techniques to mitigate against stressors, but there were also limited professional development opportunities especially in senior roles. Conclusion IBD-CNSs are committed to patients, despite an often-burdensome workload. Structural, institutional, and hierarchical issues undermine confidence. Many IBD-CNSs are stressed by mixed messages of delivering an excellent service yet being criticised/under-appreciated by the system. Robust senior support structures lead to better experiences for IBD-CNSs. This work contributes to the UK and global data evidencing the need to pursue strategies which promote wellbeing of all specialist nurses.

13

Badmatsyrenov, Timur, Fedor Khandarov, and Alexander Tsydenov. "«Third Space», «Echo-Cameras» and Online-Communities: Reproduction of Political Ideologies in Social Media." Political Science (RU), no.1 (2021): 183–204. http://dx.doi.org/10.31249/poln/2021.01.08.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The study of the features of the reproduction of political ideologies in social networks and the formation of user communities united by adherence to some political ideas is an urgent problem of contemporary political science. Social media has become an agent for the development of new forms of political activity, providing unprecedented opportunities for transferring and exchanging information, broadcasting political ideas, and involving people in virtual and real communities. Today, social media have become not just a means of transmitting information and a form of entertainment, but a special global form of social political interaction, increasingly penetrating into the most diverse aspects of society. In political interactions, the online services of new media can be described as a “third space”, a development of Ray Oldenburg's concept, in which he singles out a part of the social space not related to housing (“first place”) and work (“second place”). Online communities on social networks have become a mixed form of institutionalized political and informal non-political interactions, as exemplified by ideologically based social media groups. The transformations caused by the rapid development of the Internet and “new social media” are giving rise to a fundamentally new reality of social interaction, which combines two contradictory trends. On the one hand, the Internet and social media have expanded people's access to information and significantly increased the field of social interaction and communication, thereby creating the basis for uniting users on various grounds, including political and ideological views. On the other hand, such changes led to a crisis of trust between the participants. Users belonging to different political ideologies form stable “echo chambers” in their Internet environment, rigidly filtering the information they receive, locking themselves in and reproducing the attributes of only their political ideology and not allowing outsiders there. In our opinion, this requires a study that provides for a close study of ideological “echo chambers”, which seems necessary for understanding the processes of political communication and ways of reproducing political and ideological views in the online sphere.

14

Kemp,K., P.Avery, R.Bryant, A.Cross, K.Danter, A.Kneebone, D.Morris, A.Walker, L.Whitley, and L.Dibley. "N13 Clinical service delivery implications of the Covid-19 pandemic on people with inflammatory bowel disease: a qualitative study." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i622—i623. http://dx.doi.org/10.1093/ecco-jcc/jjab232.855.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background As part of a qualitative study exploring the experiences of IBD patients during three UK lockdowns, we identified specific clinical service implications of the pandemic on IBD care. Methods Participants aged 18 years+ with a confirmed diagnosis of Crohn’s disease, Ulcerative Colitis or IBD-Unclassified, who had shielded or not during any lockdown period were recruited from Crohn’s and Colitis UK. Semi-structured online or phone interviews (captured February-May 2021) were audio-recorded, transcribed professionally, and analysed using thematic analysis. Results Forty-three people took part; median age 38 years (19–63 years); 27 (62.7%) females; diagnosed with Crohn’s Colitis (n=2), Crohn’s disease (n=21), Ulcerative colitis (n=18) and IBD-Unclassified (n=2). Median disease duration 13 years (0.6–36 years). Four clinically focussed themes emerged: The Risk of Attending Hospital; Missing Routine Monitoring; Accessing Care as Needed and Remote Access and The Future. The Risk of Attending Hospital Against the prevailing media messages to avoid going to hospital, staying at home to avoid burdening the healthcare system and the rising numbers of Covid patients in hospitals, participants felt anxious about the dilemma of needing treatment for their IBD but putting themselves at risk to receive it. Missing Routine Monitoring Routine appointments and monitoring, which participants relied on for ‘keeping on top of’ their condition, stopped for some. Many could not access their IBD team or GP services at all, so routine blood tests for therapeutic levels were missed; in some cases, disease activity increased. Accessing Care as Needed Many were able to get clinical help as needed, even if the method of contact, and source of help, was different to usual. For others, the pandemic had caused considerable delay in getting diagnosed, and they felt overwhelmed and unsupported. Most understood the disruption to services due to staff redeployment, but some coped with the changes better than others. Remote Access and The Future the shifting focus away from face to face and towards remote appointments received mixed opinions. Many were happy with remote (phone, email) contact during the pandemic, out of necessity, but there were concerns from others that this would become normal in the future. It was suggested that first appointments should always be face to face. Conclusion Maintenance of IBD services in some form is essential throughout crisis periods; newly diagnosed patients needed additional support; dependence on IBD services could be reduced in the future through use of treatment/self-management plans. Mode of appointment needs to suit the patient.

15

Moore,E., S.Wolloff, T.Glanville, and C.P.Selinger. "P611 Provision of care for pregnant women with IBD in the UK - the current landscape." Journal of Crohn's and Colitis 14, Supplement_1 (January 2020): S509—S510. http://dx.doi.org/10.1093/ecco-jcc/jjz203.739.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background inflammatory bowel disease (IBD) results in increased rates of negative pregnancy outcomes; particularly in poorly controlled disease. We aimed to describe the current landscape of provision of antenatal care for women with IBD in the UK. Methods This cross-sectional study collected data on service set-up, on principles of care pre, during, and after pregnancy and on perceived responsibilities of clinicians. An online survey was distributed to all gastroenterology units in the UK. Results Data were provided for 97 of 273 IBD units. Pre-pregnancy counselling was not available in 7%, offered routinely (39%), or on request (54%) but predominantly (91%) in an ad-hoc fashion rather than in a dedicated set-up. Ninety-two per cent of units provided a nominated gastroenterology consultant during pregnancy. In 86% of this was the patient’s usual consultant rather than a consultant with expertise in pregnancy (14%). Combined clinics with obstetricians and gastroenterologists were offered in 14% of units only, but more often in academic rather than district hospitals (24% vs. 7%; p = 0.043) Otherwise, communication with obstetrics was ‘as and when required’ in 51% of cases. Patients were reviewed either every trimester (55%), monthly (15%) or ‘only when required’ (30%). The majority of respondents thought gastroenterologists should be involved in decisions regarding routine vaccinations (70%), breastfeeding (80%), folic acid dosage (61%), and VTE prophylaxis (53%). Sixty-five per cent of participants thought that gastroenterologists should be involved in decision-making regarding the delivery method. Regarding IBD indications for elective caesarean section, 94% of participants recommended these for active peri-anal disease, 30% for previous but healed peri-anal disease, 56% for ileo-anal pouch and 20% for previous abdominal and/or pelvic surgery. Conclusion In a nationwide survey on the provision of antenatal IBD care we found considerable variation in all aspects of service provision, particularly the availability of expertise and specialist services. We have detected areas of poor care (review only when required, communication ad-hoc only, poor provision of dedicated pre-pregnancy counselling). A significant minority of IBD units also felt that they do not need to provide input into areas such as VTE prophylaxis, delivery method and folic acid dosing. IBD indications for caesarean section seem to be poorly understood by a sizable minority. A basic framework to inform service set-up, and better education on the available clinical guidance for clinicians, is required to ensure consistent identification and review of patients and high-quality care.

16

Radford,S., and G.Moran. "N07 Current practices of Ultrasound for assessment of Crohn’s Disease in the UK." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i620. http://dx.doi.org/10.1093/ecco-jcc/jjab232.849.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Data from the METRIC trial (PMID:29914843) has shown that small bowel ultrasound (US) has very good diagnostic accuracy for disease extent, presence and activity in Crohn’s Disease (CD), is well tolerated by patients and is cheaper when compared to MRI. However, Uptake of US in the UK is limited Methods We designed and conducted an online survey to assess the current usage of US throughout the UK. The survey was undertaken by BSG IBD group members between 9 June 2021 - 25 June 2021. Responses were anonymous, respondents were able to skip questions. Results 103 responses were included in the data analysis Responses came from 14 different regions of the UK, from 66 individual NHS trusts. 99.03% (n=103) respondents reported that they currently have an MRI service for Crohn’s disease, where only 30.1% (31) had access to US service. Numbers of MRIs per month was reported as an average of 15.14, with a range of 3–75. The average number of US undertaken was reported as 7.67 per month, with a range of 0–50. Average time for results to be reported for MRI scans was reported as between 4–6 weeks, with a range of 2 days to 28 weeks. The average time for an US to be reported was stated as 1–4 weeks, with a range of 0–8 weeks. 48.51% of respondents reported that they were ‘very confident’ when using MRI data to make clinical decisions. 25.24% were ‘extremely confident’, 22.33% were somewhat confident and 2.91% were not so confident. 11% of respondents stated they would be extremely confident in using US to make clinical decisions, 22% stated they would be very confident, 27% somewhat confident, 20% not so confident and 20% not at all confident. Of those respondents who did not have access to an US service, 92.31% (72) stated that they would be interested in developing an US service. Conclusion There is an appetite for the uptake of US in the UK for assessment of CD, however there remains a significant number of UK centres with little or no access to an US service. There is a difference in the levels of confidence that clinicians have in using US as a diagnostic tool in the UK. Further research is necessary to understand why this is the case. Results from this survey will go on to inform our future work in developing an implementation package for US in the UK in the NHS.

17

Fazio, Sam. "Project VITAL: A Statewide Initiative Using Technology to Impact Social Isolation." Innovation in Aging 5, Supplement_1 (December1, 2021): 136–37. http://dx.doi.org/10.1093/geroni/igab046.529.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Project VITAL leverages customized technology to enhance connection, engagement, education and support to individuals with dementia and their caregivers. The goal was to positively impact social isolation, stress, and well-being and help mitigate the effects of isolation experienced during the pandemic and beyond. Phase One included three components designed to impact connection, engagement, education and support. It’s Never Too Late provided 300 customized tablets to 150 care communities to facilitate connections to family members and increase individualized, person-centered engagement. Project ECHO, a video-based learning platform, educated and supported care community staff. Virtual education and support were offered to family caregivers at home. Phase Two provided the program to an additional 150 care communities and added online professional training/certification. Phase Three focuses on 150 family caregivers and individuals with dementia living at home. In addition to connection and individualized engagement, family caregivers now had direct access to virtual programs and services.

18

Mustonen,A., S.Asikainen, L.L.Hermansson, and A.Jussila. "P161 Implementation of Outcome Measurement – Case Finnish IBD register." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i235—i236. http://dx.doi.org/10.1093/ecco-jcc/jjab232.289.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Inflammatory bowel diseases (IBD) are becoming increasingly common. In Finland, during 2020, in total of 54 000 patients were diagnosed with IBD, and over 2000 new diagnoses are made every year. The Finnish university hospitals in collaboration with BCB Medical Ltd have built disease-specific registers to support and monitor the quality and effectiveness of health care. The IBD register (IBDR) collects data on the effectiveness of IBD treatments and their follow-up, where e.g. disease severity, treatment and outcomes are profoundly monitored. As combination, IBDR, MyHealth service, and IBD Symptom Diary enables patients’ health, functional status, experience and QoL monitoring to reach the health care goals. The service supports patient treatment pathway and makes designing more personalized treatments for IBD possible. Methods The IBDR is a web-based system integrated with electronic health record (EHR) systems, through which patient data is captured. Nationally convergent register allows for peer review of treatment outcomes. To complement registers’ clinical data, PROMs are collected with online MyHealth service to enable automatic, recurring data collection directly from the patient. The first questionnaire is activated 14 days before the visit, whereas new questionnaire is sent to the patient two months after visit, and then at time points according to the disease activity index calculated from the questionnaire. The disease activity is reflecting the severity of the IBD symptoms[1]. Captured measures are immediately available for clinician review. Results MyHealth for IBD is actively used in four Finnish university hospitals and two central hospitals with some inter-regional variation. By November 2021, the questionnaires were answered 31 506 times since the beginning of the implementation in 2019. The response rate is yearly increasing (Figure 1). Distribution of disease activity index among IBD patients in Tampere University Hospital is shown in Figure 2. Conclusion IBDR enables the evaluation and comparison of patient care quality, which is not accessible through EHR systems alone. Our electronic data collection model brings out the patients’ voice and saves resources since cyclic questionnaires are automatically send to patients, and answers are immediately reached by clinician. In future, international comparison and monitoring of treatment outcomes will be emphasized. As MyHealth deployment proceeds across hospitals, the availability of the patient reported outcomes data will increase. International research and peer development will continue to be an essential part of our activities. Reference 1. Puolanne A-M et al. Dig Dis Sci (2017) 62:3123–3130.

19

Creemers,R., D.vanderHorst, I.Raats, M.Romberg-Camps, M.Scherpenzeel, and A.vanBodegraven. "P650 IBD care from the patient perspective: The patient’s turn." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i565. http://dx.doi.org/10.1093/ecco-jcc/jjab232.772.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background There is an increased focus on patient reported outcomes and patient reported experiences as means to optimize provided care. Both are considered essential in improving quality and service. Zuyderland Medical Centre (ZMC) is transforming its inflammatory bowel disease (IBD) care into a patient oriented IBD Centre (PGC IBD) as a way to provide modern patient centred care. The project ‘Patient aan zet’ is an initiative of Crohn & Colitis NL (CCNL) and takes place in several hospitals. The aim of the project is to optimize quality of care for adult patients with IBD by ensuring that the patient is properly and unambiguously informed and the patients involvement increases in treatment. Methods A cross-sectional survey using a questionnaire was performed to map out expectations and experiences of patients with the IBD outpatient clinic of ZMC. This questionnaire (part of the project ‘Patient aan zet’) was developed by CCNL as an online self-completion instrument. The results of this questionnaire were assessed in a subsequent discussion group. All IBD-patients presenting for an outpatient appointment at ZMC in March 2021, received an e-mail with a link to the questionnaire. In total, 500 e-mails were sent. After completing the questionnaire, patients were given the opportunity to sign up for a discussion group. Results In total, 198 participants completed the questionnaire fully or partially (40%) (Table 1). We found patients were satisfied with health care in general and with the information supply concerning IBD specifically. Use of the online monitoring tool MyIBDCoach and response time in the online monitoring tool contributed to positive judgment. In the discussion group emerged that continued attention must be paid to the impact of endoscopic procedures from the patient perspective as endoscopic procedures (as part of the mucosal healing concept) may induce lasting and major impact on patients disease experience. In line with the ongoing corona pandemic developments, patient prefer a combination of check-up appointments by phone and at the outpatient clinic depending on (burden of) disease activity. Finally, specific attention is necessary for patients with a longstanding disease history. Needs concerning dietary advice and psychosocial support appear to vary over time. Conclusion ZMC is transforming its IBD care into a PGC IBD as a way to provide optimal and patient centred care. Involving patient in this process has given direction to optimizing patient information and patient involvement. The experiences gained from this process will be used to evaluate the PGC IBD after implementation and, together with the patient association, to develop a PREM that can be used to optimize IBD care.

20

Costantino,A., F.Caprioli, M.Vecchi, D.Stocco, M.Aloi, A.Armuzzi, F.Ficari, et al. "P527 Telemedicine in IBD patients: results of a national survey of the Italian IBD patients’ association (AMICI Onlus)." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i481. http://dx.doi.org/10.1093/ecco-jcc/jjab232.654.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Telemedicine is one of the major changes that clinicians have encountered over the past decade; in particular during the COVID-19 pandemic, televisits were rapidly implemented to guarantee patients’ assistance, with the intention of Health Care Providers (HCPs) to continue to use them beyond the pandemic. The aim of our national survey was to evaluate the current usage of telemedicine for IBD patients from their perspective, investigating patients’ impressions about telemedicine and factors affecting them through a Machine Learning (ML) analysis. Methods In March 2021, the Italian IBD patients’ association (AMICI Onlus) distributed to their members - through its mailing list and on social media platforms - an anonymous online questionnaire investigating the use of telemedicine. Socio-demographic and IBD characteristics were collected; the usage, patients’ satisfaction and trust of telemedicine were assessed through Likert scales. ML tools - Decision Trees (DT) and Random Forest (RF) - were applied to identify the determinants of patient’s perceptions about telemedicine; the produced RF ranking displays two indicators: %IncMSE and IncNodePurity. Results Nine hundred and seventy-eight IBD patients (women 58.9%) from every Italian region completed the questionnaire. Among the respondents, 87 (8.9%) personally had a telemedicine experience; 153 reported that their Centre performed a telemedicine service during the COVID-19 pandemic (24.2% televisits, 39.2% e-mails, 24.8% phone-calls, 3.9 % dedicated website, 7.9% others). Overall, 707 (72.3%) would trust a telemedicine service, 760 (77.7%) would like to have it also with another HCP (e.g., nutritionist, psychologist) and 778/961 (81%) would like to use telemedicine in the future (17 did not answer to this specific question); 792 (81%) stated they thought useful to have the possibility to use telemedicine and 847 (86.6%) would like their Centre to offer them this facility. Considering this last question as the output at the DT, the variable which have been found to influence the most this patients’ willingness is patient’s perception of the usefulness of telemedicine in treating their disease, since it represented the root of the tree explaining the results. The RF rankings confirmed that this variable influenced the most patients’ perception with the highest levels of %IncMSE and IncNodePurity(Figure 1). Conclusion The practice of telemedicine in the management of IBD patients has not been very relevant throughout Italy so far (less than 10%), but more than four every five respondents would like to use telemedicine. Machine learning analysis shows that the perceived usefulness of telemedicine service is the key point for patients who would like it was a part of usual clinical practice.

21

Iizawa,M., L.Hirose, A.Tairaka, and N.Maya. "N05 A Systematic Review of Self-Management Intervention Study for Patients with Inflammatory Bowel Disease." Journal of Crohn's and Colitis 15, Supplement_1 (May1, 2021): S610. http://dx.doi.org/10.1093/ecco-jcc/jjab074.819.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Patients with inflammatory bowel disease (IBD) have to deal with abdominal symptoms for a long time because the disease often develops at a young age, and radical treatment has not been established. To prevent worsening of symptoms associated with IBD and delay the progression of the disease, and lead a better daily life, patients must self-manage in their daily lives. At this moment, it is not clear which kinds of self-management are effective for IBD patients. Therefore, we conducted a systematic literature review (SLR) to clarify the present status and efficacy of self-management for IBD patients and find out the effective methods of self-management intervention. Methods The SLR was conducted in accordance with the methods recommended by the Cochrane Collaboration Handbook7, to reduce the risk of bias and errors. The searches were performed in Embase, Medline, and Cochrane databases. Additionally, the PsychInfo and the cumulative index of nursing and allied health literature (CINAHL) databases were searched, and relevant articles were included as other sources. Abstracts and full texts were screened to select relevant articles based on the inclusion criteria. A quality assessment was undertaken by using the Cochrane risk of bias tool checklist. Results Fifty studies met the inclusion criteria and were finally included in this review. In 31 studies, the overall population of IBD patients was included. Fourteen studies included only UC patients, 5 studies included only CD patients. Among 50 studies, 33 studies have statistically significant differences in the outcomes. We categorized the interventions and outcomes of all the studies based on Barlow’s study in 2002 and analyzed the efficacy of the intervention on the outcomes. The most common intervention was informational, subsequently management of psychological effects. The most common outcome was Inflammatory Bowel Disease Questionnaire (IBDQ). We found that psychological management and interventions related to problem-solving, goal setting, action plan, and coping skills had a positive effect on the body and psychology of IBD patients. There were six studies that investigated the effects of intervention by online medical care. Half of the online intervention showed an improvement in the use of medical services. Conclusion It is important for IBD patients and health care providers to work together to share the problem, followed by setting goals and decide on an action plan. To succeed in this process, multidisciplinary collaboration is necessary and continuous support by health care providers will be meaningful for IBD patients.

22

Cunha, Márcia Lima da, and Kalliza Kary Rodrigues da Costa. "Desafios da assistência de enfermagem no tratamento da COVID-19 em pacientes com uso da ECMO." Revista Recien - Revista Científica de Enfermagem 12, no.39 (September11, 2022): 87–97. http://dx.doi.org/10.24276/rrecien2022.12.39.87-97.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Descrever os principais desafios da assistência de enfermagem no tratamento da COVID-19 em pacientes com a terapia de circulação extracorpórea com oxigenador de membrana Ecmo. O Método utilizado foi de revisão integrativa da literatura. As buscas foram realizadas nas bases Literatura Latino-Americana e do Caribe em Ciências da Saúde, Medical Literature Analysis and Retrieval System Online, Cumulative Index to Nursing and Allied Health Literature e Scopus, usando descritores, resultando após análise dos critérios de inclusão e exclusão em 17 estudos. Os resultados indicaram que há um desprovimento de recursos hospitalares e profissionais capacitados para o uso da terapia ECMO em pacientes com COVID-19. O estudo concluiu que além da escassez de publicações sobre a referida temática, sendo fundamental aumentar a capacidade de instituições que ofereçam a terapia ECMO. É essencial investir em treinamentos e capacitar as equipes de enfermagem fornecendo um tratamento seguro e com qualidade na prestação de serviço. Descritores: Oxigenação por Membrana Extracorpórea ECMO, COVID-19, Assistência de Enfermagem. Challenges of nursing care in the treatment of COVID-19 in patients using ECMO Abstract: To describe the main challenges of nursing care in the treatment of COVID-19 in patients on cardiopulmonary bypass therapy with Ecmo membrane oxygenator. The method used was an integrative literature review. Searches were performed in Latin American and Caribbean Health Sciences Literature, Medical Literature Analysis and Retrieval System Online, Cumulative Index to Nursing and Allied Health Literature and Scopus, using descriptors, resulting after analysis of the inclusion and exclusion criteria in 17 studies. The results indicated that there is a lack of hospital resources and trained professionals for the use of ECMO therapy in patients with COVID-19. The study concluded that besides the scarcity of publications on the subject, it is essential to increase the capacity of institutions that offer ECMO therapy. It is essential to invest in training and capacitate the nursing teams providing a safe treatment and with quality service delivery. Descriptors: Extracorporeal Membrane Oxygenation, ECMO, COVID-19, Nursing Assistance. Retos de los cuidados de enfermería en el tratamiento del COVID-19 en pacientes que usan ECMO Resumen: Describir los principales retos de los cuidados de enfermería en el tratamiento de la COVID-19 en pacientes en terapia de bypass cardiopulmonar con oxigenador de membrana Ecmo. El método utilizado fue una revisión bibliográfica integradora. Las búsquedas se realizaron en Latin American and Caribbean Literature on Health Sciences, Medical Literature Analysis and Retrieval System Online, Cumulative Index to Nursing and Allied Health Literature y Scopus, utilizando descriptores, resultando tras el análisis de los criterios de inclusión y exclusión en 17 estudios. Los resultados indicaron que hay una falta de recursos hospitalarios y de profesionales formados para el uso de la terapia ECMO en pacientes con COVID-19. El estudio concluye que, además de la escasez de publicaciones sobre el tema, es esencial aumentar la capacidad de las instituciones que ofrecen la terapia ECMO. Es fundamental invertir en la formación y capacitación de los equipos de enfermería para que ofrezcan un tratamiento seguro y con una prestación de servicios de calidad. Descriptores: Oxigenación por Membrana Extracorpórea, ECMO, COVID-19, Cuidados de Enfermería.

23

Khan,F., W.Czuber-Dochan, and C.Norton. "N04 Knowledge, attitude and perception of inflammatory bowel disease patients towards colorectal cancer risk, its management and the role of healthcare providers: a cross-sectional study in the UK." Journal of Crohn's and Colitis 14, Supplement_1 (January 2020): S659. http://dx.doi.org/10.1093/ecco-jcc/jjz203.988.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Inflammatory bowel disease (IBD) increases the risk of colorectal cancer (CRC) and requires specialised cancer risk management. Although literature exists on general disease-related knowledge in IBD patients, limited studies have assessed IBD patients’ knowledge of CRC risk and its management. Consequently, patient perception of the role of a healthcare provider (HCP) in patient education of CRC risk and their attitude towards recommended risk management has not been assessed in UK IBD patients. Methods We conducted a cross-sectional online survey with IBD patients recruited via charity sources from April-July 2019. Adult patients (&gt;18 years) with a confirmed diagnosis of IBD for 2 years and adequate command of English language were included. A self-designed and piloted questionnaire with open and closed-ended questions was used. Closed-ended data were analysed using descriptive statistics and open-ended responses were analysed using content analysis. Fischer’s exact test and bivariate logistic regression were used to test for association between knowledge and patient demographics. Results 92 participants, including 52.5% CD and 67.5% females, responded. 88% knew that IBD increases CRC risk. The mean fear of CRC risk (0–10 visual analogue scale) was 6.37 (SD ± 2.8). One-fifth were aware of colonoscopy as the best screening tool; 88% were unaware of screening initiation time. 90% would agree to their doctor’s recommendation of colonoscopy to ensure early cancer diagnosis and treatment. For dysplasia with 10% risk of CRC, 46.7% would not agree to colectomy mainly due to 10% risk of CRC not being high enough to undergo surgery. Forty-eight per cent of participants said that they never had a discussion about increased CRC risk in IBD with their doctor. Almost two-thirds were not informed about the role of screening/surveillance in cancer. Two-thirds were satisfied with the information provided by their HCP. Overall, patients desired more information about their individualised cancer risk and services available for managing the increased risk. Conclusion IBD patients are well informed about IBD-associated CRC risk, feared this risk greatly but were poorly aware of screening initiation time. HCP’s role in cancer knowledge dissemination was sub-optimal and patients desired more knowledge. We need deeper understanding of patients’ educational needs related to CRC.

24

Edelman, Linda, Gail Towsley, and Timothy Farrell. "Going Virtual When The Doors Close: Addressing Geriatric Workforce Training Needs During A Pandemic." Innovation in Aging 5, Supplement_1 (December1, 2021): 106. http://dx.doi.org/10.1093/geroni/igab046.405.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract The focus of our Geriatric Workforce Enhancement Program (GWEP) is to enhance long-term services and support (LTSS) and primary care healthcare workforce capacity through interprofessional education (IPE) and to increase patient, family, and caregiver engagement. When it became evident that LTSS settings, schools, and communities were going to be adversely impacted by the COVID-19 pandemic for the unforeseeable future, our GWEP quickly pivoted to address new challenges and initiate technology to continue our programs. In this symposium, we describe four programs implemented or revised during the COVID-19 pandemic. We utilized CARES (Coronavirus Aid, Relief and Economic Security) funding to develop a 3-part Project ECHO on utilizing telehealth in LTSS settings. We pivoted quarterly Fireside Chats – community-based educational programs held at partnering LTSS settings for older adults and caregivers – to bi-weekly and now monthly webinars addressing topics relevant to COVID-19 and combatting social isolation. Because students could no longer attend an in-person IPE course introducing them to long-term care, we revised the course to be online with a partnering nursing home participating in an interactive mock care conference. Finally, a 2-semester undergraduate Honors College project-based course introducing students to successful aging utilized virtual activities to expose students to the challenges of hospice care during a pandemic. With these adaptations, as well as activities that advocated for, and supported, LTSS settings and older adults, our GWEP program was able to continue to provide education and support to the setting and individuals most impacted by COVID-19.

25

GilZaragozano,E., A.Wiskin, and J.Williams. "N10 The impact of an educational and networking event on nurses caring for Inflammatory Bowel Disease (IBD) paediatric patients receiving biologic therapy." Journal of Crohn's and Colitis 16, Supplement_1 (January1, 2022): i621. http://dx.doi.org/10.1093/ecco-jcc/jjab232.852.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Abstract Background Biologic therapies usage is increasing across the United Kingdom. Gastroenterology departments and all stakeholders need to continuously update their knowledge and practice to the safe use of this therapy (IBD Standards, 2013). Paediatric gastroenterology services in tertiary hospitals often cover a wide geographical region and deliver care in collaboration with district general hospitals closer to the child’s home. A virtual educational and networking event was developed in order to deliver interprofessional education (IPE) and facilitate networking for nurses caring for IBD paediatric patients receiving biologic therapy in two large regions of the United Kingdom (South West of England and South Wales). The aim of this study was to establish the level of self-reported competencies of nurses involved in the administration of biologic therapy in paediatric IBD patients and to evaluate the impact that the event had on the self-reported competency of the participants and their practice. Methods The event compromised a range of relevant topics and it was delivered by experts in the field in a virtual platform and using a range of participant interacting virtual tools. Participants were requested to complete an online questionnaire before and after the event. It was open to registered nurses working in paediatric community and/or day care settings, and caring for paediatric IBD patients receiving biologic therapy. Results There were 21 participants registered to attend the event that completed a pre –event questionnaire. 55% (11) of the participants had more than 5 years’ experience in post. 81% (17) reported no previous formal training on paediatric IBD and biologic therapy. 19.9% did not feel competent in the administration of biologic therapy and monitoring of the patient; and 28.6% did not feel competent to meet the holistic needs of the patient and their family. After the event, a total of 13 completed evaluations were received. All participants (13) reported feeling more competent in caring for paediatric IBD patients receiving biologic therapy and their families; and 84.7% felt more competent in administering and monitoring biologic therapy. All comments relating to the event were very positive and 10 participants could identify changes to make to their own clinical practice directly related from attending this event. Conclusion This study highlighted the need for IPE for nurses caring for paediatric IBD patients, particularly where care is delivered in district general hospitals. Feedback demonstrated that virtual educational events are effective in raising self-reported nursing competencies and in ensuring high standards of practice related to biologic therapy.

26

MSc, Ana Rushiti. "THE ROLE OF TECHNOLOGY IN PREVENTING AND FIGHTING ORGANIZED CRIME, FINANCIAL CRIMES AND CORRUPTION." IJRDO - Journal of Social Science and Humanities Research 7, no.6 (July4, 2022): 57–68. http://dx.doi.org/10.53555/sshr.v7i6.5179.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Albania is a country where very little has been said about intellectual and industrial property. The chosen topic is a necessary topic to be addressed as intellectual property is in great need of experts in this important field. Many certain individuals make works like in music, in various arts, poetry, various scientific articles, the production of a trademark in the market, but they do not know their rights and obligations arising from intellectual property. In this paper it is important treatment of the albanian legal framework versus the european legal framework related to intellectual property. The study of European Union directives and international court decisions is very important as it helps us make the necessary changes in the law by applying the principle of proportionality. It is also important in case of copyright infringement to have legal protection. Legal protection can be done with a lawyer or self-defense. Legal protection is very important as it is a principle recognized by the European Convention on Human Rights (ECHR). We live in the digital age where every service is available online, but high technology has brought many problems ranging from the physical and psychological formation of the child to the copyright infringement. This is a global issue and many websites have tried to protect the rights of copyright or inventor. Dealing with cases in a practical way would make the work more interesting, but also more practical. I have participated in conferences such as the NATO Model Conference, National and International Student Conferences and I have also conducted training in the field of legal protection of authors & inventors. In the trainings I participated in I received an important message was "Motivation is the important weapon of success".

27

Klein, Charles Howard. "Opening up the Echo Chamber." Journal 7, no.1 (September4, 2017). http://dx.doi.org/10.22582/ta.v7i1.466.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In recent years, political discussion and social life are increasingly concentrating in face-to-face and online echo chambers composed of individuals with similar world views. This segmentation of civil society has stymied in-depth and respectful communication across ideological difference and in the process contributed to the divisiveness that characterizes political discourse across the globe. In this article, I examine how anthropological learning and teaching can help open up these echo chambers and promote cultural empathy and cross-ideological communication. My discussion focuses on three methodologies I use in my undergraduate-level Culture, Health and Healing course – weekly critical analyses on contemporary health issues, an in-class illness narrative exercise, and a term-long public service announcement project. For each, I describe the pedagogy, present examples of how the assignment or activity plays out in the classroom, and consider how these pedagogies work toward increasing cross-cultural/ideological understanding and communication. I argue that through unsettling students’ default frameworks for thinking, reflexive and emotionally engaged anthropological teaching and learning can play important roles in laying the epistemological, affective, and ethical foundations for future professionals and engaged community members in today’s contentious times.

28

Stephens, David, Thomas Weiser, Jorge Mera, Tom Becker, Whitney Essex, Harry Brown, Eric Vinson, Megan Woodbury, Brigg Reilley, and Jessica Leston. "Adapting a Telehealth Network for Emergency COVID-19 Pandemic Response, 2020-2021." Public Health Reports, October5, 2022, 003335492211235. http://dx.doi.org/10.1177/00333549221123567.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

In March 2020, a tribal telehealth program—the Indian Country Extension for Community Health Outcomes (ECHO)—added emergency COVID-19 to its programming to support the pandemic response. A long-standing relationship with a network of Indian Health Service, tribal, and urban Indian clinicians supported a rapid launch of the COVID-19 telehealth program. This nationwide service offered primary care clinicians and staff serving American Indian/Alaska Native people access to virtual learning opportunities, expert clinical recommendations, technical assistance, and capacity building. From March 12, 2020, through April 30, 2021, the program provided 85 clinical sessions in 12 months, with an average participation of 120 attendees per clinic (N = 11 710). Attendees could complete a voluntary evaluation form for each session via an online link. A total of 2595 forms were completed. Attendees came from 33 states and 206 unique locations, primarily from the Pacific Northwest (n = 931, 35.9%). Most pharmacists (78.1%), providers (ie, medical doctor, doctor of osteopathy, advanced practice nurse, physician assistant, or clinical nurse midwife; 70.8%), and nurses (59.6%) gave the sessions the highest rating of “very satisfied.” The highest proportion of attendees indicating that they planned a change in practice were pharmacists (68.0%), nurses, (64.1%), and providers (61.3%). Most attendees (93.1%) said that the COVID-19 sessions gave them a sense of social support. Lessons learned were that (1) a telehealth platform can be quickly retasked for emergency response with no further delays, (2) a telehealth network can be scaled up quickly with participation from preexisting relationships, and (3) the platform is flexible and adaptable to the needs of participants. An existing telehealth program can be a key part of timely, relevant, large-scale emergency readiness and response efforts.

29

Bonniface, Leesa, Lelia Green, and Maurice Swanson. "Affect and an Effective Online Therapeutic Community." M/C Journal 8, no.6 (December1, 2005). http://dx.doi.org/10.5204/mcj.2448.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Affect theory is generally associated with the lifetime’s work of Silvan S. Tomkins, whose four volume work, Affect, Imagery, Consciousness, was published between 1962-92. The volumes argue that humans are subject to a range of innate affects: two positive (interest/excitement; enjoyment/joy), one neutral (surprise/startle) and six negative (distress/anguish; fear/terror; anger/rage; shame/humiliation; dissmell [reaction to a bad smell]; disgust). In a crude “advanced search” using Google, affect is related to emotion in 3,620,000 Web references; to intellect in 1,530,000 instances; and to both intellect and emotion in 1,670,000 cases (Google). Affect may consequently be constructed as a common but complicated response which cannot be simply elided with either emotion or intellect but which involves the integration of both. In particular, affect is generally constructed as a human response to a precipitating stimulus (be it an idea, a physical event, etc). If this is accepted, then Tomkins’s Affect theory might imply that the innate affects only reach conscious awareness as a result of a change in circumstance (e.g., idea or event) which requires a response. The importance of affect as a motivator for action has long been put to good use by advertising and marketing professionals who recognised early in their professions’ development that it is the ESP (emotional selling proposition) that delivers more punch, more quickly, than rational argument. An organisation’s (or individual’s) unique selling point can be rational or emotional, but it is easier for many people marketing a product or service to craft a perceived (unique) difference using emotion rather than logical rationality. For example, Coke and Pepsi are generally constructed as fighting their turf wars based on their emotional appeals, rather than any logical difference between the brands. This paper deals with the use of affect to craft an online therapeutic Website (HeartNET) as a joint ARC-Linkage research project between the National Heart Foundation of Australia (WA Division) and Edith Cowan University’s School of Communications and Multimedia. The research originally started with the idea that heart patients would appreciate the opportunity to communicate online with people going through similar experiences, and that this might create a virtual community of mutually supportive recovering participants. The reality held a few surprises along the way, as we discuss below. HeartNET has been designed to: 1) reduce the disadvantage experienced by people in regional and remote areas; 2) aid the secondary prevention of heart disease in Australia; and, 3) investigate whether increased interaction with an organisation-sponsored affective environment (e.g., the Website) impacts upon perceptions of the organisation. (This might have long-term implications for the financial viability of charitable organisations). In brief, the purpose of the research is to understand the meanings that Web-participants might generate in terms of affective responses to the notion of a shared HeartNET community, and investigate whether these meanings are linked to lifestyle change and responses to the host charity. Ultimately the study aims to determine whether the Website can add value to the participants’ communication and support strategies. The study is still ongoing and has another 18 months to run. Some early results, however, indicate that we need more than a Website and a common life experience to build an affective relationship with others online. The added extra might be what makes the difference between interaction and affective interaction: this needs conscious strategies to generate involvement, aided by the construction of a dynamic (and evolving) Web environment. In short, one stimulus is not enough to generate persistent affective response; the environment has to sustain multiple, evolving and complex stimuli. Online support groups are proliferating because they are satisfying unmet needs and offering an alternative to face-to-face support programs (Madara). Social support also combines some elements of affective community, namely belongingness, intimacy and reciprocity. These community elements can be observed through three levels or layers of social support: 1) belongingness or a sense of integration, 2) bonding which is somewhat more personal and involves linkages between people, and, 3) binding whereby a sense of responsibility for others is experienced and expressed (Lin). Here, social support may prompt an affective response and provide a useful measure of community because it incorporates other elements. Initial Design The project was initially designed to build “an affective interactive space” in the belief that an effective online community might develop thereafter. However, the first stumbling block came in terms of recruiting participants: this took almost nine-months longer than anticipated (even once Ethics approval had been granted). Partly this was due to a specific focus on recruiting people born between 1946–64 (“baby boomers”), partly it was due to the requirement that participants had access to the Web, and partly it was because we sought to specifically recruit non-metropolitan Western Australians who had suffered a health-challenging heart-related episode. We were hoping to identify at least 80 such people, to allow for a control group in addition to the people invited to join the online community. Stage 1 was to be the analysis of the functioning of the online community; Stage 2 would take the form of interviews of both community members and the control group. One aspect of the research was to determine whether online participants perceived themselves as belonging to an online community (as opposed to “interacting on a Website”) and whether this community was constructed as therapeutic, or in other ways beneficial. Once the requisite number of people had been recruited, the Website went “live”. Usage was extremely hesitant, and this was the case even though more people were added to the Website than originally planned. (In the end we had to rely upon the help of cardiologists publicising the research among their heart patients. This had a continuing trickle effect that meant that the Website ultimately had 68 people who agreed to participate, of whom 15 never logged in. Of the remaining 53 participants, 31 logged in but never posted anything. Of the 22 people who posted, 17 made between one and four contributions. The remaining five people posted five or more times, and included the researcher and an experienced facilitator, Sven (name changed), who was serving in a “professionally-supportive” role (as well as a recovering heart patient himself). This was hardly the vibrant, affectively-supportive environment for which we had been planning. Even with the key researcher-moderator calling people individually and talking them through the mechanics of how to post, the interactions fell away and eventually ceased, more or less, altogether after 11 weeks. One of the particularly distressing implications of the lack of interaction was the degree of self-revelation that some participants had offered when first logging onto the site. New members, for example, were encouraged to “share their heart story”. Susan’s (name changed) is an example of how open these could be: I had a heart attack in February 2004. This came as a huge shock. I didn’t have any of the usual risk factors. Although my father has Coronary Vascular Disease, he didn’t have any symptoms until his mid 60s and never had a heart attack. I had angioplasty and a stent. I accept I will be taking medication for the rest of my life. I’m fine physically but am having treatment for depression, which was diagnosed 6 months after my heart attack. In normal social situations an affective revelation such as “I’m fine physically but am having treatment for depression” would elicit a sympathetic response. In fact, such “stories” did often get responses from active members (and always got a response from the researcher-moderator), but the original poster would often not log in again and would thus not receive the group’s feedback. In this case, it was particularly relevant that the poster should have learned that other site users were aware that some heart medication has depression as a common side effect and were urging Susan to ask her doctor whether this could be a factor in her case. A further problem was that there was no visible traffic on much of the Website. During the first 12 weeks, only seven of 155 posts were made to the discussion forums. Instead, participants tended to leave individual messages for each other in “private spaces” that had been designed as blogs, to allow people to keep online diaries (and where blog-visitors had the opportunity to post comments, feedback and encouragement). It was speculated that this pattern of invisible interaction was symptomatic of a generation that felt most comfortable with using the internet for e-mail, and were unfamiliar with discussion boards. (Privacy, ethics, research design and good practice meant that the only way that participants could contact each other was via the Website; they couldn’t use a private e-mail address.) The absence of visible interactive feedback was a disincentive to participation for even the most active posters and it was clear that, while some people felt able to reveal aspects of themselves and their heart condition online, they needed more that this opportunity to encourage them to return and participate further. Effectively, the research was in crisis. Crisis Measures After 10 weeks of the HeartNET interaction stalling, and then crashing, it was decided to do four things: write up what had been learned about what didn’t work (before the site was “polluted” by what we hoped would be the solution); redesign the Website to allow more ways to interact privately as well as publicly; throw it open to anyone who wished to join so that there was a more dynamic, developing momentum; use a “newbie” icon to indicate new network members joining in the previous seven days so that these people could be welcomed by existing members (who would also have an incentive to log in at least weekly). Five weeks into the revamped Website a number of things have become apparent. There is some “incidental traffic” apart from research-recruited participants and word-of-mouth, for example (Jane): “I discovered this site while surfing the net. I haven’t really sought much support since my heart attack which was nearly a year ago, but wish I had since it would have made those darker days a lot easier to get through.” An American heart patient has joined the community (Sam): “I have a lot to be positive about and feel grateful to have found this site full of caring people.” Further, some returnees, who had experienced the first iteration of the site, were warm with acknowledgement (Betty): “the site is taking off in leeps [sic] and bounds. You should all be so proud.” People are making consecutive postings, updating and developing their stories, revealing their need for support and recognising the help when they receive it. It is not hard to empathise with “Wonky” (name changed) who may not have family in whom s/he can confide: (Wonky, post 12, Wed) [I need] preventative surgery of this aorta [addressing a bi-cuspid aortic valve] before it has an aneurysm or dissects … and YES I AM SCARED … but trying to be brave cos at least now I know what is wrong with me and its kinda fixable … After being asked by interested members to update the community on his/her progress, Wonky makes the following posts: (Wonky, post 13, Wed) […] I am currently petrified … And anxiously waiting to see the cardio at 3 pm Thursday regarding the results of my aorta echo … and when they are going to decide I need lifesaving surgery … (Wonky, post 15, Fri) ok…so I am up to Friday morning and fasting for the CT scan of the dodgy aorta etc … this morning … why do I get hungry when I have to fast yet any other day I really have to force myself to remember to even eat … (Sven, online support person, Fri) great news [Wonky] and I sense a more ‘coming to terms’ understanding of your situation on your part. You’re in good hands believe you me and you are surrounded by a great number of friends who are here to cheer you on. Keep smiling. […] (Wonky, post 16, Sun) Yes [Sven], you are exactly right […] [declining health] I guess is what scared me and plus I had pretty-much not bothered to research into the condition early on when I was first diagnosed … but yeah … my cardio guy is wonderful and has assured me I am not going to drop dead any-time soon from this … For people who had experienced heart disease without support, the value of the HeartNET site was self-evident (Jace): “My heart attack was 18 months ago and I knew no one with a similar experience. My family and friends were very supportive but they were as shocked as me. Heartnet has given me the opportunity to hear other people’s stories.” Almost two weeks later, Jace was able to offer the benefit of her experience to someone suffering from panic attacks: I had several panic attacks post my heart attack. They are very frightening aren’t they? They seemed to come out of nowhere and I felt very out of control. I found making myself breath[e] more slowly and deeply, while telling myself to calm down, helped a lot. I also started listening to relaxation CDs as well. Take care, [Jace]. Others have asked for advice: (Anne): “Everyone, and I mean everyone, has been saying ‘are you sure you want to go [back to work]?’ Does anyone have coping strategies for those well meaning colleagues and bosses who think you need to be wrapped up in cotton wool?” Several people have taken the opportunity to confide their deepest fear: (Marc): “Why me? Why now? Can I get back to work normally? Every twinge you feel, you think is the big one or another attack that will get you this time.” (Anne): “I decided to spend last night in A&E [accident and emergency] after a nice little ambulance ride. It turned out to be nothing more than stress and indigestion but it scared the crap out of me. I have taken it so easy today and intend to rest up from now on in.” Some of the posts are both celebratory and inspirational (although the one cited below required a rider to the effect that any change in activity should be checked with a GP or specialist): (Joggy) I mentioned on an earlier post that I was going to run the 4km in the City to Surf and I actually did it. This is from someone who has probably run no more than 100 metres in one go in her life and guess what, I quite like it now […] I know that I am way fitter now than I have ever been and in a nutshell it’s great. Others see support as a two-way street: (Drew) “If you no longer fell [sic] YOU need the support, keep in mind others may benefit from YOUR support.” Discussion Tomkins’s Affect theory suggests that humans are subject to two positive affects: interest/excitement; enjoyment/joy, and one neutral affect: surprise/startle, along with six negative affects. All these affects are decoded/interpreted from facial expressions and require face-to-face interactions to be fully perceived. When we look at what affective prompts may be inciting people to log into HeartNET and communicate online, however, it becomes hard to second guess the affective motivation. Interest/excitement may be overstating the emotional impulse while enjoyment/joy may be an extreme way to describe the pleasure of recognition and identification with others in a similar situation. Arguably, HeartNET offers an opportunity to minimise negative affect, in particular “distress/anguish; fear/terror; anger/rage; shame/humiliation” – all of which may be present in some people’s experiences of heart disease. A strategy for reducing negative affect may be as valuable as the promise of increasing the experience of positive affect. As for the rational or emotional impact, it seems clear from the first stages of the research that rationally people were willing to take part in the trial and agreed to participate, but a large majority then failed to either log in or post any contribution. The site came to emotional life only when it was less obviously a “research project” (in the sense that all participants still had to log in via an ethics disclosure and informed consent screen) in that people could join when and if they were motivated to do so, and were invited to participate by those who were already online. Since the Website was revamped and relaunched on 2 August 2005 a further 124 people have joined. It appears that HeartNET is now both an affective and effective success. References “Affective Therapy.” Affective Therapy Website: Tomkins and Affect. 9 Oct. 2005 http://www.affectivetherapy.co.uk/Tomkins_Affect.htm>. “Google Advanced Search.” Google. 1 Nov. 2005 http://www.google.com.au/advanced_search>. Lin, Nan. Conceptualizing Social Support: Social Support, Life Events, and Depression. Ed. Nan Lin, Alfred Dean, & Walter Ensel. Orlando: Florida, Academic Press, 1986. Madara, Edward. “The Mutual-Aid Self-Help Online Revolution”. Social Policy 27 (1997): 20. Tomkins, Silvan S. Affect, Imagery, Consciousness (Volume 1): The Positive Affects. New York: Springer, 1962. ———. Affect, Imagery, Consciousness (Volume 2): The Negative Affects. New York: Springer, 1963. ———. Affect, Imagery, Consciousness (Volume 3): The Negative Affects: Anger and Fear. New York: Springer, 1991. ———. Affect, Imagery, Consciousness (Volume 4): Cognition: Duplication and Transformation of Information. New York: Springer, 1992. Citation reference for this article MLA Style Bonniface, Leesa, Lelia Green, and Maurice Swanson. "Affect and an Effective Online Therapeutic Community." M/C Journal 8.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0512/05-bonnifacegreenswanson.php>. APA Style Bonniface, L., L. Green, and M. Swanson. (Dec. 2005) "Affect and an Effective Online Therapeutic Community," M/C Journal, 8(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0512/05-bonnifacegreenswanson.php>.

30

Pastor, Carmen Alba. "Educación superior sin barreras: La accesibilidad de las universidades." Encounters in Theory and History of Education 6 (May26, 2008). http://dx.doi.org/10.24908/eoe-ese-rse.v6i0.628.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Higher Education institutions have developed online information services and degrees as an echo of the Information and Communication Technologies (ICT) incidence in all society fields. Equal access to education is a fundamental right; but equal access to higher education for people with disabilities is far from being achieved yet. To this inequality has to be added the difficulty of some groups to participate in the information society, the so called infoexclusion. The short number of students with disabilities in higher education makes evident the presence of barriers for this people to get into this educational level. One of them is the low degree of accessibility to digital services and studies offered by the Universities, something that can be considered a new kind of segregation.

31

Wong, Alfred SK, EvaM.Marwali, Graeme Maclaren, Mark Ogino, John Fraser, Peter Lai Chi Keung, Liza Fitria, Prieta Adriane, and Simon WC Sin. "ECMO simulation training during a worldwide pandemic: The role of ECMO telesimulation." Perfusion, May11, 2022, 026765912210938. http://dx.doi.org/10.1177/02676591221093868.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Background: Extracorporeal membrane oxygenation (ECMO) is a supportive therapy used in the most severe forms of acute respiratory distress syndrome. Due to its intrinsic complexity and relatively low annual volume, simulation is essential for efficient and appropriate ECMO management. COVID-19 has limited the opportunities for high-fidelity in-person simulation training when many hospitals are looking to expand their ECMO services to battle the ongoing pandemic. To meet this demand, the National Cardiovascular Center Harapan Kita, Jakarta, Indonesia, conducted a 3-day ECMO course entailing online didactic lectures (adult and paediatric stream), water drills and telesimulation. Purpose: The purpose of the study is to report the evaluation result of this novel model of education during COVID-19 outbreak. Data collection: Participants were given an ECMO knowledge pre-course and post-course test and a telesimulation evaluation survey at the conclusion and these data were collected. Results: The course was attended by 104 physicians, critical care nurses and perfusionists. Pre-course and post-course assessments showed a significant improvement in ECMO knowledge (60.0% vs 73.3%, respectively). Overall, the participants rated the telesimulation positively, and most found it acceptable to in-person simulation training considering the pandemic restrictions. Conclusion: Despite the complexities of ECMO, our recent experience demonstrates ECMO education and simulation delivered online is feasible, welcomed and supportive of a change in ECMO training course format. As we incorporate more innovative digital technologies, telesimulation may further enhance the quality of future ECMO training.

32

Olkhov-Mitsel, Ekaternia, Fang-I. Lu, Anna Gagliardi, and Anna Plotkin. "Gynecologic pathology services in low- and middle-income countries." International Journal of Gynecologic Cancer, November23, 2021, ijgc—2021–003103. http://dx.doi.org/10.1136/ijgc-2021-003103.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

ObjectiveThe International Gynecologic Cancer Society (IGCS) offers multidisciplinary conferences to underserved communities. Mentor pathologists have become an integral part of these tumor boards, as pathology services in low-to-middle-income countries are often inadequate and disjointed. The IGCS Pathology Working Group conducted a survey to assess barriers to quality pathology services in low-to-middle-income countries and identified potential solutions.MethodsA 69-question cross-sectional survey assessing different aspects of pathology services was sent to 15 IGCS Extension for Community Healthcare Outcomes (ECHO) training sites in Africa, Asia, Central America, and the Caribbean. Local gynecologic oncologists distributed the survey to their pathology departments for review. The responses were tabulated in Microsoft Excel.ResultsResponses were received from nine training sites: five sites in Africa, two in Asia, one in Central America, and one in the Caribbean. There were no pathologists with subspecialty training in gynecologic pathology. Most (7/9, 78%) surveyed sites indicated that they have limited access to online education and knowledge transfer resources. Of the eight sites that responded to the questions, 50% had an electronic medical system and 75% had a cancer registry. Synoptic reporting was used in 75% of the sites and paper-based reporting was predominant (75%). Most (6/7, 86%) laboratories performed limited immunohistochemical stains on site. None of the sites had access to molecular testing.ConclusionsInitial goals for collaboration with local pathologists to improve diagnostic pathology in low- and middle-income countries could be defining minimal gross, microscopic, and reporting pathology requirements, as well as wisely designed educational programs intended to mentor local leaders in pathology. Larger studies are warranted to confirm these observations.

33

Gregson, Kimberly. "Bad Avatar!" M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2708.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

While exploring the virtual world Second Life one day, I received a group message across the in-world communication system – “there’s a griefer on the beach. Stay away from the beach till we catch him.” There was no need to explain; everyone receiving the message knew what a griefer was and had a general idea of the kinds of things that could be happening. We’d all seen griefers at work before – someone monopolising the chat channel so no one else can communicate, people being “caged” at random, or even weapons fire causing so much “overhead” that all activity in the area slows to a crawl. These kinds of attacks are not limited to virtual worlds. Most people have experienced griefing in their everyday lives, which might best be defined as having fun at someone else’s expense. More commonly seen examples of this in the real world include teasing, bullying, and harassment; playground bullies have long made other children’s free time miserable. More destructive griefing includes arson and theft. Griefing activities happen in all kinds of games and virtual worlds. Griefers who laugh at new users and “yell” (so that all players can hear) that they stink, have followed new users of Disney’s tween-popular ToonTown. Griefers pose as friendly, helpful players who offer to show new users a path through difficult parts of a game, but then who abandon the new user in a spot where he or she does not have the skills to proceed. In World of Warcraft, a popular massively multiplayer online role playing game (MMORPG) created by Blizzard with more than seven million registered, if not active, users, griefers engage in what is known as corpse camping; they sit by a corpse, killing it over and over every time the player tries to get back into the game. The griefer gets a small number of experience points; the player being killed gets aggravated and has to wait out the griefing to play the game again (Warner & Raiter). Griefing in World of Warcraft was featured in an award nominated episode of the television program South Park, in which one character killed every other player he met. This paper considers different types of griefing, both in online games and virtual worlds, and then looks at the actions other players, those being griefed, take against griefers. A variety of examples from Second Life are considered because of the open-structure of the world and its developing nature. Definitions and Types Griefing in online environments such as video games and virtual worlds has been defined as “purposefully engaging in activities to disrupt the gaming experience of other players” (Mulligan & Patrovsky 250). The “purposeful” part of the definition means that accidental bumping and pushing, behaviours often exhibited by new users, are not griefing (Warner & Raiter). Rossingol defines a griefer as, “a player of malign intentions. They will hurt, humiliate and dishevel the average gamer through bending and breaking the rules of online games. ...They want glory, gain or just to partake in a malignant joy at the misfortune of others.” Davis, who maintains a gaming blog, describes Second Life as being populated by “those who build things and those who like to tear them down,” with the latter being the griefers who may be drawn to the unstructured anything-goes nature of the virtual world (qtd. in Girard). Definitions of griefing differ based on context. For instance, griefing has been examined in a variety of multi-player online games. These games often feature missions where players have to kill other players (PvP), behaviour that in other contexts such as virtual worlds would be considered griefing. Putting a monster on the trail of a player considered rude or unskilled might be a way to teach a lesson, but also an example of griefing (Taylor). Foo and Koivisto define griefing in MMORPGs as “play styles that disrupt another player’s gaming experience, usually with specific intention. When the act is not specifically intended to disrupt and yet the actor is the sole beneficiary, it is greed play, a subtle form of grief play” (11). Greed play usually involves actions that disrupt the game play of others but without technically breaking any game rules. A different way of looking at griefing is that it is a sign that the player understands the game or virtual world deeply enough to take advantage of ambiguities in the rules by changing the game to something new (Koster). Many games have a follow option; griefers pick a victim, stand near them, get as naked as possible, and then just follow them around without talking or explaining their actions (Walker). Another example is the memorial service in World of Warcraft for a player who died in real life. The service was interrupted by an attack from another clan; everyone at the memorial service was killed. It is not clear cut who the griefers actually were in this case – the mourners who chose to have their peaceful service in an area marked for player combat or the attackers following the rules for that area and working to earn points and progress in the game. In the case of the mourners, they were changing the rules of the game to suit them, to create something unique – a shared space to mourn a common friend. But they were definitely not playing by the rules. The attackers, considered griefers by many both in and outside of the game, did nothing that broke any rules of the game, though perhaps they broke rules of common decency (“World”); what they did does not fit into the definition of griefing, as much as do the actions of the mourners (Kotaku). Reshaping the game can be done to embed a new, sometimes political, message into the game. A group named Velvet Strike formed to protest US military action. They went into Counter Strike to bring a “message of peace, love and happiness to online shooters by any means necessary” (King). They placed spray painted graphics containing anti-war messages into the game; when confronted with people from other teams the Velvet Strike members refused to shoot (King). The group website contains “recipes” for non-violent game play. One “recipe” involved the Velvet Strike member hiding at the beginning of a mission and not moving for the rest of the game. The other players would shoot each other and then be forced to spend the rest of the game looking for the last survivor in order to get credit for the win. Similar behaviour has been tried inside the game America’s Army. Beginning March, 2006, deLappe, an artist who opposes the U.S. government’s involvement in Iraq, engaged in griefing behaviour by filling (spamming) the in-game text channel with the names of the people killed in the war; no one else can communicate on that channel. Even his character name, dead-in-Iraq, is an anti-war protest (deLappe). “I do not participate in the proscribed mayhem. Rather, I stand in position and type until I am killed. After death, I hover over my dead avatar’s body and continue to type. Upon being re-incarnated in the next round, I continue the cycle” (deLappe n.p.). What about these games and virtual worlds might lead people to even consider griefing? For one thing, they seem anonymous, which can lead to irresponsible behaviour. Players use fake names. Characters on the screen do not seem real. Another reason may be that rules can be broken in videogames and virtual worlds with few consequences, and in fact the premise of the game often seems to encourage such rule breaking. The rules are not always clearly laid out. Each game or world has a Terms of Service agreement that set out basic acceptable behaviour. Second Life defines griefing in terms of the Terms of Service that all users agree to when opening accounts. Abuse is when someone consciously and with malicious intent violates those terms. On top of that limited set of guidelines, each landowner in a virtual world such as Second Life can also set rules for their own property, from dress code, to use of weapons, to allowable conversation topics. To better understand griefing, it is necessary to consider the motivations of the people involved. Early work on categorising player types was completed by Bartle, who studied users of virtual worlds, specifically MUDs, and identified four player types: killers, achievers, socialisers, and explorers. Killers and achievers seem most relevant in a discussion about griefing. Killers enjoy using other players to get ahead. They want to do things to other people (not for or with others), and they get the most pleasure if they can act without the consent of the other player. Knowing about a game or a virtual world gives no power unless that knowledge can be used to gain some advantage over others and to enhance your standing in the game. Achievers want power and dominance in a game so they can do things to the game and master it. Griefing could help them feel a sense of power if they got people to do their will to stop the griefing behavior. Yee studied the motivations of people who play MMORPGs. He found that people who engage in griefing actually scored high in being motivated to play by both achieving and competition (“Facets”). Griefers often want attention. They may want to show off their scripting skills in the hope of earning respect among other coders and possibly be hired to program for others. But many players are motivated by a desire to compete and to win; these categories do not seem to be adequate for understanding the different types of griefing (Yee, “Faces of Grief”). The research on griefing in games has also suggested ways to categorise griefers in virtual worlds. Suler divides griefers into two types (qtd. in Becker). The first is those who grief in order to make trouble for authority figures, including the people who create the worlds. A few of the more spectacular griefing incidents seem designed to cause trouble for Linden Lab, the creators of Second Life. Groups attacked the servers that run Second Life, known as the grid, in October of 2005; this became known as the “gray goo attack” (Second Life; Wallace). Servers were flooded with objects and Second Life had to be taken off line to be restored from backups. More organised groups, such as the W-hats, the SL Liberation Army, and Patriotic Nigas engage in more large scale and public griefing. Some groups hope to draw attention to the group’s goals. The SL Liberation Army wants Linden Lab to open up the governance of the virtual world so that users can vote on changes and policies being implemented and limit corporate movement into Second Life (MarketingVox). Patriotic Nigas, with about 35 active members, want to slow the entry of corporations into Second Life (Cabron, “Who are Second Life’s”). One often discussed griefer attack in Second Life included a flood of pink flying penises directed against land owner and the first person to have made a profit of more than one million United States dollars in a virtual world, Anshe Chung, during a well-publicised and attended interview in world with technology news outlet CNET (Walsh, “Second Life Millionaire” ). The second type proposed by Suler is the griefer who wants to hurt and victimise others (qtd. in Becker). Individual players often go naked into PG-rated areas to cause trouble. Weapons are used in areas where weapons are banned. Second Life publishes a police blotter, which lists examples of minor griefing and assigned punishment, including incidents of disturbing the peace and violating community standards for which warnings and short bans have been issued. These are the actions of individuals for the most part, as were the people who exploited security holes to enter the property uninvited during the grand opening of Endemol’s Big Brother island in Second Life; guests to the opening were firebombed and caged. One of the griefers explained her involvement: Well I’m from The Netherlands, and as you might know the tv concept of big brother was invented here, and it was in all the newspapers in Holland. So I thought It would be this huge event with lots of media. Then I kinda got the idea ‘hey I could ruin this and it might make the newspaper or tv. So that’s what set me off, lol. (qtd. in Sklar) Some groups do grief just to annoy. The Patriotic Nigas claim to have attacked the John Edwards headquarters inside SL wearing Bush ‘08 buttons (Cabron, “John Edwards Attackers”), but it was not a political attack. The group’s founder, Mudkips Acronym (the name of his avatar in SL) said, “I’m currently rooting for Obama, but that doesn’t mean we won’t raid him or anything. We’ll hit anyone if it’s funny, and if the guy I want to be president in 2008’s campaign provides the lulz, we’ll certainly not cross him off our list” (qtd. in Cabron, “John Edwards Attackers”). If they disrupt a high profile event or site, the attack will be covered by media that can amplify the thrill of the attack, enhance their reputation among other griefers, and add to their enjoyment of the griefing. Part of the definition of griefing is that the griefer enjoys causing other players pain and disrupting their game. One resident posted on the SL blog, “Griefers, for the most part, have no other agenda other than the thrill of sneaking one past and causing a big noise. Until a spokesperson comes forward with a manifesto, we can safely assume that this is the work of the “Jackass” generation, out to disrupt things to show that they can“ (Scarborough). Usually to have fun, griefers go after individuals, rather than the owners and administrators of the virtual world and so fit into Suler’s second type of griefing. These griefers enjoy seeing others get angry and frustrated. As one griefer said: Understanding the griefer mindset begins with this: We don’t take the game seriously at all. It continues with this: It’s fun because you react. Lastly: We do it because we’re jerks and like to laugh at you. I am the fly that kamikazes into your soup. I am the reason you can’t have nice things … . If I make you cry, you’ve made my day. (Drake) They have fun by making the other players mad. “Causing grief is the name of his game. His objective is simple: Make life hell for anyone unlucky enough to be playing with him. He’s a griefer. A griefer is a player bent on purposely frustrating others during a multiplayer game” (G4). “I’m a griefer. It’s what I do,” the griefer says. “And, man, people get so pissed off. It’s great” (G4). Taking Action against Griefers Understanding griefing from the griefer point of view leads us to examine the actions of those being griefed. Suler suggests several pairs of opposing actions that can be taken against griefers, based on his experience in an early social environment called Palace. Many of the steps still being used fit into these types. He first describes preventative versus remedial action. Preventative steps include design features to minimise griefing. The Second Life interface includes the ability to build 3D models and to create software; it also includes a menu for land owners to block those features at will, a design feature that helps prevent much griefing. Remedial actions are those taken by the administrators to deal with the effects of griefing; Linden Lab administrators can shut down whole islands to keep griefer activities from spreading to nearby islands. The second pair is interpersonal versus technical; interpersonal steps involve talking to the griefers to get them to stop ruining the game for others, while technical steps prevent griefers from re-entering the world. The elven community in Second Life strongly supports interpersonal steps; they have a category of members in their community known as guardians who receive special training in how to talk to people bent on destroying the peacefulness of the community or disturbing an event. The creators of Camp Darfur on Better World island also created a force of supporters to fend off griefer attacks after the island was destroyed twice in a week in 2006 (Kenzo). Linden Lab also makes use of technical methods; they cancel accounts so known griefers can not reenter. There were even reports that they had created a prison island where griefers whose antics were not bad enough to be totally banned would be sent via a one-way teleporter (Walsh, “Hidden Virtual World Prison”). Some users of Second Life favour technical steps; they believe that new users should be held a fixed amount of time on the Orientation island which would stop banned users from coming back into the world immediately. The third is to create tools for average users or super users (administrators); both involve software features, some of which are available to all users to help them make the game good for them while others are available only to people with administrator privileges. Average users who own land have a variety of tools available to limit griefing behaviour on their own property. In Second Life, the land owner is often blamed because he or she did not use the tools provided to landowners by Linden Lab; they can ban individual users, remove users from the land, mute their conversation, return items left on the property, and prevent people from building or running scripts. As one landowner said, “With the newbies coming in there, I’ve seen their properties just littered with crap because they don’t know protective measures you need to take as far as understanding land control and access rights” (qtd. in Girard). Super users, those who work for Linden Lab, can remove a player from the game for a various lengths of time based on their behaviour patterns. Responses to griefers can also be examined as either individual or joint actions. Individual actions include those that land owners can take against individual griefers. Individual users, regardless of account type, can file abuse reports against other individuals; Linden Lab investigates these reports and takes appropriate action. Quick and consistent reporting of all griefing, no matter how small, is advocated by most game companies and user groups as fairly successful. Strangely, some types of joint actions have been not so successful. Landowners have tried to form the Second Life Anti-Griefing Guild, but it folded because of lack of involvement. Groups providing security services have formed; many event organisers use this kind of service. (Hoffman). More successful efforts have included the creation of software, such as SLBanLink.com, Karma, and TrustNet that read lists of banned users into the banned list on all participating property. A last category of actions to be taken against griefers, and a category used by most residents of virtual worlds, is to leave them alone—to ignore them, to tolerate their actions. The thinking is that, as with many bullies in real life, griefers want attention; when deprived of that, they will move on to find other amusements. Yelling and screaming at griefers just reinforces their bad behaviour. Users simply teleport to other locations or log off. They warn others of the griefing behaviour using the various in-world communication tools so they too can stay away from the griefers. Most of the actions described above are not useful against griefers for whom a bad reputation is part of their credibility in the griefer community. The users of Second Life who staged the Gray Goo denial of service attack in October, 2005 fit into that category. They did nothing to hide the fact that they wanted to cause massive trouble; they named the self-replicating object that they created Grief Spawn and discussed ways to bring down the world on griefer forums (Wallace) Conclusion The most effective griefing usually involves an individual or small group who are only looking to have fun at someone else’s expense. It’s a small goal, and as long as there are any other users, it is easy to obtain the desired effect. In fact, as word spreads of the griefing and users feel compelled to change their behaviour to stave off future griefer attacks, the griefers have fun and achieve their goal. The key point here is that everyone has the same goal – have fun. Unfortunately, for one group – the griefers – achieving their goal precludes other users from reaching theirs. Political griefers are less successful in achieving their goals. Political creative play as griefing, like other kinds of griefing, is not particularly effective, which is another aspect of griefing as error. Other players react with frustration and violence to the actions of griefers such as deLappe and Velvet-Strike. If griefing activity makes people upset, they are less open to considering the political or economic motives of the griefers. Some complaints are relatively mild; “I’m all for creative protest and what not, but this is stupid. It’s not meaningful art or speaking out or anything of the type, its just annoying people who are never going to change their minds about how awesome they think war is” (Borkingchikapa). Others are more negative: “Somebody really needs to go find where that asshole lives and beat the shit out of him. Yeah, it’s a free country and he can legally pull this crap, but that same freedom extends to some patriot kicking the living shit out of him” (Reynolds). In this type of griefing no one’s goals for using the game are satisfied. The regular users can not have fun, but neither do they seem to be open to or accepting of the political griefer’s message. This pattern of success and failure may explain why there are so many examples of griefing to disrupt rather then the politically motivated kind. It may also suggest why efforts to curb griefing have been so ineffective in the past. Griefers who seek to disrupt for fun would see it as a personal triumph if others organised against them. Even if they found themselves banned from one area, they could quickly move somewhere else to have their fun since whom or where they harass does not really matter. Perhaps not all griefing is in error, rather, only those griefing activities motivated by any other goal than have fun. People invest their time and energy in creating their characters and developing skills. The behaviour of people in these virtual environments has a definite bearing on the real world. And perhaps that explains why people in these virtual worlds react so strongly to the behaviour. So, remember, stay off the beach until they catch the griefers, and if you want to make up the game as you go along, be ready for the other players to point at you and say “Bad, Bad Avatar.” References Bartle, Richard. “Players Who Suit MUDs.” Journal of MUD Research 1.1 (June 1996). 10 Sep. 2007 http://www.mud.co.uk/richard/hcds.htm>. Becker, David. Inflicting Pain on “Griefers.” 13 Dec. 2004. 10 Oct. 2007 http://www.news.com/Inflicting-pain-on-griefers/2100-1043_3-5488403.html>. Borkingchikapa. Playing America’s Army. 30 May 2006. 10 Aug. 2007 http://www.metafilter.com/51938/playing-Americas-Army>. Cabron, Lou. John Edwards Attackers Unmasked. 5 Mar. 2007. 29 Apr. 2007 http://www.10zenmonkeys.com/2007/03/05/john-edwards-virtual-attackers-unmasked/>. Cabron, Lou. Who Are Second Life’s “Patriotic Nigas”? 8 Mar. 2007. 30 Apr. 2007 http://www.10zenmonkeys.com/2007/03/08/patriotic-nigras-interview-john-edwards-second-life/>. DeLappe, Joseph. Joseph deLappe. 2006. 10 Aug. 2007. http://www.unr.edu/art/DELAPPE/DeLappe%20Main%20Page/DeLappe%20Online%20MAIN.html>. Drake, Shannon. “Jerk on the Internet.” The Escapist Magazine 15 Nov. 2005: 31-32. 20 June 2007 http://www.escapistmagazine.com/issue/19/31>. Foo, Chek Yang. Redefining Grief Play. 2004. 10 Oct. 2007 http://64.233.167.104/search?q=cache:1mBYzWVqAsIJ:www.itu.dk/op/papers/ yang_foo.pdf+foo+koivisto&hl=en&ct=clnk&cd=7&gl=us&client=firefox-a>. Foo, Chek Yang, and Elina Koivisto. Grief Player Motivations. 2004. 15 Aug. 2007 http://www.itu.dk/op/papers/yang_foo_koivisto.pdf>. G4. Confessions of a Griefer. N.D. 21 June 2007 http://www.g4tv.com/xplay/features/42527/Confessions_of_a_Griefer.html>. Girard, Nicole. “Griefer Madness: Terrorizing Virtual Worlds.”_ Linux Insider_ 19 Sep. 2007. 3 Oct. 2007 http://www.linuxinsider.com/story/59401.html>. Hoffman, E. C. “Tip Sheet: When Griefers Attack.” Business Week. 2007. 21 June 2007 http://www.businessweek.com/playbook/07/0416_1.htm>. Kenzo, In. “Comment: Has Plastic Duck Migrated Back to SL?” Second Life Herald Apr. 2006. 10 Oct. 2007 http://www.secondlifeherald.com/slh/2006/04/has_plastic_duc.html>. King, Brad. “Make Love, Not War.” Wired June 2002. 10 Aug. 2007 http://www.wired.com/gaming/gamingreviews/news/2002/06/52894>. Koster, Raph. A Theory of Fun for Game Design. Scotsdale, AZ: Paraglyph, 2005. Kotaku. _WoW Funeral Party Gets Owned. _2006. 15 Aug. 2007 http://kotaku.com/gaming/wow/wow-funeral-party-gets-owned-167354.php>. MarketingVox. Second Life Liberation Army Targets Brands. 7. Dec. 2006. 10 Aug. 2007 http://www.marketingvox.com/archives/2006/12/07/second-life-liberation-army-targets-brands/>. Mulligan, Jessica, and Bridget Patrovsky. Developing Online Games: An Insider’s Guide. Indianapolis: New Riders, 2003. Reynolds, Ren. Terra Nova: dead-in-iraq. 7 May 2006. 15 Aug. 2007 http://terranova.blogs.com/terra_nova/2006/05/deadiniraq_.html>. Rossingnol, Jim. “A Deadly Dollar.” The Escapist Magazine 15 Nov. 2005: 23-27. 20 June 2007 http://www.escapistmagazine.com/issue/19/23>. Scarborough, Solivar. Mass Spam Issue Inworld Being Investigated. 13 Oct. 2006. 20 June 2007 http://blog.secondlife.com/2006/10/13/mass-spam-issue-inworld-being-investigated/>. Sklar, Urizenus. “Big Brother Opening Hypervent Griefed for 4 Hours.” Second Life Herald 12 Dec. 2006. 10 Aug. 2007 http://www.secondlifeherald.com/slh/2006/12/big_brother_ope.html>. Suler, John. The Bad Boys of Cyberspace. 1997. 10 Oct. 2007 http://www-usr.rider.edu/~suler/psycyber/badboys.html>. Taylor, T.L. Play between Worlds: Exploring Online Game Culture. Cambridge, MA: MIT, 2006. Velvet Strike. Velvet-Strike. N.D. 10 Aug. 2007 http://www.opensorcery.net/velvet-strike/nonflame.html>. Walker, John. “How to Be a Complete Bastard.” PC Gamer 13 Mar. 2007. 10 Aug. 2007 http://www.computerandvideogames.com/article.php?id=159883&site=pcg>. Wallace, Mark. “The Day the Grid Disappeared.” Escapist Magazine 15 Nov. 2005: 11. 20 June 2007 http://www.escapistmagazine.com/issue/19/11>. Walsh, Tony. Hidden Virtual-World Prison Revealed. 3 Jan. 2006. 10 Oct. 2007 http://www.secretlair.com/index.php?/clickableculture/entry/hidden_virtual_world_prison_revealed/>. Walsh, Tony. Second Life Millionaire Interview Penis-Bombed. 20 Dec. 2006. 10 Oct. 2007 http://www.secretlair.com/index.php?/clickableculture/entry/second_life_millionaire_interview_penis_bombed/>. Warner, Dorothy, and Mike Raiter. _Social Context in Massively-Multiplayer Online Games. _2005. 20 Aug. 2007 http://www.i-r-i-e.net/inhalt/004/Warner-Raiter.pdf>. “World of Warcraft: Funeral Ambush.” 2006. YouTube. 15 Aug. 2007 http://www.youtube.com/watch?v=31MVOE2ak5w>. Yee, Nicholas. Facets: 5 Motivational Factors for Why People Play MMORPG’s. 2002. 10 Oct. 2007 http://www.nickyee.com/facets/home.html>. Yee, Nicholas. Faces of Grief. 2005. June 2007 http://www.nickyee.com/daedalus/archives/000893.php?page=1>. Citation reference for this article MLA Style Gregson, Kimberly. "Bad Avatar!: Griefing in Virtual Worlds." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/06-gregson.php>. APA Style Gregson, K. (Oct. 2007) "Bad Avatar!: Griefing in Virtual Worlds," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/06-gregson.php>.

34

McGuire, Mark. "Ordered Communities." M/C Journal 7, no.6 (January1, 2005). http://dx.doi.org/10.5204/mcj.2474.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the possibilities of a dematerialized, ethereal virtual architecture in which the relationships between abstract elements are in a constant state of flux (250). John Perry Barlow employs the frontier metaphor to frame cyberspace as an unmapped, ungoverned territory in which a romantic and a peculiarly American form of individualism can be enjoyed by rough and ready pioneers (“Crime” 460). In his 1993 account as an active participant in The WELL (Whole Earth ‘Lectronic Link), one of the earliest efforts to construct a social space online, Howard Rheingold celebrates the freedom to create a “new kind of culture” and an “authentic community” in the “electronic frontier.” He worries, however, that the freedom enjoyed by early homesteaders may be short lived, because “big power and big money” might soon find ways to control the Internet, just as they have come to dominate and direct other communications media. “The Net,” he states, “is still out of control in fundamental ways, but it might not stay that way for long” (Virtual Community 2-5). The uses of order and disorder Some theorists have identified disorder as a necessary condition for the development of healthy communities. In The Uses of Disorder (1970), Richard Sennett argues that “the freedom to accept and to live with disorder” is integral to our search for community (xviii). In his 1989 study of social space, Ray Oldenburg maintains that public hangouts, which constitute the heart of vibrant communities, support sociability best when activities are unplanned, unorganized, and unrestricted (33). He claims that without the constraints of preplanned control we will be more in control of ourselves and more aware of one another (198). More recently, Charles Landry suggests that “structured instability” and “controlled disruption,” resulting from competition, conflict, crisis, and debate, make cities less comfortable but more exciting. Further, he argues that “endemic structural disorder” requiring ongoing adjustments can generate healthy creative activity and stimulate continual innovation (156-58). Kevin Robins, too, believes that any viable social system must be prepared to accept a level of uncertainty, disorder, and fear. He observes, however, that techno-communities are “driven by the compulsion to neutralize,” and they therefore exclude these possibilities in favour of order and security (90-91). Indeed, order and security are the dominant characteristics that less idealistic observers have identified with cyberspace. Alexander Galloway explains how, despite its potential as a liberating development, the Internet is based on technologies of control. This control is exercised at the code level through technical protocols, such as TCP/IP, DNS, and HTM, that determine disconnections as well as connections (Galloway). Lawrence Lessig suggests that in our examination of the ownership, regulation, and governance of the virtual commons, we must take into account three distinct layers. As well as the “logical” or “code” layer that Galloway foregrounds, we should also consider the “physical” layer, consisting of the computers and wires that carry Internet communications, and the “content” layer, which includes everything that we see and hear over the network. In principle, each of these layers could be free and unorganized, or privately owned and controlled (Lessig 23). Dan Schiller documents the increasing privatization of the Net and argues that corporate cyberspace extends the reach of the market, enabling it to penetrate into areas that have previously been considered to be part of the public domain. For Schiller, the Internet now serves as the main production and control mechanism of a global market system (xiv). Checking into Habbo Hotel Habbo Hotel is an example of a highly ordered and controlled online social space that uses community and game metaphors to suggest something much more open and playful. Designed to attract the teenage market, this graphically intensive cartoon-like hotel is like an interactive Legoland, in which participants assemble a toy-like “Habbo” character and chat, play games, and construct personal environments. The first Habbo Hotel opened its doors in the United Kingdom in 2000, and, by September 2004, localized sites were based in a dozen countries, including Canada, the Unites States, Finland, Japan, Switzerland and Spain, with further expansion planned. At that time, there were more than seventeen million registered Habbo characters worldwide with 2.3 million unique visitors each month (“Strong Growth”). The hotel contains thousands of private rooms and twenty-two public spaces, including a welcome lounge, three lobbies, cinema, game hall, café, pub, and an extensive hallway. Anyone can go to the Room-O-Matic and instantly create a free guest room. However, there are a limited number of layouts to choose from and the furnishings, which must be purchased, have be chosen from a catalog of fixed offerings. All rooms are located on one of five floors, which categorize them according to use (parties, games, models, mazes, and trading). Paradoxically, the so-called public spaces are more restricted and less public than the private guest quarters. The limited capacity of the rooms means that all of the public spaces are full most of the time. Priority is given to paying Habbo Club members and others are denied entry or are unceremoniously ejected from a room when it becomes full. Most visitors never make it into the front lobby. This rigid and restricted construction is far from Novak’s vision of a “liquid architecture” without barriers, that morphs in response to the constantly changing desires of individual inhabitants (Novak 250). Before entering the virtual hotel, individuals must first create a Lego-like avatar. Users choose a unique name for their Habbo (no foul language is allowed) and construct their online persona from a limited selection and colour of body parts. One of two different wardrobes is available, depending on whether “Boy” or “Girl” is chosen. The gender of every Habbo is easily recognizable and the restricted wardrobe results in remarkably similar looking young characters. The lack of differentiation encourages participants to treat other Habbos as generic “Boys” or “Girls” and it encourages limited and predictable conversations that fit the stereotype of male-female interactions in most chat sites. Contrary to Turkle’s contention that computer mediated communication technologies expose the fallacy of a single, fixed, identity, and free participants to experiment with alternative selves (15-17), Habbo characters are permitted just one unchangeable name, and are capable of only limited visual transformations. A fixed link between each Habbo character and its registered user (information that is not available to other participants) allows the hotel management to track members through the site and monitor their behavior. Habbo movements are limited to walking, waving, dancing and drinking virtual alcohol-free beverages. Movement between spaces is accomplished by entering a teleport booth, or by selecting a location by name from the hotel Navigator. Habbos cannot jump, fly or walk through objects or other Habbos. They have no special powers and only a limited ability to interact with objects in their environment. They cannot be hurt or otherwise affected by anything in their surroundings, including other Habbos. The emphasis is on safety and avoidance of conflict. Text chat in Habbo Hotel is limited to one sixty-one-character line, which appears above the Habbo, floats upward, and quickly disappears off the top of the screen. Text must be typed in real time while reading on-going conversations and it is not possible to archive a chat sessions or view past exchanges. There is no way of posting a message on a public board. Using the Habbo Console, shorter messages can also be exchanged between Habbos who may be occupying different rooms. The only other narratives available on the site are in the form of official news and promotions. Before checking into the hotel, Habbos can stop to read Habbo Today, which promotes current offers and activities, and HabboHood Happenings, which offers safety tips, information about membership benefits, jobs (paid in furniture), contest winners, and polls. According to Rheingold, a virtual community can form online when enough people participate in meaningful public discussions over an extended period of time and develop “webs of personal relationships” (Virtual Community 5). By restricting communication to short, fleeting messages between individual Habbos, the hotel frustrates efforts by members to engage in significant dialogue and create a viable social group. Although “community” is an important part of the Habbo Hotel brand, it is unlikely to be a substantial part of the actual experience. The virtual hotel is promoted as a safe, non-threatening environment suitable for the teenagers is designed to attract. Parents’ concerns about the dangers of an unregulated chat space provide the hotel management with a justification for creating a highly controlled social space. The hotel is patrolled twenty-four hours a day by professional moderators backed-up by a team of 180 volunteer “Hobbas,” or guides, who can issue warnings to misbehaving Habbos, or temporarily ban them from the site. All text keyed in by Habbos passes through an automated “Bobba Filter” that removes swearing, racist words, explicit sexual comments and “anything that goes against the “Habbo Way” (“Bad Language”). Stick to the rules and you’ll have fun, Habbos are told, “break them and you’ll get yourself banned” (“Habbo Way”). In Big Brother fashion, messages are displayed throughought the hotel advising members to “Stay safe, read the Habbohood Watch,” “Never give out your details!” and “Obey the Habbo way and you’ll be OK.” This miniature surveillance society contradicts Barlow’s observation that cyberspace serves as “a perfect breeding ground for both outlaws and new ideas about liberty” (“Crime” 460). In his manifesto declaring the independence of cyberspace from government control, he maintains that the state has no authority in the electronic “global social space,” where, he asserts, “[w]e are forming our own Social Contract” based on the Golden Rule (“Declaration”). However, Habbo Hotel shows how the rule of the marketplace, which values profits more than social practices, can limit the freedoms of online civil society just as effectively as the most draconian government regulation. Place your order Far from permitting the “controlled disruption” advocated by Landry, the hotel management ensures that nothing is allowed to disrupt their control over the participants. Without conflict and debate, there are few triggers for creative activity in the site, which is designed to encourage consumption, not community. Timo Soininen, the managing director of the company that designed the hotel, states that, because teenagers like to showcase their own personal style, “self-expression is the key to our whole concept.” However, since it isn’t possible to create a Habbo from scratch, or to import clothing or other objects from outside the site, the only way for members to effectively express themselves is by decorating and furnishing their room with items purchased from the Habbo Catalogue. “You see, this,” admits Soininen, “is where our revenue model kicks in” (Shalit). Real-world products and services are also marketed through ads and promotions that are integrated into chat, news, and games. The result, according to Habbo Ltd, is “the ideal vehicle for third party brands to reach this highly desired 12-18 year-old market in a cost-effective and creative manner” (“Habbo Company Profile”). Habbo Hotel is a good example of what Herbert Schiller describes as the corporate capture of sites of public expression. He notes that, when put at the service of growing corporate power, new technologies “provide the instrumentation for organizing and channeling expression” (5-6). In an afterword to a revised edition of The Virtual Community, published in 2000, Rheingold reports on the sale of the WELL to a privately owned corporation, and its decline as a lively social space when order was imposed from the top down. Although he believes that there is a place for commercial virtual communities on the Net, he acknowledges that as economic forces become more entrenched, “more controls will be instituted because there is more at stake.” While remaining hopeful that activists can leverage the power of many-to-many communications for the public good, he wonders what will happen when “the decentralized network infrastructure and freewheeling network economy collides with the continuing growth of mammoth, global, communication empires” (Virtual Community Rev. 375-7). Although the company that built Habbo Hotel is far from achieving global empire status, their project illustrates how the dominant ethos of privatization and the increasing emphasis on consumption results in gated virtual communities that are highly ordered, restricted, and controlled. The popularity of the hotel reflects the desire of millions of Habbos to express their identities and ideas in a playful environment that they are free to create and manipulate. However, they soon find that the rules are stacked against them. Restricted design options, severe communication limitations, and fixed architectural constraints mean that the only freedom left is the freedom to choose from a narrow range of provided options. In private cyberspaces like Habbo Hotel, the logic of the market rules out unrestrained many-to-many communications in favour of controlled commercial relationships. The liberating potential of the Internet that was recognized by Rheingold and others has been diminished as the forces of globalized commerce impose their order on the electronic frontier. References “Bad Language.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/badlanguage/>. Barlow, John Perry. “Crime and Puzzlement.” High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Ed. Peter Ludlow. Cambridge, Mass.: MIT P, 1996. 459-86. ———. “A Declaration of the Independence of Cyberspace.” 8 Feb. 1996. 3 July 2004 http://www.eff.org/~barlow/Declaration-Final.html>. Galloway, Alexander R. Protocol: How Control Exists after Decentralization. Cambridge, Mass.: MIT P, 2004. “Habbo Company Profile.” Habbo Hotel. 2002. Habbo Ltd. 20 Jan. 2003 http://www.habbogroup.com>. “The Habbo Way.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/habboway/>. Landry, Charles. The Creative City: A Toolkit for Urban Innovators. London: Earthscan, 2000. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random, 2001. Novak, Marcos. “Liquid Architecture in Cyberspace.” Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, Mass.: MIT P, 1991. 225-54. Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Community Centers, Beauty Parlors, General Stores, Bars, Hangouts and How They Get You through the Day. New York: Paragon, 1989. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. ———. The Virtual Community: Homesteading on the Electronic Frontier. Rev. ed. Cambridge, Mass.: MIT P, 2000. Robins, Kevin. “Cyberspace and the World We Live In.” The Cybercultures Reader. Eds. David Bell and Barbara M. Kennedy. London: Routledge, 2000. 77-95. Schiller, Dan. Digital Capitalism: Networking the Global Market System. Cambridge, Mass.: MIT P, 1999. Schiller, Herbert I. Culture Inc.: The Corporate Takeover of Public Expression. New York: Oxford UP, 1991. Sennett, Richard. The Uses of Disorder: Personal Identity & City Life. New York: Vintage, 1970. Shalit, Ruth. “Welcome to the Habbo Hotel.” mpulse Magazine. Mar. 2002. Hewlett-Packard. 1 Apr. 2004 http://www.cooltown.com/cooltown/mpulse/0302-habbo.asp>. “Strong Growth in Sulake’s Revenues and Profit – Habbo Hotel Online Game Will Launch in the US in September.” 3 Sept. 2004. Sulake. Sulake Corp. 9 Jan. 2005 http://www.sulake.com/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon, 1997. Citation reference for this article MLA Style McGuire, Mark. "Ordered Communities." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/06-mcguire.php>. APA Style McGuire, M. (Jan. 2005) "Ordered Communities," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/06-mcguire.php>.

35

Leisten, Susanna, and Rachel Cobcroft. "Copy." M/C Journal 8, no.3 (July1, 2005). http://dx.doi.org/10.5204/mcj.2351.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Rip, mix, share, and sue. Has ‘copy’ become a dirty word? The invitation to artists, activists, consumers and critics to engage in the debate surrounding the creative processes of ‘copy’ has been insightful, if not inciting sampling/reproduction/reflection itself: It clearly questions whether ‘copy’ deserves the negative connotations that it currently summonses. It has confronted the divide between the original and its replica, and questioned notions of authenticity and the essence of identity. It has found that ‘open source’ is an opportunity to capitalise on creativity, and that reuse is resplendently productive. Cultural expression and social exchange are seen to rest upon the acts of copying which are brought to our attention in this edition. As this issue illustrates, the word ‘copy’ has numerous interpretations, applications, and angles, yet an overriding wealth of debate currently outweighs all others; and that surrounds the tumultuous issue of ‘protecting’ copyright in the digital age. Since its conception in the 17th century, copyright law has faced an increasing challenge in achieving its original aims; namely, to strike a balance between creators’ and consumers’ rights in allowing concurrent attribution and access to works. Recent dramatic technological advancements affecting reproduction and distribution of copies, particularly pertaining to the Internet, have fundamentally changed and challenged the content environment. When copyright laws were first conceived, copying and distributing creative works was difficult. Now these activities are virtually free, and practically pervasive; in the digital age, the difficulty lies in their control. Yet because the primarily Western copyright regime relies on providing rights holders with the ability to control their works, copyright industries are working on strategies to garner greater control. Heading this list of strategies are technological content protection mechanisms, consumer education, and lawsuits against individual copyright infringers. Peer-to-peer (P2P) networks are being exploited and sabotaged simultaneously by entities within the Creative Industries, in an attempt to learn from and eliminate the free ‘competition’. Perceiving the mismatch of legal sanction and access to enabling technologies, critics revile the increasing restriction on consumers and creativity. The music industry, in particular, is experimenting with new business models to confine consumers’ rights to enjoy a growing bank of online music. Technical protection mechanisms, within the ambit of Digital Rights Management (DRM), are increasingly applied to enforce these licensing restrictions, providing ‘speed bumps’ for access to content (Digital Connections Council of the Committee for Economic Development 50). Given that these mechanisms can only temporarily allow a limited level of control over access to and usage of content, however, both IP and contract law are essential to the prevention and deterrence of infringement. While production and distribution corporations agitate about online ‘piracy’, an increasing population of consumers are unsympathetic, knowing that very little of the music industry revenue ends up in the pockets of artists, and knowing very little of the complex law surrounding copyright. Over the past few hundred years the content distribution business has become particularly wealthy, and it is primarily this link of the content chain from creator to consumer that is tending towards redundancy in the digital networked world: those who once resided in the middle of the content chain will no longer be required. When individuals and collectives create something they are proud of, they want the world to experience and talk about it, if not ‘rip, mix, mash, and share’ it. The need to create and communicate has always been part of human makeup. Infants learn rapidly during their first few years primarily by observing and emulating the behaviour of adults. But as children progress, and begin creating what they perceive to be their unique contribution, they naturally want to claim and display it as their own; hence the importance of attribution and moral rights to this debate. Clearly, society benefits in many ways from this drive to create, innovate, communicate, learn and share contributions. One need only cite Sir Isaac Newton, who is attributed as having said, ‘If I have seen further, it is by standing on the shoulders of giants.’ Academics and scientists worldwide have long collaborated by sharing and building on one another’s work, a fact acknowledged by the Science Commons initiative (http://www.sciencecommons.org/) to provide open access to academic research and development. Such has been inspired by the vision of Lawrence Lessig, as espoused in The Future of Ideas: The Fate of the Commons in a Connected World. Appropriation of bits and pieces (‘samples’) of another’s work, along with appropriate attribution, has always been acceptable until recently. This legal tension is explored by authors Frederick Wasser, in his article ‘When Did They Copyright the World Without Us Noticing?’, and Francis Raven, in ‘Copyright and Public Goods: An Argument for Thin Copyright Protection’. Wasser explores the recent agitation against the legislated copyright extension in the United States to 95 years from publication (or 120 years from creation, whichever is shorter) from an original 14, accompanied by the changing logic of copyright, which has further upset the balance between protection and fair use, between consumer and creator, and ultimately invests power in the intermediary. Raven argues for ‘thin’ copyright protection, having the intention to protect the incentive for producers to create while also defending the public’s right to a rich intellectual realm in the public domain. Current conflict surrounding music sampling illustrates that our evolution towards a regime of restrictive licensing of digital works, largely driven by copyright owners and content distributors, has made the use of bits and pieces of existing music difficult, if not impossible. In this issue’s feature article ‘Good Copy/Bad Copy’, Steve Collins examines the value of ‘copy’ where musical creativity and copyright law intersect. The recontextualisation and reshaping of music with regard to cover versions and sampling brings into relief the disparity in current legal and licensing provisions. When creativity is stifled by copyright, the original intention of the law is lost. Collins argues that creators are now subject to the control of an oppressive monopoly, which clearly should be addressed if innovative cultural expression is to thrive. The issue’s second article, ‘The Affect of Selection in Digital Sound Art’ by author and sound artist Owen Chapman, aka ‘Opositive’, explores the interplay and influence between the ‘raw and the remixed’, where subjective control over sound production is questioned. Transformation of sound hovers between an organic and intentional process, and creates affective influence: we are ultimately entreated to listen and learn, as sampling selection goes gestalt. Moving from the aural domain to the written, the significance of textual reuse and self-referentiality is introduced by Kirsten Seale in her academic exploration of reuse in the works of Iain Sinclair. Sinclair, in Dining on Stones (or, the Middle Ground), is seen to have subverted the postmodernist obscuration/denial of authorial control through the reintroduction of an assured self-sampling technique. Also in contemplating the written creative process, after significant exposure to the ever-more-evident proclivities of students to cut and paste from Websites, Dr. Gauti Sigthorsson asserts that plagiarism is merely symptomatic of the dominant sampling culture. Rather than looming as a crisis, Sigthorsson sees this increasing appropriation as a ‘teachable moment’, illustrating the delights of the open source process. Issues of identity and authenticity are explored in ‘Digital Doppelgängers’ by Lisa Bode, and ‘Slipping and Sliding: blind optimism, greed and the effect of fakes on our cultural understanding’ by art fraud and forensic expert Robyn Sloggett. In introducing the doppelgänger of Indo-European folklore and literature as the protagonist’s sinister double, Bode goes on to explore the digital manifestation: the image which challenges the integrity of the actor and his/her reflection, where original identity may be beyond the actor’s control. In copy’s final article ‘Slipping and Sliding’ by Sloggett, the determination of artistic authenticity is explored. Identity is seen to be predicated on authenticity: but does this necessarily hold? In reflecting on the notions of ‘copy’ explored in this issue, it is clear that civilisation has progressed by building on past successes and failures. A better, richer future can be possible if we continue to do exactly this. Instead, rights holders are striving to maintain control, using clumsy methods that effectively alter traditional user rights (or perceived rights) and practices. Imagine instead if all creative content were virtually free and easily accessible to all; where it would not longer be an infringement to make and share copies for non-commercial reasons. Is it possible to engineer an alternative incentive (to copyright) for creativity to flourish? This is, after all, the underlying goal behind copyright law. Copyright law provides a creator with a temporary monopoly over the sale and distribution of their work. Infringing copyright law is consequently depriving creators of this mechanism to make money, obtain notoriety and thus their very motivation to create. This goal to provide creative incentive is fundamentally important for society, intellectually and culturally, but alternative means to achieve it are worthy of exploration. A familiar alternative option to help generate creativity is to apply a special tax (levy) on all goods and services that enable viewing, listening, reading, publishing, copying, and downloading of digital content. The revenue pool this generates is then available for distribution amongst content creators, thereby creating a financial incentive. In over 40 countries, primarily European, partial variations of such a levy system are currently used to compensate copyright owners whilst allowing consumers a certain degree of free private copying. Professor William Fisher, Hale and Dorr Professor of Intellectual Property Law at Harvard University, and Director of the Berkman Centre for Internet and Society, proposes as much in his book outlining a government-administered compensation scheme, encompassing free online access to music and movies: Promises to Keep: Technology, Law and the Future of Entertainment. As we are left to contemplate copyrights and ‘copywrongs’ (Vaidhyanathan), we may reflect that the ‘promotion of the progress of science and the useful arts’, as per Harper v. Row (471 U.S.), rests with the (some say draconian) directions determined by legislation. Measures contained in instruments such as the Digital Millennium Copyright Act (DMCA), continue to diminish, if not desecrate, the public domain. Moreover, as the full impact of the Free Trade Agreement (FTA) with the United States looms for the Australian audience, in the adoption of the extension of the copyright term to the criminalisation of IP infringement, we realise that the establishment of economically viable and legal alternatives to the adopted regime is paramount. (Moore) We are also left to lament the recent decision in MGM vs. Grokster, where the US Supreme Court has ruled unanimously against the file-sharing service providers Grokster and Streamcast Networks (developers of Morpheus), serving as an illustration of ongoing uncertainty surrounding P2P networks and technologies, and lack of certainty of any court decisions regarding such matters. In the future, as we log into Longhorn (http://msdn.microsoft.com/longhorn/), we will wonder where our right to enjoy began to disappear. Electronic Frontier Foundation’s (http://www.eff.org/) cry to ‘Defend Freedom in the Digital World’ gains increasing resonance. In presenting ‘copy’ to you, we invite you cut, paste, innovate, create, and be entertained, to share, and share alike, while you still can. References Digital Connections Council of the Committee for Economic Development (CED). Promoting Innovation and Economic Growth: The Special Problem of Digital Intellectual Property, 2004. http://www.ced.org/docs/report/report_dcc.pdf>. Fisher, William. Promises to Keep: Technology, Law, and the Future of Entertainment. Palo Alto CA: Stanford UP, 2004. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random House, 2001. Moore, Christopher. “Creative Choices: Changes to Australian Copyright Law and the Future of the Public Domain.” Media International Australia 114 (2005): 71-82. Vaidhyanathan, Siva. Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity. New York: New York UP, 2003. Citation reference for this article MLA Style Leisten, Susanna, and Rachel Cobcroft. "Copy." M/C Journal 8.3 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0507/01-editorial.php>. APA Style Leisten, S., and R. Cobcroft. (Jul. 2005) "Copy," M/C Journal, 8(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0507/01-editorial.php>.

36

Tsarouhis, Patti. "Mapping the Narrative in a Digital Album Cover." M/C Journal 9, no.1 (March1, 2006). http://dx.doi.org/10.5204/mcj.2590.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

When Ray Winstone’s character in the film ‘Nil by Mouth’, uses an album cover as a portable work surface to prepare drugs, what is invariably being enunciated is a narrative of generational identity. The object status of the vinyl record with its sleeves, notes, and protective sheath, appends a broader trajectory of the ‘record collection’, ‘stereo’, ‘speakers and dials’. The series of operations performed upon these raw materials whether, collecting, listening to, trading or buying second hand, creates a unique cultural form, a series of unordered items/events, which Lev Manovich terms a ‘narrative’. A narrative can best be described as a series of developments within otherwise unrelated elements, which forms and/or sustains an identity for the group of people interacting with them. The culture of listening to commodified music, with its necessary hardware (vinyl/CD/cassette), collectively works to map methods of listening and modes of behaviour, which enable an album’s ritualistic consumption. However, the various digital translations of the traditional album cover, including the ‘album icon’, the ‘desktop’, the ‘playlist’, invert the narrative created by the traditional vinyl assemblage by their nature as discrete data. The paragraphs which follow examine the effects of New Media’s ‘transmissive’ rather than reflective aesthetics, producing alternate maps of the physical, aural, and cultural experience of data and narrative. The digital album ‘icon’, the transmissible ‘sign’ or ‘trace’ of a material object, functions as a complication to Manovich’s New Media narrative/database binary. The construction of database and narrative as natural enemies within New Media discourse highlighted by Manovich, is problematic when dealing with systems of operation characterised by their mutability. The traditional relationship between the album cover and its musical content, its remediation in digital format, serve to reveal that the two are not so mutually exclusive. Within popular discourse, it is acknowledged that the database – repositories of discrete information – is foregrounded by the digital apparatus, whereas the analogue apparatus is seen to foreground narrative – the processes performed upon information, from generation, to packaging, to transmission. The packaging, the physical dimensions and collectable attributes of the record, constructed a ritualistic narrative specific to the vinyl. The public face of the vinyl album in record stores and personal collections was a transitory stage, prolonging the inevitable ‘unwrapping’ in private. The promise of something untouched and unexplored beyond the removal of the ‘nylon stockings’ of the vinyl sleeve; the enticement to come into physical contact with the textured ridges of the LP in order to move the play head to a desired point from which the experience will begin, articulates the seductive, and culturally entrenched power of the narrative database, and its private use. While the vinyl object constructed a narrative able to oscillate between public and private modes, the encoding of sound into mp3 or wma, by its presence as naked data is both direct and indirect, and foreshadows the general role of technology universally – to standardise action into repetitive occurrences – producing residues of a direct action. The digital music file has already been “unwrapped”; it is a conversion, a singularity, the “animal” which enters into things, signalling a change of state (Deleuze and Guattari 27). What is being altered and reassembled in the translation from analogue to digital is not only the format of the data, but the surrounding assemblage/phylum. While the LP’s assemblage was a promise of unexplored territory, the less determinate assemblage encasing the digital file, if anything, presents a colonised terrain. It makes explicit the external party (the programmer/conversion software) having proceeded before you. Whether through a ‘peer-to-peer’ or ‘pay-per-download’ service, the digital file becomes the single object accessible to countless, subjects. It is not one, but a multitude of unaccountable ‘unwrappers’. The map, or indexed data, is the catalyst to narrative activity. Its elements are arranged attuned to a cultural sensitivity, in order for its contents to be understood and to be acted upon. Understanding the material album cover as a specific type of cartography – physically shepherding the consumer towards real material locations when examining its digital counterpart in the “icon”, reveals the fragmentary effects of the digital apparatus. The album icon does not merely signal the malleability of subject and object and the rupture of former equations of reality with embodied experience. More importantly, the presence of the icon whether on a webpage, iPod, or playlist, heralds an alteration in the relationship of sound to visuals, and the nature of navigation itself. Albums contained in main street stores and shopping complexes, like the music they reflect, carry – not entirely pejorative – connotations of being “tame”, “tidy” and “bland” (Shaughnessy 5). The search for more experimental music entails a step outside the consumerist domain of the mainstream record industry to “comb the hidden networks of labels releasing new and experimental music”. Labels such as Warp and Beggars Banquet signify their position on the fringe of the economy through album covers “fizzing with … incoherence, weirdness, techno-fetishism, anti-commercialism, anti-design, and visual promiscuity”. The material album cover provides a perceptive map with which to explore a territory. Conversely, the presence of the ‘album icon’ on a website, or alongside a playlist causes the navigator to enter a territory to explore its map. For if a ‘narrative’ is to be understood in Munster’s terms as a set of processes performed upon information, then New Media have the ability to foreground the ‘database’ over ‘narrative’ accounts for its transmissive, rather than reflective aesthetics. Unlike an album cover in its material form – be it vinyl or CD, the icon doesn’t bind a material space – it doesn’t ‘cover’ anything. It is not an object to be transmitted. It is a transmission. It occupies the intermediate ground between narrative and data. The icon, like hypertext, becomes interface, a series of movements through and across unfolding surfaces. It is a performative zone, acting to shepherd site visitors to a review of the album in question, or towards options for attaining its material presence via customised payment. The album icon fragments the conceived assemblage, not only in its foregoing of materiality (which the material presence of the computer would contradict), but through altered methods of navigation; ‘transmitted’ rather than ‘reflective’ topographies of image to genre are aesthetically understood. When every site online becomes equivalent to the next by means of its ‘addressability’ – where everything can be located by an address, and a discrete value, what was formerly the visual equivalent to the music, is now a smooth plateau of perception (Vanhanen). As stated by Novak, technology, or rather human interaction with technology has evolved to the point where the materials transmitted are signs of subjects (1997). The material presence of an LP/CD acted as a set of coordinates with which to circumnavigate and ‘become’ a popular identity. With the digital music file, the ‘seducer’ becomes the ‘seduced’; the package that once contained the LP or CD becomes externalised upon the physical space, its subsequent “wrapping”/“unwrapping” or consumption, contingent upon the ambience created by a particular soundtrack. When consumers enter a territory to explore a map, the binary between narrative and database is blurred. References Deleuze, G., and F. Guattari. Kafka. Trans. Cochran, T. Minneapolis: University of Minnesota Press, 1986. Novak, M. “Transmitting Architecture.” In Kroker, Digital Delirium. New York: St Martin’s Press, 1997. Munster, A. “Compression and Intensification of Visual Information in Flash Aesthetics.” Fine Art Forum 24 May 2004 http://www.fineartforum.org/Backissues/Vol_17/faf_v17_n10/reviews/munster.html>. Shaughnessy, A. “Anti-Design, Playfulness and Techno-Futurism.” Introduction to Intro, Radical Album Cover Art Sampler 3. London: Laurence King Publishing, 2003. 5. Vanhanen, J. “Loving the Ghost in the Machine.” C-Theory 24 May 2002. http://www.ctheory.net/text_asp?pick=312>. Citation reference for this article MLA Style Tsarouhis, Patti. "Mapping the Narrative in a Digital Album Cover." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/08-tsarouhis.php>. APA Style Tsarouhis, P. (Mar. 2006) "Mapping the Narrative in a Digital Album Cover," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/08-tsarouhis.php>.

37

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.

38

Arvanitakis, James. "The Heterogenous Citizen." M/C Journal 10, no.6 (April1, 2008). http://dx.doi.org/10.5204/mcj.2720.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction One of the first challenges faced by new Australian Prime Minister, Kevin Rudd, was what to do with the former government’s controversial citizenship test. While a quick evaluation of the test shows that 93 percent of those who have sat it ‘passed’ (Hoare), most media controversy has focussed less on the validity of such a test than whether questions relating to Australian cricketing legend, Don Bradman, are appropriate (Hawley). While the citizenship test seems nothing more that a crude and populist measure imposed by the former Howard government in its ongoing nationalistic agenda, which included paying schools to raise the Australian flag (“PM Unfurls Flag”), its imposition seems a timely reminder of the challenge of understanding citizenship today. For as the demographic structures around us continue to change, so must our understandings of ‘citizenship’. More importantly, this fluid understanding of citizenship is not limited to academics, and policy-makers, but new technologies, the processes of globalisation including a globalised media, changing demographic patterns including migration, as well as environmental challenges that place pressure on limited resources is altering the citizens understanding of their own role as well as those around them. This paper aims to sketch out a proposed new research agenda that seeks to investigate this fluid and heterogenous nature of citizenship. The focus of the research has so far been Sydney and is enveloped by a broader aim of promoting an increased level of citizen engagement both within formal and informal political structures. I begin by sketching the complex nature of Sydney before presenting some initial research findings. Sydney – A Complex City The so-called ‘emerald city’ of Sydney has been described in many ways: from a ‘global’ city (Fagan, Dowling and Longdale 1) to an ‘angry’ city (Price 16). Sarah Price’s investigative article included research from the University of Western Sydney’s Centre of Culture Research, the Bureau of Crime Statistics and interviews with Tony Grabs, the director of trauma at St Vincent’s Hospital in inner city Darlinghurst. Price found that both injuries from alcohol and drug-related violence had risen dramatically over the last few years and seemed to be driven by increasing frustrations of a city that is perceived to be lacking appropriate infrastructure and rising levels of personal and household debt. Sydney’s famous harbour and postcard landmarks are surrounded by places of controversy and poverty, with residents of very backgrounds living in close proximity: often harmoniously and sometimes less so. According to recent research by Griffith University’s Urban Research Program, the city is becoming increasingly polarised, with the wealthiest enjoying high levels of access to amenities while other sections of the population experiencing increasing deprivation (Frew 7). Sydney, is often segmented into different regions: the growth corridors of the western suburbs which include the ‘Aspirational class’; the affluent eastern suburb; the southern beachside suburbs surrounding Cronulla affectionately known by local residents as ‘the Shire’, and so on. This, however, hides that fact that these areas are themselves complex and heterogenous in character (Frew 7). As a result, the many clichés associated with such segments lead to an over simplification of regional characteristics. The ‘growth corridors’ of Western Sydney, for example, have, in recent times, become a focal point of political and social commentary. From the rise of the ‘Aspirational’ voter (Anderson), seen to be a key ‘powerbroker’ in federal and state politics, to growing levels of disenfranchised young people, this region is multifaceted and should not be simplified. These areas often see large-scale, private housing estates; what Brendan Gleeson describes as ‘privatopias’, situated next to rising levels of homelessness (“What’s Driving”): a powerful and concerning image that should not escape our attention. (Chamberlain and Mackenzie pay due attention to the issue in Homeless Careers.) It is also home to a growing immigrant population who often arrive as business migrants and as well as a rising refugee population traumatised by war and displacement (Collins 1). These growth corridors then, seem to simultaneously capture both the ambitions and the fears of Sydney. That is, they are seen as both areas of potential economic boom as well as social stress and potential conflict (Gleeson 89). One way to comprehend the complexity associated with such diversity and change is to reflect on the proximity of the twin suburbs of Macquarie Links and Macquarie Fields situated in Sydney’s south-western suburbs. Separated by the clichéd ‘railway tracks’, one is home to the growing Aspirational class while the other continues to be plagued by the stigma of being, what David Burchell describes as, a ‘dysfunctional dumping ground’ whose plight became national headlines during the riots in 2005. The riots were sparked after a police chase involving a stolen car led to a crash and the death of a 17 year-old and 19 year-old passengers. Residents blamed police for the deaths and the subsequent riots lasted for four nights – involving 150 teenagers clashing with New South Wales Police. The dysfunction, Burchell notes is seen in crime statistics that include 114 stolen cars, 227 burglaries, 457 cases of property damage and 279 assaults – all in 2005 alone. Interestingly, both these populations are surrounded by exclusionary boundaries: one because of the financial demands to enter the ‘Links’ estate, and the other because of the self-imposed exclusion. Such disparities not only provide challenges for policy makers generally, but also have important implications on the attitudes that citizens’ experience towards their relationship with each other as well as the civic institutions that are meant to represent them. This is particular the case if civic institutions are seen to either neglect or favour certain groups. This, in part, has given rise to what I describe here as a ‘citizenship surplus’ as well as a ‘citizenship deficit’. Research Agenda: Investigating Citizenship Surpluses and Deficits This changing city has meant that there has also been a change in the way that different groups interact with, and perceive, civic bodies. As noted, my initial research shows that this has led to the emergence of both citizenship surpluses and deficits. Though the concept of a ‘citizen deficits and surpluses’ have not emerged within the broader literature, there is a wide range of literature that discusses how some sections of the population lack of access to democratic processes. There are three broad areas of research that have emerged relevant here: citizenship and young people (see Arvanitakis; Dee); citizenship and globalisation (see Della Porta; Pusey); and citizenship and immigration (see Baldassar et al.; Gow). While a discussion of each of these research areas is beyond the scope of this paper, a regular theme is the emergence of a ‘democratic deficit’ (Chari et al. 422). Dee, for example, looks at how there exist unequal relationships between local and central governments, young people, communities and property developers in relation to space. Dee argues that this shapes social policy in a range of settings and contexts including their relationship with broader civic institutions and understandings of citizenship. Dee finds that claims for land use that involve young people rarely succeed and there is limited, if any, recourse to civic institutions. As such, we see a democratic deficit emerge because the various civic institutions involved fail in meeting their obligations to citizens. In addition, a great deal of work has emerged that investigates attempts to re-engage citizens through mechanisms to promote citizenship education and a more active citizenship which has also been accompanied by government programs with the same goals (See for example the Western Australian government’s ‘Citizenscape’ program ). For example Hahn (231) undertakes a comparative study of civic education in six countries (including Australia) and the policies and practices with respect to citizenship education and how to promote citizen activism. The results are positive, though the research was undertaken before the tumultuous events of the terrorist attacks in New York, the emergence of the ‘war on terror’ and the rise of ‘Muslim-phobia’. A gap rises, however, within the Australian literature when we consider both the fluid and heterogenous nature of citizenship. That is, how do we understand the relationship between these diverse groups living within such proximity to each other overlayed by changing migration patterns, ongoing globalised processes and changing political environments as well as their relations to civic institutions? Further, how does this influence the way individuals perceive their rights, expectations and responsibilities to the state? Given this, I believe that there is a need to understand citizenship as a fluid and heterogenous phenomenon that can be in surplus, deficit, progressive and reactionary. When discussing citizenship I am interested in how people perceive both their rights and responsibilities to civic institutions as well as to the residents around them. A second, obviously related, area of interest is ‘civic engagement’: that is, “the activities of people in the various organisations and associations that make up what scholars call ‘civil society’” (Portney and Leary 4). Before describing these categories in more detail, I would like to briefly outline the methodological processes employed thus far. Much of the research to this point is based on a combination of established literature, my informal discussions with citizen groups and my observations as ‘an activist.’ That is, over the last few years I have worked with a broad cross section of community-based organisations as well as specific individuals that have attempted to confront perceived injustices. I have undertaken this work as both an activist – with organisations such as Aid/Watch and Oxfam Australia – as well as an academic invited to share my research. This work has involved designing and implementing policy and advocacy strategies including media and public education programs. All interactions begin with a detailed discussion of the aims, resources, abilities and knowledge of the groups involved, followed by workshopping campaigning strategies. This has led to the publication of an ‘activist handbook’ titled ‘From Sitting on the Couch to Changing the World’, which is used to both draft the campaign aims as well as design a systematic strategy. (The booklet, which is currently being re-drafted, is published by Oxfam Australia and registered under a creative commons licence. For those interested, copies are available by emailing j.arvanitakis (at) uws.edu.au.) Much research is also sourced from direct feedback given by participants in reviewing the workshops and strategies The aim of tis paper then, is to sketch out the initial findings as well as an agenda for more formalised research. The initial findings have identified the heterogenous nature of citizenship that I have separated into four ‘citizenship spaces.’ The term space is used because these are not stable groupings as many quickly move between the areas identified as both the structures and personal situations change. 1. Marginalisation and Citizenship Deficit The first category is a citizenship deficit brought on by a sense of marginalisation. This is determined by a belief that it is pointless to interact with civic institutions, as the result is always the same: people’s opinions and needs will be ignored. Or in the case of residents from areas such as Macquarie Fields, the relationship with civic institutions, including police, is antagonistic and best avoided (White par. 21). This means that there is no connection between the population and the civic institutions around them – there is no loyalty or belief that efforts to be involved in political and civic processes will be rewarded. Here groups sense that they do not have access to political avenues to be heard, represented or demand change. This is leading to an experience of disconnection from political processes. The result is both a sense of disengagement and disempowerment. One example here emerged in discussions with protesters around the proposed development of the former Australian Defence Industry (ADI) site in St Marys, an outer-western suburb of Sydney. The development, which was largely approved, was for a large-scale housing estate proposed on sensitive bushlands in a locality that resident’s note is under-serviced in terms of public space. (For details of these discussions, see http://www.adisite.org/.) Residents often took the attitude that whatever the desire of the local community, the development would go ahead regardless. Those who worked at information booths during the resident protests informed me that the attitude was one best summarised by: “Why bother, we always get stuffed around any way.” This was confirmed by my own discussions with local residents – even those who joined the resident action group. 2. Privatisation and Citizenship Deficit This citizenship deficit not only applies to the marginalised, however, for there are also much wealthier populations who also appear to experience a deficit that results from a lack of access to civic institutions. This tends to leads to a privatisation of decision-making and withdrawal from the public arena as well as democratic processes. Consequently, the residents in the pockets of wealth may not be acting as citizens but more like consumers – asserting themselves in terms of Castells’s ‘collective consumption’ (par. 25). This citizenship deficit is brought on by ongoing privatisation. That is, there is a belief that civic institutions (including government bodies) are unable or at least unwilling to service the local community. As a result there is a tendency to turn to private suppliers and believe that individualisation is the best way to manage the community. The result is that citizens feel no connection to the civic institutions around them, not because there is no desire, but there are no services. This group of citizens has often been described as the ‘Aspirationals’ and are most often found in the growth corridors of Sydney. There is no reason to believe that this group is this way because of choice – but rather a failure by government authorities to service their needs. This is confirmed by research undertaken as early as 1990 which found that the residents now labelled Aspirational, were demanding access to public infrastructure services including public schools, but have been neglected by different levels of government. (This was clearly stated by NSW Labor MP for Liverpool, Paul Lynch, who argued for such services as a way to ensure a functioning community particularly for Western Sydney; NSWPD 2001.) As a result there is a reliance on private schools, neighbourhoods, transport and so on. Any ‘why bother’ attitude is thus driven by a lack of evidence that civic institutions can or are not willing to meet their needs. There is a strong sense of local community – but this localisation limited to others in the same geographical location and similar lifestyle. 3. Citizenship Surplus – Empowered Not Engaged The third space of citizenship is based on a ‘surplus’ even if there is limited or no political engagement. This group has quite a lot in common with the ‘Aspirationals’ but may come from areas that are higher serviced by civic institutions: the choice not to engage is therefore voluntary. There is a strong push for self-sufficiency – believing that their social capital, wealth and status mean that they do not require the services of civic institutions. While not antagonistic towards such institutions, there is often a belief is that the services provided by the private sector are ultimately superior to public ones. Consequently, they feel empowered through their social background but are not engaged with civic institutions or the political process. Despite this, my initial research findings show that this group has a strong connection to decision-makers – both politicians and bureaucrats. This lack of engagement changes if there is a perceived injustice to their quality of life or their values system – and hence should not be dismissed as NIMBYs (not in my backyard). They believe they have the resources to mobilise and demand change. I believe that we see this group materialise in mobilisations around proposed developments that threaten the perceived quality of life of the local environment. One example brought to my attention was the rapid response of local residents to the proposed White City development near Sydney’s eastern suburbs that was to see tennis courts and public space replaced by residential and commercial buildings (Nicholls). As one resident informed me, she had never seen any political engagement by local residents previously – an engagement that was accompanied by a belief that the development would be stopped as well as a mobilisation of some impressive resources. Such mobilisations also occur when there is a perceived injustice. Examples of this group can be found in what Hugh Mackay (13) describes as ‘doctor’s wives’ (a term that I am not wholly comfortable with). Here we see the emergence of ‘Chilout’: Children out of Detention. This was an organisation whose membership was described to me as ‘north shore professionals’, drew heavily on those who believed the forced incarceration of young refugee children was an affront to their values system. 4. Insurgent Citizenship – Empowered and Engaged The final space is the insurgent citizen: that is, the citizen who is both engaged and empowered. This is a term borrowed from South Africa and the USA (Holston 1) – and it should be seen as having two, almost diametrically opposed, sides: progressive and reactionary. This group may not have access to a great deal of financial resources, but has high social capital and both a willingness and ability to engage in political processes. Consequently, there is a sense of empowerment and engagement with civic institutions. There is also a strong push for self-sufficiency – but this is encased in a belief that civic institutions have a responsibility to provide services to the public, and that some services are naturally better provided by the public sector. Despite this, there is often an antagonistic relationship with such institutions. From the progressive perspective, we see ‘activists’ promoting social justice issues (including students, academics, unionists and so on). Organisations such as A Just Australia are strongly supported by various student organisations, unions and other social justice and activist groups. From a reactionary perspective, we see the emergence of groups that take an anti-immigration stance (such as ‘anti-immigration’ groups including Australia First that draw both activists and have an established political party). (Information regarding ‘anti-refugee activists’ can be found at http://ausfirst.alphalink.com.au/ while the official website for the Australia First political part is at http://www.australiafirstparty.com.au/cms/.) One way to understand the relationship between these groups is through the engagement/empowered typology below. While a detailed discussion of the limitations of typologies is beyond the scope of this paper, it is important to acknowledge that any typology is a simplification and generalisation of the arguments presented. Likewise, it is unlikely that any typology has the ability to cover all cases and situations. This typology can, however, be used to underscore the relational nature of citizenship. The purpose here is to highlight that there are relationships between the different citizenship spaces and individuals can move between groups and each cluster has significant internal variation. Key here is that this can frame future studies. Conclusion and Next Steps There is little doubt there is a relationship between attitudes to citizenship and the health of a democracy. In Australia, democracy is robust in some ways, but many feel disempowered, disengaged and some feel both – often believing they are remote from the workings of civic institutions. It would appear that for many, interest in the process of (formal) government is at an all-time low as reflected in declining membership of political parties (Jaensch et al. 58). Democracy is not a ‘once for ever’ achievement – it needs to be protected and promoted. To do this, we must ensure that there are avenues for representation for all. This point also highlights one of the fundamental flaws of the aforementioned citizenship test. According to the Department of Immigration and Citizenship, the test is designed to: help migrants integrate and maximise the opportunities available to them in Australia, and enable their full participation in the Australian community as citizens. (par. 4) Those designing the test have assumed that citizenship is both stable and, once achieved, automatically ensures representation. This paper directly challenges these assumptions and offers an alternative research agenda with the ultimate aim of promoting high levels of engagement and empowerment. References Anderson, A. “The Liberals Have Not Betrayed the Menzies Legacy.” Online Opinion 25 Oct. 2004. http://www.onlineopinion.com.au/view.asp?article=2679>. Arvanitakis, J. “Highly Affected, Rarely Considered: The International Youth Parliament Commission’s Report on the Impacts of Globalisation on Young People.” Sydney: Oxfam Australia, 2003. Baldassar, L., Z. Kamalkhani, and C. Lange. “Afghan Hazara Refugees in Australia: Constructing Australian Citizens.” Social Identities 13.1 (2007): 31-50. Burchell, D. “Dysfunctional Dumping Grounds.” The Australian 10 Feb. 2007. http://www.theaustralian.news.com.au/story/0,20867,21199266-28737,00.html>. Burnley, I.H. The Impact of Immigration in Australia: A Demographic Approach. Melbourne: Oxford UP, 2001. Castells, M. “European Cities, the Informational Society, and the Global Economy.” New Left Review I/204 (March-April 1994): 46-57. Chamberlain, C., and D. Mackenzie. Homeless Careers: Pathways in and out of Homelessness. Melbourne: RMIT University, 2002. Chari, R., J. Hogan, and G. Murphy. “Regulating Lobbyists: A Comparative Analysis of the United States, Canada, Germany and the European Union.” The Political Quarterly 78.3 (2007): 423-438. Collins, J. “Chinese Entrepreneurs: The Chinese Diaspora in Australia.” International Journal of Entrepreneurial Behaviour & Research 8.1/2 (2002): 113-133. Dee, M. “Young People, Citizenship and Public Space.” International Sociological Association Conference Paper, Brisbane, 2002. Della Porta, D. “Globalisations and Democracy.” Democratizations 12.5 (2005): 668-685. Fagan, B., R. Dowling, and J. Longdale. “Suburbs in the ‘Global City’: Sydney since the Mid 1990s.” State of Australian cities conference. Parramatta, 2003. Frew, W. “And the Most Polarised City Is…” Sydney Morning Herald 16-17 Feb. 2008: 7. Gleeson, B. Australian Heartlands: Making Space for Hope in the Suburbs. Crows Nest: Allen and Unwin, 2006. Gleeson, B. “What’s Driving Suburban Australia?” Australian Policy Online 15 Jan. 2004. http://www.apo.org.au/webboard/results.chtml?filename_num=00558>. Gow, G. “Rubbing Shoulders in the Global City: Refugees, Citizenship and Multicultural Alliances in Fairfield, Sydney.” Ethnicities 5.3 (2005): 386-405. Hahn, C. L. “Citizenship Education: An Empirical Study of Policy, Practices and Outcomes.” Oxford Review of Education 25.1/2 (1999): 231-250. Hawley, S. “Sir Donald Bradman Likely to Be Dumped from Citizenship Test.” ABC Local Radio Online. 29 Jan. 2008. http://www.abc.net.au/am/content/2007/s2148383.htm>. Hoare, D. “Bradman’s Spot in Citizenship Test under Scrutiny.” ABC Local Radio online. 29 Jan. 2008. http://www.abc.net.au/pm/content/2008/s2149325.htm>. Holston, J. Insurgent Citizenship: Disjunctions of Democracy and Modernity in Brazil. California: Cloth, 2007. Jaensch, D., P. Brent, and B. Bowden. “Australian Political Parties in the Spotlight.” Democratic Audit of Australia Report 4. Australian National University, 2004. Mackay, H. “Sleepers Awoke from Slumber of Indifference.” Sydney Morning Herald 27 Nov. 2007: 13. NSWPD – New South Wales Parliamentary Debates. “South Western Sydney Banking Services.” Legislative Assembly Hansard, 52nd NSW Parliament, 19 Sep. 2001. Portney, K.E., and L. O’Leary. Civic and Political Engagement of America’s Youth: National Survey of Civic and Political Engagement of Young People. Medford, MA: Tisch College, Tufts University, 2007. Price, S. “Stress and Debt Make Sydney a Violent City.” Sydney Morning Herald 13 Jan. 2008: 16. Pusey, M. The Experience of Middle Australia: The Dark Side of Economic Reform. Cambridge: Cambridge UP, 2003. White, R. “Swarming and the Social Dynamics of Group Violence.” Trends and Issues in Crime and Criminal Justice 326 (Oct. 2006). http://www.aic.gov.au/publications/tandi2/tandi326t.html>. Wolfe, P. “Race and Citizenship.” Magazine of History 18.5 (2004): 66-72. Citation reference for this article MLA Style Arvanitakis, James. "The Heterogenous Citizen: How Many of Us Care about Don Bradman’s Average?." M/C Journal 10.6/11.1 (2008). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0804/07-arvanitakis.php>. APA Style Arvanitakis, J. (Apr. 2008) "The Heterogenous Citizen: How Many of Us Care about Don Bradman’s Average?," M/C Journal, 10(6)/11(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0804/07-arvanitakis.php>.

39

Melchior, Angelika. "Tag & Trace Marketing." M/C Journal 8, no.4 (August1, 2005). http://dx.doi.org/10.5204/mcj.2385.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

The use of RFID (radio frequency identification), also called “smart tags”, is on the rise in the retail industry. In short, RFID are tiny microchips using short range radio signals to emit information and can be used to tag goods, buildings, cars, pets, people etc. Unlike bar-code scanners, which must be held directly in front of the item being scanned, one of the benefits of RFID tags is that they can be scanned from a distance. It is expected that RFID will eventually replace the bar code and its use is likely to save companies like Wal-Mart, Procter & Gamble and Gillette millions of dollars as they can track every bottle of shampoo or packet of razor blades from the factory floor to the store shelf (Baard, “Lawmakers”). Most agree that using RFID to track goods from the point of manufacture to the location of sale in order to prevent goods being lost, stolen or handled inappropriately, is acceptable and not cause for privacy concerns. But as marketers often take every opportunity to learn more about consumers and their purchasing behaviours, some fear that tags embedded in clothing, membership cards, mobile phones etc. may be scanned inappropriately and used to target individuals with cleverly tailored marketing messages. In the effort to provide a more customised experience, business is at risk of becoming increasingly intrusive – something that will not be universally acceptable. But is it all bad? Privacy concerns aside, smart tags can add new functions as well as enable a whole range of innovative products and services when joined with other technologies. RFID beyond Traditional Value Chain Management Prada is often mentioned as an example of how RFID can be taken beyond the traditional value chain management. Prada has implemented some ground-breaking technology in their Manhattan (New York) store, all based around RFID. RF-receivers automatically detect and scan garments brought into the dressing room. Via a touch screen the customers view tips on how to mix and match, access information about available sizes, colours, fabrics and styles, and watch video clips of models wearing the very outfit they are trying on (Grassley, ”Prada’s”). Eventually customers will be able to create virtual closets and store information about what they have tried on or bought on their Prada Web account (”Prada’s”). Customers’ details, including notes made by sales assistants, e.g. preferences, can be stored automatically in customer cards, readable by sales assistants’ handhelds or at the cash register (”Prada’s”) – information that could be used by the assistant to spur further sales by suggesting for example: “Last time you were here, you bought a black skirt. We have a sweater that matches that skirt” (Batista). Another example is Precision Dynamics Corp (PDC), which developed an automatic identification wristband incorporating RFID technology. One application is the AgeBand which is used to verify the bearer’s age when purchasing alcohol. ID is checked when entering the venue and the customer receives a plastic wristband printed with personal details that cannot be removed without being damaged or destroyed (Swedberg). The embedded chip can be linked to a customer’s credit card number or a cash deposit to pay for purchases while on the premises. “It is also an easy way to collect statistics for marketing”, says PDC’s senior marketing communications specialist, Paula Maggio (qtd. in Swedberg). Although the RFID clearly provides benefits and new opportunities to business operations, there is an argument over whether consumers will ultimately gain or suffer when smart tags become more commonplace. Certainly it may be convenient to have smart hangers that project virtual clothes onto a customer’s reflection in the mirror so they can try on a range of outfits without having to remove their clothes, but the collection of personal information necessary to provide this convenience also raises complex privacy issues. Fear of Intrusive Marketing Hesseldahl believes that our homes, workplaces, shops, malls, cars, trains, planes and bicycles will all be environments that constantly notice who we are and what we are doing, and which – according to a detailed profile of our habits – will try to service us in ways we can hardly even imagine today (25). This may be helpful to us in many ways, but there are concerns that organisations will use RF-technology to connect product information to individuals in order to create personal profiles which can then be used for pin-pointed marketing purposes, or even for tracking individuals, without their knowledge or consent. A possible scenario is one where consumers are bombarded with intrusive advertising based on what they are wearing, what they are purchasing, their history of past purchases, demographics and more. “Kill Machines” Fearing that the technology will be abused, many privacy advocates suggest that RFID must only be used to keep track of goods in the supply chain and thus be deactivated as soon as they leave the store. For example, consumer organisations such as CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering), the American Civil Liberties Union, and Electronic Frontiers Australia, lobby for the obligatory deactivation of the tags at the point of purchase. But companies such as Procter & Gamble and Wal-Mart would prefer to keep the tags active after checkout, rather than disabling them with so called “kill machines”, so they can match the unique codes emitted by RF-tags to shopper’s personal information (Baard “Watchdog”). They will want to use RF technology to support the sales process and to provide the consumer with new and better services than what is otherwise possible. And without doubt, if the tags are deactivated some genuinely helpful applications would be lost to the consumer, e.g. being able to call your refrigerator from the supermarket to check if you need milk or your washing machine alerting you if you have accidentally put a delicate garment in your white wash. Looking at the Bright Side Privacy concerns aside, RFID technology, in fact, has the potential to empower consumers as it will put more information about products at consumers’ fingertips. Consumers will for example be able to go into competing supermarkets and scan items with an RF-receiver embedded in their mobile phone, record prices, store and process the information to evaluate which store offers better value. The information can then be shared with other shoppers via the Internet, and suddenly we have a powerful “shopping bot” which transcends the online world. Consequently, RFID has the potential to make competition between retailers tougher than ever before and to benefit consumers through lower and more transparent pricing. In addition, RFID tags may also make possible faster and more accurate services, particularly in supermarkets. Shopping carts are mounted with computers which automatically register all items put into the cart and enable the customer to keep track of items, their prices and their total amount (Blau). RFID can also be used to find the location of items in the store and show more detailed information on a product (origin, use by date, content etc.) and as the customer passes through the checkout, all purchases are registered automatically in a matter of seconds. Privacy Protection In Australia, the Privacy Amendment (Private Sector) Act 2000, with its ten National Privacy Principles (NPP), has been highly criticised over the last few years as being much to open for interpretation and thus difficult to reinforce. In short, the NPP allows for marketers to use non-sensitive personal information for direct marketing purposes without seeking the individual’s consent if it is impracticable to do so (“Guidelines”). That is, as long as they make available a privacy policy explaining why the data is collected and who will have access, they ensure that the data is correct and up to date, protected from unauthorised access, and that individuals are given access to their data upon request (“Guidelines”). In 2003 the Spam Act was introduced in order to take a tougher stand on the escalating problem with massive amounts of unsolicited emails filling up inboxes, threatening the whole concept of the Internet and its many benefits. In essence, the Spam Act will not allow commercial electronic messages to be sent without the recipient’s prior consent or without a possibility to unsubscribe (“Spam”). In the same manner that the Spam Act was passed to regulate the collection of Internet users’ contact information, it may become necessary to regulate the collection and use of data obtained via RFID if the NPP are deemed inadequate. The difficulty will be to do so and at the same time safeguard many of the positive side-effects the technology may have for businesses and consumers. As argued by Roger Clarke, privacy has to be balanced against many other, often competing interests: “The privacy interest of one person may conflict with that of another person, or of a groups of people, or of an organisation, or of society as a whole. Hence: Privacy Protection is a process of finding appropriate balances between privacy and multiple competing interests.” It is therefore recommended that legislators and policy makers keep up with the development and undertake significant research into both sides before any legislation is passed so that the best interests of consumers and business are catered for. Can There Be a Win-Win Situation? Although business can expect some significant gains from the use of RFID, particularly through a more effective value chain management but also from more substantial and better quality business intelligence, consumers may in fact be the real winners as new and better business concepts, products and services are made available. Further, with the increased transparency in business, consumers can use the vast amounts of information available to find the best products and services, at the best price, and from the best provider. With the aid of smart software, such as search agents, it will be a rather effortless task and will provide consumers with a real advantage. But this assumes consumers are aware of the benefits and how they can be exploited, and have the means to do so – something that will require some skill, interest, money and time. Consumers will also have to give up some privacy in order to take full advantage of the new technology. For the industry, the main challenge will be communicating what these advantages are, as acceptance, adoption and thus also return on investment will depend upon it. For legislators and policy makers, the major dilemma will be to provide a regulatory framework that is flexible but distinct, and that will prevent abuse and at the same time enable positive outcomes for both business and consumers. A fine line that should be treaded wisely in order to create a future where everyone can gain from the benefits of using this technology. References Baard, Mark. “Lawmakers Alarmed by RFID Spying.” Wired News 26 Feb. 2004. 9 Mar. 2004 http://www.wired.com/news/privacy/0,1848,62433,00.html>. Baard, Mark. ”Watchdog Push for RFID Laws.” Wired News 5 Apr. 2004. 6 Apr. 2004 http://www.wired.com/news/privacy/0,1848,62922,00.html>. Batista, Elisa. ”What Your Clothes Say about You.” Wired News 12 Mar. 2003. 8 Mar. 2004 http://www.wired.com/news/wireless/0,1382,58006,00.html>. Blau, John. ”Så fungerar det digitala snabbköpet.” PC för Alla 1 (2004). 8 Mar. 2004 http://www.idg.se/ArticlePages/200402/27/20040227165630_IDG. se760/20040227165630_IDG.se760.dbp.asp>. Clarke, Roger. Beyond the OECD Guidelines: Privacy Protection for the 21st Century. 4 Jan. 2000. 15 Mar. 2004 http://www.anu.edu.au/people/Roger.Clarke/DV/PP21C.html>. Grassley, Tanya. ”Retailers Outfit Stores with Tech.” Wired News 18 Dec. 2002. 8 Mar. 2004 http://www.wired.com/news/holidays/0,1882,56885,00.html>. “Guidelines to the National Privacy Principles.” The Office of the Federal Privacy Commissioner 2001. 4 Apr. 2004 http://www.privacy.gov.au/publications/nppgl_01.html#sum>. Hessledahl, Peter. Den globale organisme. Copenhagen: Aschehoug, 2002. 24 Apr. 2004 http://www.global-organisme.dk/e-bog/den_globale_organisme.pdf>. ”Prada’s Smart Tags Too Clever?” Wired News 27 Oct. 2002. 9 Mar. 2004 http://www.wired.com/news/technology/0,1282,56042,00.html>. “Spam” DCITA 2004. 4 Apr. 2004 http://www2.dcita.gov.au/ie/trust/improving/spam>. Swedberg, Claire. ”Putting Drinks on the Cuff.” RFID Journal 15 Jun. 2004. 15 Jun. 2004 http://www.rfidjournal.com/article/articleview/987/1/1/>. Citation reference for this article MLA Style Melchior, Angelika. "Tag & Trace Marketing." M/C Journal 8.4 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0508/03-melchior.php>. APA Style Melchior, A. (Aug. 2005) "Tag & Trace Marketing," M/C Journal, 8(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0508/03-melchior.php>.

40

Jarrett, Kylie. "Ordering Disorder." M/C Journal 7, no.6 (January1, 2005). http://dx.doi.org/10.5204/mcj.2476.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Central within the discourses that have surrounded the commercial internet during its emergence has been an underlying promise of disorder. The claims for consumer empowerment with which e-commerce was promoted and discussed within industry and academic literature (Flamberg; Gates; Horton; Levine et al. for instance), coupled with recurring claims that the emergence of e-commerce was as profound a shift as that occasioned by the Industrial Revolution (Dancer; Sullivan; Lynch for instance), established an underlying sense of chaotic upheaval – a clear and present danger to the established order. And on the surface it would appear as if the commercial internet does serve as a challenge to established authority. User interfaces function by offering a degree of autonomy and informal control to the user. However, the infrastructure supporting e-commerce is multi-layered. It is here that the friendly interface cedes to a vast data structure: an ordered and ordering database. Using an August 2002 sample of the corporate portal ninemsn extensively analysed as part of a broader PhD project, this paper explores the tension between front end disorder and back end order. Its goal is to indicate how the surface forms of this site are superimposed on a machinery which orders, or perhaps disciplines, consumer activity. The ninemsn Interface The ninemsn website is typified by a dominance of written text over graphic images. It is constituted primarily by complex noun phrases (the most commonly occurring utterance type) followed by imperative formations. Less often used are statements and interrogatives. The preponderance of noun phrases is readily explained by the metafunction of these utterances as hypertext anchors. Content analyses conducted by Haas and Grams indicate a typical use of noun phrases as anchor text on websites. But it is the fact that all of the phrase types are used on the ninemsn website as hypertext which renders the distinction between utterance types redundant. Despite their different surface forms, the status of the utterances as hypertext anchors makes them similar in terms of function. All of the utterances become actionable, open to activation and engagement by the consumer, thereby challenging their function as direct commands or statements. By inviting the act of linking, hypertext presupposes that there is ‘something else’ which lies behind those pieces of text. They are, therefore, never merely utterances which can be interpreted solely at their surface but are marked by the immanent existence of what Chomsky calls deep structure, layers of significance beyond that revealed in the surface form. None of the linguistic features previously identified is therefore a simple utterance. Each has an alternative form and function by virtue of the fact that it is constituted within a logic of hypertext. On ninemsn all the utterances have the performative (illocutionary) force (Austin) of offers. The surface forms can be read as the result of a transformation (Chomsky) of this underlying linguistic structure. The base form best associated with a commercial institution operating within a hypertextual medium is the interrogative “would you like …?” Consequently, the noun phrase “Bust-shaping bodysuit” (ninemsn Home Page 12 Aug 2002) is a transformation of the underlying interrogative “Would you like a bust-shaping bodysuit?”, or the humble statement “I [ninemsn] offer you [the user] a bust-shaping bodysuit”. But what is significant is that for the site to make sense and serve as something other than a random collection of statements and imperatives, this underlying form must be recovered by the user. And it would be a naïve user indeed who did not recognise the polite offers of hypertext which underpin the commands appearing at the surface of the ninemsn website. These transformative effects mitigate the power, or control, being obviously exerted by the company over the user’s experience of ninemsn. Firstly they do this by transforming commands and bold declaratives into polite inquiries. But the very nature of hypertext alone works to this end. As Miles has argued, the illocutionary force of hypertext, in this case the act of offering, is contained within the relationship between anchor text and the destination site. “It is not in the nodes that hypertext ‘happens’, but in the causal connections and pathways made between nodes” (Miles “Cinematic Paradigms” n.pag.). Thus, for Miles, what becomes important in a hypertextual document is the ‘event of connection’ (“Hypertext Structure” n.pag.) – an act performed by the user. Thus, hypertext and the performative power it extends to the statements on the ninemsn website, make the user the key active agent in the determination of meaning on the site rather than the company. By denying control of the site, both in the form of user activated hypertext and through the underlying invitational nature of its utterances, ninemsn opens itself to random and chaotic interaction. It becomes a site not for the direct and strict ordering of users – neither in the form of direct imperatives nor in the form of control of practice. Rather it is a site for the de-control of user activity. The interactivity enabled by hypertext here becomes a tool for disorder. The ninemsn Database However thus far we have only examined the surface structures of the site, the user-friendly interface of the corporate entity that is ninemsn. Below this lies the infrastructure of the site: the database. ninemsn is a database in two senses. Firstly it is a collection of sites, pages, and links which cohere under the ninemsn brand umbrella. Pages which are marked with the ninemsn brand, and to which links are directly offered from the site, do not constitute the entire World Wide Web. This occurs despite the site’s description as a portal implying that it functions as a window onto the system. At this level, ninemsn can be conceived as a particular ordering through selection and collation of the information system that is the Web. But it is also an active ordering of the activities of the user. By only offering a limited set of links to strategic partners, and offering paid listings foremost in its Web-wide search function, the site delimits the autonomy which it appears to offer at the hypertextual interface. At the level of the database, it becomes an attenuated autonomy, ordered by strategic hyperlinking (Jackson). But ninemsn is also a database of consumers and consumer traffic patterns which are then onsold to advertisers and strategic partners. The site invites users to personalise the interface by entering preferences which effectively expose their consumer behaviour. They are offered memberships which result in extra rewards but involve filling in a proforma listing personal details remarkably similar to the demographic information the site offers advertisers about its consumers. By entering data into the system in these ways – a voluntary act of choice lured by the personalisation options it enables – the consumer becomes ordered. Online consumer activity here becomes organised into a set of pre-ordained fields which constitute that user for the purposes of that transaction (Poster). They become known, not through the self-directed, disorderly conduct of surfing, but through the pre-defined and orderly fields of the marketing database. This effect can be traced further in the commercial Web. By similarly mapping the behaviours of users, cookies and other forms of more passively activated ‘spyware’ also reduce the behaviour of users to pre-constituted fields of value. As the consumer interacts with the system following the polite invitations of hypertext, the system orders this trail into valuable marketing data. Thus, it is the same hypertext which offers the illusion of autonomy at the site interface which enables the increasing surveillance and ordering of consumers at the lower levels of the database. Interactivity as an Ordering Practice Interactivity and its e-commerce companion, the promise of personalisation, here become disciplining practices, seductively drawing the consumer further into the ordering machinery of the site. They encourage the user to submit more and more of their Self – their interests, the trajectory of their logic – to the ordering gaze of the market. Using Virilio’s terms, we can therefore understand interactivity in e-commerce as both an accelerator and a brake on human movement, in this instance the movement of hypertext as the manifestation of individual choice. It is both a technology which ‘empowers’ the user to move in their personally determined disordered fashion, mimicking the radical potential of dynamic bodies, and a delimiting of that potential into the regimented service of commerce. But this is not to argue that consumers necessarily accept this role, nor to imply any (over)- determining role for hypertextual environments. Foucault himself recognises the immanent potential for resistance within any disciplining practice. It is however, to point to the ordered disordering that constitutes the new media environment, particularly in its commercial forms. Like Featherstone on consumer culture we can read interactive media as a site for the ‘controlled de-control’ of emotion. We can see it as a site where disorder is not necessarily the weapon of the revolutionary or the radical, but is also, and simultaneously, in the service of the order it ostensibly challenges. References Austin, J.L. How to Do Things with Words: The William James Lectures Delivered at Harvard University in 1955. 2nd edition. Eds. J.O. Urmson and Marina Sbisa. Oxford: Clarendon Press, 1975. Chomsky, Noam. Aspects of the Theory of Syntax. Cambridge, Massachusetts: MIT Press, 1965. Dancer, Helen. “Riding the Storm”. The Bulletin 1 Feb 2000: 64-5. Featherstone, Mike. Consumer Culture and Postmodernism. London: Sage, 1991. Flamberg, Danny. “Understanding the Empowered E-Consumer”. iMarketing News 1.9 (19 Nov 1999): 32. Foucault, Michel. The Will to Knowledge: The History of Sexuality, Vol. 1. Harmondsworth: Penguin, 1998. Trans. Robert Hurley. Originally published 1976. Gates, Bill, with Nathan Myhrvold and Peter Rinearson. The Road Ahead. Revised edition. London: Penguin Books, 1996. Originally published 1995. Haas, Stephanie W., and Erika S. Grams. “Page and Link Classifications: Connecting Diverse Resources”. Proceedings of the Third ACM Conference on Digital Libraries, Pittsburgh, Pennsylvania, USA, 1998: 99-107. 2 Oct 2002 http://portal.acm.org>. Haas, Stephanie W., and Erika S. Grams. “Readers, Authors and Page Structure: A Discussion of Four Questions Arising from a Content Analysis of Web Pages.” Journal of the American Society for Information Science 51.2 (2000): 181-92. Horton, Matthew. “The Internet and the Empowered Consumer: From the Scarcity of the Commodity to the Multiplicity of Subjectivities.” Media International Australia 91 (May 1999): 111-23. Jackson, Michele H. “Assessing the Structure of Communication on the World Wide Web”. Journal of Computer-Mediated Communication 3.1 (Jun 1997). 8 Aug 2002 http://www.ascusc.org/jcmc/> Levine, Rick, Christopher Locke, Doc Searls and David Weinberger. The Cluetrain Manifesto: The End of Business as Usual. South Yarra: Hardie Grant Books, 2000. Lynch, Adrian. “Revolution Gives Power to Consumers.” The Australian 30 May 2000: IT section 17. Miles, Adrian. “Cinematic Paradigms for Hypertext.” Presented at Digital Arts & Culture conference, Bergen, Norway, 26-28 Nov 1998. 3 Oct 2002 http://cmc.uib.no/dac98/> Miles, Adrian. “Hypertext Structure as the Event of Connection.” Journal of Digital Information 2.3 (2002). Originally presented at ACM Hyperlink 2001 conference in Aarhus, Denmark. 5 Sep 2002 http://jodi.ecs.soton.ac.uk>. Poster, Mark. The Second Media Age. Cambridge: Polity Press, 1995. Sullivan, Andrew. “Dotcommo e-Volution”. The Australian 19 Jun 2000: 40. Virilio, Paul. Speed and Politics: Essays on Dromology. New York: Semiotext(e), 1986. Trans. Mark Polizzotti. Originally published 1977. Citation reference for this article MLA Style Jarrett, Kylie. "Ordering Disorder: ninemsn, Hypertext and Databases." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/07-jarrett.php>. APA Style Jarrett, K. (Jan. 2005) "Ordering Disorder: ninemsn, Hypertext and Databases," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/07-jarrett.php>.

41

McAvan, Em. "“Boulevard of Broken Songs”." M/C Journal 9, no.6 (December1, 2006). http://dx.doi.org/10.5204/mcj.2680.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Ever since the spread of cheap sampling technology in the 1980s, popular music has incorporated direct quotations from other songs. This trend reached its zenith in the “mash-up,” that genre of popular music which has emerged in the last 5 or 6 years. Most famously, DJ Dangermouse distributed his “Grey Album,” a concept that mashed together the a Capella vocals from Jay-Z’s Black Album with the music from the Beatles’ White Album. Distribution of the project was swiftly met with a Cease and Desist order from the Beatles’ label EMI, leading to the Grey Tuesday online protest in which many websites distributed the album for free in the name of free expression. As the name suggests, “mash-ups,” sometimes also called bootlegs, mash together two or more already released songs. This use of the term ‘bootlegs’ should not to be confused with bootleg recordings of albums or concerts, which are merely illegal copies sold for profit. Both mash-ups and bootlegs are new pieces of art, almost always unable to be bought from stores. In their most basic form, mash-ups take the vocal from one song and the instrumental from another—what bootleggers call an A+B. This has taken ever more elaborate forms, for instance, San Francisco’s DJ Earworm’s “Stairway to Bootleg Heaven” mashes together Dolly Parton, the Beatles, Art of Noise, Pat Benatar, the Eurythmics, and Laurie Anderson. By now, the history of mash-ups and illegal sampling in general has been well covered by many journalists (See, for instance, Sasha Frere Jones and Pete Rojas). The question, then, is not so much what mash-ups are so much as what they do. Many theories of consumer reception have often reductively posited a passive audience impelled by little more than the desire to consume. When it comes to popular culture in modernity, Frankfurt School theorist Theodor Adorno, both in his own writing and with Horkheimer, made the hugely influential argument that the only cultural work it can do is in the service of hegemonic capitalism. Adorno argued, “the entire practice of the culture industry transfers the profit motive naked onto cultural forms” (232). Painting his argument in rather stark terms, Adorno said that “the categorical imperative of the culture industry no longer has anything in common with freedom. It proclaims: you shall … conform to that which exists anyway” (236). As philosopher Jane Bennett points out, Adorno and Horkheimer construct a passive audience consuming the derivative, repetitious pleasures of mass culture, under the thrall of the fetishised commodity “as if it was alive” (Bennett 123). Horkheimer and Adorno’s influential work denies the “possibility of an affective response to commodities able to challenge the socioeconomic system that generates it” (Bennett 121). Adorno damns the modern culture industries, but in an interesting way he also elevates their power, for his theory privileges the producer of the text, not its consumer. The question presents itself, therefore, what happens when subjects are both consumers and producers? The makers of mash-ups are clearly both. Arguably, mash-ups are a fannish re-appropriation in the manner that Henry Jenkins uses to describe slash fan-fiction in Textual Poachers (Jenkins). Like slash writers, mash-up artists take a common popular culture (music in this case) and appropriate it for their own desires and creative impulses. Rather than a purely passive audience, mash-ups show there exists at least a segment of an engaged audience, able to deconstruct and rework popular culture. Jenkins argues that “fandom celebrates not exceptional texts but exceptional readings” (284), a facet clearly exemplified in mash-ups use of not only the rock canon but “disposable” pop and chart R&B. What makes a mash-up interesting is not that it uses quality critically-approved materials, but that it re-works its materials into new contexts. Bootlegs as a whole can embody the “dissonant possibilities” of the commodity (Bennett 127)—as disruption of the normative reading of songs, as a critique of postmodern capitalism, as an affirmation of consumption, as a critique of the pop auteur cult that privileges certain acts as “art” and not others, as frivolous party music, and more. Most obviously, of course, mash-ups illuminate Fredric Jameson’s thesis that postmodern art is an art of pastiche (Jameson). Mash-ups often take disparate elements, songs from different genres, and make songs that shouldn’t belong together somehow work. Freelance Hellraiser’s classic “Stroke of Genius” bootleg took then band du jour The Strokes and overlayed pop muppet Christina Aguilera’s “Genie in A Bottle” vocals into a surprisingly soulful new song, showing in the process that the gap between “manufactured” pop artist and “authentic” rock artist may not be as far as some would imagine. Alternatively, artists can mash together songs that are basically the same, pointedly noting their lack of originality—for instance, the mash-up from which this article takes its name, San Francisco bootlegger Party Ben’s “Boulevard of Broken Songs,” which takes Green Day’s recent “Boulevard of Broken Dreams” and shows its uncanny similarity to Oasis’s “Wonderwall,” as well as other songs by Travis, Coldplay and Aerosmith. Like any commodity, mash-ups are in some ways implicated in a hegemonic capitalist economy. They are an object to be consumed, and are reliant on the consumption of other texts. In a practical sense for its makers, making mash-ups requires the software to make music, often the Sony-owned ACID program, whose loop based lay-out lends itself to the use of sampled materials. Given their general immersion in technology, it is questionable whether bootleggers necessarily purchase these programs, given the availability of “cracked” software on peer-to-peer downloading programs and Bit-Torrent. Similarly, making mash-ups might require the purchase of CDs or mp3s, although again this is far from certain, given the easy accessibility of “illegal” mp3s downloadable on the internet (but of course that requires the money for an internet connection, as does the hosting of mp3s on individual mash-up sites). Compared to the money needed to “legitimately” release songs, though, mash-ups are a relatively inexpensive way to create “new” music. Most mash-up artists post their work with a disclaimer with words to the effect of “I don’t own these songs, I will take these songs down if asked by the copyright owners, don’t sue me.” Songs are usually available to download for free, and the selling of mash-up CDs on E-bay is highly frowned-upon. While this is partly an attempt to avoid being sued by copyright holders, it also suggests an opting-out of a capitalistic system—art for art’s sake. The most obvious critique of capitalism occurs in the form of the “cut-up,” which sees songs or speeches sampled and reassembled to form different meanings. This may be political, for example, the cut-up by RX that re-assembled George W Bush’s speeches into U2’s anti-war song “Sunday Bloody Sunday.” Australian readers may remember the satirical Pauline Pantsdown single “I Don’t Like It” which re-arranged right-wing One Nation politician Pauline Hanson’s voice into nonsensical sayings about shopping trolleys and discos. Like the slash that Jenkins applauds, this may also take the form of a rupture of the heteronormative surface of most pop music. One good example is Bristol mash-up artist Andrew Herring’s “Blue Cheese mix” which cut together Avril Lavigne’s “Sk8r Boi” into a homoerotic love song (“He was a boy/he was a boy/can I make it anymore obvious?”), over the top of such queer-friendly songs as Sylvester’s “You Make Me Feel Mighty Real” and Placebo’s “Nancy Boy.” This is not to suggest that queer sexuality is outside of a capitalistic economy, but rather that queer re-readings take popular music culture into new contexts less frequently taken by the largely heteronormative music industry. But while some mash-up culture exhibits a decidedly anti-capitalist out-look, a few mash-up artists have made the leap from bootlegger to major-label sanctioned artist. The press coverage for the aforementioned Dangermouse got him a production gig with the Gorillaz and the leverage to release his much-hyped Gnarls Barkley project with Cee-Lo (of course, it rather helped that he already had a record deal with rapper Gemini). Richard X’s bootlegs landed him a number one UK single when the Sugababes re-recorded his “Freak Like Me” mash-up, and a number of mash-ups have been licensed by the labels of the original artists and released officially (French bootleggers Loo & Placido’s “Horny Like A Dandy,” English bootleggers Phil & Dog’s “Dr Pressure”). Particularly in the first flush of the mash-up hype in the UK in 2001, there has been the potential at least for a few bootleggers to break into the music industry. Thus, one should not consider mash-ups as an unambiguous refusal of late capitalism, for many bootleggers would like nothing better than to become part of the system from which they currently pilfer. However, given the nature of the medium, its commercial co-option is far from assured, since the clearance fees for many bootlegs render them un-releasable. In their re-appropriations of popular music culture, though, mash-ups embody the contradictions inherent in late capitalism—fun and serious, nihilist and political, anti-capitalist and marked by hyper-consumption. Immersed in pop culture, but not quite of it, the liminal place of mash-ups on the edge of the culture should continue to make them of interest to critics of media culture. References Adorno, Theodor W. “Culture Industry Reconsidered.” In The Adorno Reader. Ed. Brian O’Connor. Oxford: Blackwell, 2000. 230-239. Bennett, Jane. The Enchantment of Modern Life. Princeton: Princeton UP, 2001. Jameson, Fredric. Postmodernism, or, the Cultural Logic of Late Capitalism. London: Verso, 1991. Jenkins, Henry. Textual Poachers: Television Fans & Participatory Culture. New York: Routledge, 1992. Jones, Sasha Frere. “1 + 1 + 1 = 1: The New Math of Mash-Ups.” The New Yorker 10 Jan. 2005. 22 Sep. 2006 http://www.newyorker.com/critics/music/?050110crmu_music>. Rojas, Pete. “Bootleg Culture.” Salon 1 Aug. 2002. 22 Sep. 2006 http://dir.salon.com/story/tech/feature/2002/08/01/bootlegs/index.html?pn=1>. Citation reference for this article MLA Style McAvan, Em. "“Boulevard of Broken Songs”: Mash-ups as Textual Re-appropriation of Popular Music Culture." M/C Journal 9.6 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0612/02-mcavan.php>. APA Style McAvan, E. (Dec. 2006) "“Boulevard of Broken Songs”: Mash-ups as Textual Re-appropriation of Popular Music Culture," M/C Journal, 9(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0612/02-mcavan.php>.

42

Boler, Megan. "The Transmission of Political Critique after 9/11: “A New Form of Desperation”?" M/C Journal 9, no.1 (March1, 2006). http://dx.doi.org/10.5204/mcj.2595.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Investigative journalist Bill Moyers interviews Jon Stewart of The Daily Show: MOYERS: I do not know whether you are practicing an old form of parody and satire…or a new form of journalism. STEWART: Well then that either speaks to the sad state of comedy or the sad state of news. I can’t figure out which one. I think, honestly, we’re practicing a new form of desperation…. July 2003 (Bill Moyers Interview of Jon Stewart, on Public Broadcasting Service) Transmission, while always fraught and ever-changing, is particularly so at a moment when coincidentally the exponential increase in access to new media communication is paired with the propagandized and state-dominated moment of war, in this case the U.S. preemptive invasion of Iraq in 2003. U.S. fighter planes drop paper propaganda along with bombs. Leaked into mainstream media by virtue of new media technologies, the violations of Abu-Ghraib represent the challenge of conducting war in a digital era. Transmissions are highly controlled and yet the proliferation of access poses a new challenge – explicitly named by Rumsfeld in December 2005 on the Jim Lehrer news hour: DONALD RUMSFELD: No, I think what is happening – and this is the first war that has ever been conducted in the 21st century when you had talk radio, the Internet, e-mails, bloggers, 24-hour news, digital cameras, video cameras, instant access to everything, and we haven’t accommodated to that yet. … And what’s happening is the transmission belt that receives it spreads all these things. … Rumsfeld’s comments about the convergence of new media with a time of war highlights what those of us studying cultural communication see as a crucial site of study: the access and use of new media to transmit dissenting political commentary is arguably a sign of new counter-public spaces that coincide with increased mainstream media control and erosion of civil liberties surrounding free speech. In this particular instance, the strategic use of media by U.S. political administration to sell a morally questionable war to the public through deceptions and propaganda raises new questions about the transmission and phenomenon of truth claims in a digital age. In this essay I examine three sites through which satire is used to express political commentary in the convergent moment of repression combines with increased affordances. The examples I offer have been chosen because they illustrate what I recognize as a cultural shift, an emotional sea change even for staunch postmodernists: replacing Jameson’s characterization of the “waning of affect,” there has emerged renewed desire for truthfulness and accountability. What’s unique is that this insistence on the possibility of truthfulness is held in simultaneous contradiction with cynical distrust. The result is a paradoxical affective sentiment shared by many: the simultaneous belief that all truths are rhetorically constructed along with the shared certainty that we have been lied to, that this is wrong, and that there is a truthfulness that should be delivered. This demand is directed at the corrupted synergy created between media and politicians. The arguments used to counter the dominant content (and form) of transmission are made using new digital media. The sea-change in transmission is its multidirectionality, its frequency, and its own rapidly-changing modes of transmission. In short, communication and the political role of media has become exponentially complex in the simultaneous demand for truthfulness alongside the simultaneous awareness that all truth is constructed. Visual satire offers an ideal form to transmit the post-9/11 contradictions because irony turns on the unsaid; it uses the dominant forms of logic to express what is otherwise silenced as dissenting didacticism; it expresses horrors in forms that are palatable; it creates a sense of shared meaning and community by using the unsaid to create a recognition of the dominant culture as misrepresentation. While irony has been used for centuries as a political tool, what is unique about the digitally produced and disseminated cultures created through visual ironies after 9/11 is that these expressions explicitly reference again and again a desire for accountability. Much could be said about the history of political satire, and if space permitted I would develop here my discussion of affect and parody, best excavated beginning with a history of political satire moving up to current “fair use legislation” which legally protects those who perform parody, one subset of satire. A more general comment on the relation of humor to politics helps set a context for the relationship of satire to contemporary political transmissions I address. Humor … helps one only to bear somewhat better the unalterable; sometimes it reminds both the mighty and the weak that they are not to be taken seriously. …One’s understanding of political jokes obviously depends on one’s understanding of politics. At one level, politics is always a struggle for power. Along with persuasion and lies, advice and flattery, tokens of esteem and bribery, banishment and violence, obedience and treachery, the joke belongs to the rich treasury of the instruments of politics. We often hear that the political joke is an offensive weapon with which an aggressive, politically engaged person makes the arrangements or precautions of an opponent seem ridiculous. But even when political jokes serve defensive purposes, they are nonetheless weapons (Speier and Jackall 1998, 1352). The productions I am studying I define as digital dissent: the use of new media to engage in tactical media, culture jamming, or online civic participation that interrupts mainstream media narratives. The sites I am studying include multimedia memes, blogs, and mirrored streaming of cable-channel Comedy Central’s highly popular news satire. These three examples illustrate a key tension embedded in the activity of transmission: in their form (satirical) and content (U.S. mainstream media and U.S. politicians and mistakes) they critique prevailing (dominant) transmissions of mainstream media, and perform this transmission using mainstream media as the transmitter. The use of the existing forms to critique those same forms helpfully defines “tactical media,” so that, ironically, the transmission of mainstream news is satirized through content and form while in turn being transmitted via corporate-owned news show. The following illustrations of digital dissent employ irony and satire to transmit the contradictory emotional sensibilities: on the one hand, the awareness that all truth claims are constructed and on the other, a longing for truthful accountability from politicians and media. The Daily Show with Jon Stewart The Daily Show (TDS) with Jon Stewart is a highly-popular news satire. “The most trusted name in fake news” is transmitted four nights a week in the U.S. and Canada on cable television and often on another local network channel. TDS format uses “real” news clips from mainstream media – generally about Washington D.C. politics – and offers satirical and ironic commentary about the media representations as well as about the actions and speech of the politicians represented. Aired in Europe through CNN as well througha half-hour once weekly version, TDS is also streamed online both through Comedy Central’s official site as well as on mirrored independent streaming. The Daily Show has been airing for 6 years, has 1.7 million television viewers, a wide audience who view TDS online, and a larger segment of age 18-31 viewers than any other U.S. nightly news show (Friend 28). Jon Stewart has become an icon of a cross-partisan North American critique of George W. Bush in particular (though Stewart claims himself as non-partisan). Particularly since his appearance on CNN news debate show Crossfire and now poised to host the Academy Awards (two days until Oscar broadcast as I write), Jon Stewart emblematizes a faith in democracy, and demand for media accountability to standards of civic discourse seen as central to democracy. (In a March 2, 2006 blog-letter to Jon Stewart, Ariana Huffington warns him against losing his current political legitimacy by blowing it at the Oscars: “Interjecting too much political commentary – no matter how trenchant or hilarious – is like interrupting the eulogy at a funeral to make a political point … . At the same time, there is no denying the fact, Jon, that you are going to have the rapt attention of some 40 million Americans. Or that political satire – done right – can alter people’s perceptions (there’s a reason emperors have always banned court jesters in times of crisis). Or that a heaping dose of your perception-altering mockery would do the American body politic a load of good.”) “Stop hurting America” Stewart pleads with two mainstream news show hosts on the now-infamous Crossfire appearance, (an 11 minute clip easily found online or through ifilm.com). Stewart’s public shaming of mainstream media as partisan hackery theatre, “helping corporations and leaving all of us alone to mow our lawns,” became the top-cited media event in the blogosphere in 2004. The satirical form of The Daily Show illustrates how the unsaid functions as truth. Within the range of roles classically defined within the history of humor and satire, Jon Stewart represents the court jester (Jones). First, the unsaid often occurs literally through Stewart’s responses to material: the camera often shows simply his facial expression and speechlessness, which “says it all.” The unsaid also occurs visually through the ironic adoption of the familiar visuals of a news show: for example, situating the anchor person (Stewart) behind his obscenely large news desk. Part of this unsaid is an implicit questioning of the performed legitimacy of a news report. For viewers, The Daily Show displaces a dominant and enforced hegemonic cultural pastime: individuals in isolated living rooms tuned in to (and alienated by) the 11 o’clock dose of media spin about politicians’ and military versions of reality have been replaced by a new virtual solidarity of 1.2 million living rooms who share a recognition of deception. Ironically, as Bill Moyers expresses to Jon Stewart, “but when I report the news on this broadcast, people say I’m making it up. When you make it up, they say you’re telling the truth” (“Transcript”). The unsaid also functions by using actual existing logics, discourses, and even various familiar reiterated truth claims (the location of WMD; claims made by Hans Blix, etc.) and shifting the locutionary context of these slightly in order to create irony – putting “real” words into displaced contexts in a way that reveals the constructed-ness of the “real” and thereby creates an unsaid, shared commentary about the experience of feeling deceived by the media and by the Pentagon. Through its use of both “real” news footage combined with ironic “false” commentary, The Daily Show allows viewers to occupy the simultaneous space of cynicism and desire for truth: pleasure and satisfaction followed by a moment of panic or horror. Bush in 30 Seconds The Bushin30seconds campaign was begun by the organization MoveOn, who solicited entries from the public and received over 500 which were streamed as QuickTime videos on their Website. The guidelines were to use the form of a campaign ad, and the popularly-selected winner would be aired on major network television during the 2004 Superbowl. The majority of the Bushin30Seconds ads include content that directly addresses Bush’s deception and make pleas for truth, many explicitly addressing the demand for truth, the immorality of lies, and the problems that political deception pose for democracy (along with a research team, I am currently working on a three year project analyzing all of these in terms of their content, rhetorical form, and discursive strategies and will be surveying and interviewing the producers of the Bushin30Seconds. Our other two sites of study include political blogs about the U.S. invasion of Iraq, and online networks sparked by The Daily Show). The demand for truthfulness is well exemplified in the ad called “Polygraph” (see also #27 A Big Puzzle). This ad invokes a simulated polygraph – the polygraph being a classic instrument of rational positivism and surveillance – which measures for the viewer the “truth” quotient of Bush’s own “real” words. Of course, the polygraph is not actually connected to Bush’s body, and hence offers a visual symbolic “stand in” for the viewer’s own internal or collectively shared sensibility or truth meter. Illustrating my central argument about the expressed desire for truthfulness, the ad concludes with the phrase “Americans are dying for the truth.” Having examined 150 ads, it is remarkable how many of these – albeit via different cultural forms ranging from hip hop to animation to drama to pseudo-advertisement for a toy action figure – make a plea for accountability, not only on behalf of one’s own desire but often out of altruistic concern for others. The Yes Men I offer one final example to illustrate transmissions that disrupt dominant discourses. The Yes Men began their work when they created a website which “mirrored” the World Trade Organization site. Assumed to represent the WTO, they were subsequently offered invitations to give keynotes at various international conferences and press meetings of CEOs and business people. (Their work is documented in an hour-long film titled The Yes Men available at many video outlets and through their web site.) The main yes man, Bichlbaum, arrives to these large international meetings with careful attire and speech, and offers a straight-faced keynote with subversive content. For example, at a textile conference he suggests that slavery had been a very profitable form of labor and might be reintroduced as alternative to unionized labor. At another conference, he announced that the WTO had decided to disband because it has realized it is only causing harm to international trade and economy. In December 2004, the Yes Men struck again when they were invited by the BBC as representatives of DOW chemical on the 20th anniversary of the Union Carbide Bhopal accident in India. Those who watched the BBC news and Channel 4 and the hundreds of thousands who viewed these clips afterwards are made aware of the anniversary of the worst chemical accident in history; are apprised of the ongoing effects on the people of Bhopal; and hear an unusual primetime soundbyte lambasting the utter absence of social responsibility of corporations such as Dow Chemical. The Yes Men illustrate what some might call tactical media, some might call media terrorism, and what some aspire to in their own activism. “They compare their work to that of a “funhouse mirror” – exaggerating hideous features. ‘We do that kind of exaggeration operation, but with ideas. We agree with people – turning up the volume on their ideas as we talk, until they can see their ideas distorted in our funhouse mirror. Or that’s what we try to do anyhow. As it turns out, the image always seems to look normal to them,’ Bichlbaum said” (Marchlewski). Another article describes their goal as follows: When newspapers and television stations out their acts, it’s not just the Yes Men who get attention, but also the issues they address … . The impersonations, which the two call identity corrections, are intended to show, in a colorful and humorous way, what they say are errors of corporate and government ways. (Marchlewski 2005) In conclusion, these three examples illustrate the new media terrain of access and distribution which enables transmissions that arguably construct significant new public spheres constructed around a desire for truthfulness and accountability. While some may prefer “civil society,” I find the concept of a public useful because its connotations imply less regimentation. If the public sphere is in part constructed through the reflexive circulation of discourse, the imaginary relation with strangers, and with affect as a social glue (my addition to Michael Warner’s six features of a public), we have described some of the ways in which counterpublics are produced (Warner 2002; Boler, forthcoming). If address (the circulation and reception of a cultural production under consideration) in part constructs a public, how does one imagine the interactivity between the listener/bystander/participant and the broadcast or image? To what extent do the kinds of transmission I have discussed here invite new kinds of multi-directional interactivity, and to what extent do they replicate problematic forms of broadcast? Which kind of subject is assumed or produced by different “mediated” publics? What is the relationship of discourse and propaganda to action and materiality? These are some of the eternally difficult questions raised when one analyzes ideology and culture in relation to social change. It is indeed very difficult to trace what action follows from any particular discursive construction of publics. One can think of the endings of the 150 Finalists in the Bush in30 Seconds campaign, each with an explicit or implicit imperative: “think!” or “act!” What subject is hailed and invoked, and what relationship might exist between the invocation or imagining of that listener and that listener’s actual reception and translation of any transmission? The construction of a public through address is a key feature of the politics of representation and visions of social change through cultural production. Each of the three sites of productions I have analyzed illustrate a renewed call for faith in media as an institution which owes a civic responsibility to democracy. The iterations of calls for truthful accounts from media and politicians stand in tension with the simultaneous recognition of the complex social construction of any and all truth claims. The uncertainty about whether such transmissions constitute “an old form of parody and satire…or a new form of journalism” reflects the ongoing paradox of what Jon Stewart describes as a “new form of desperation.” For those who live in Western democracies, I suggest that the study of political transmission is best understood within this moment of convergence and paradox when we are haunted by paradoxical desires for truths. References “American Daily.” 7 Nov. 2003 http://www.americandaily.com/article/5951>. Boler, Megan. “Mediated Publics and the Crises of Democracy.” Philosophical Studies in Education 37 (2006, forthcoming), eds. Justen Infinito and Cris Mayo. Colebrook, Claire. Irony. London: Routledge, 2004. Jameson, Frederic. “Postmodernism and Consumer Society.” The Anti-Aesthetic. Ed. H. Foster. Seattle: Bay Press, 1983. Jones, Jeffrey. Entertaining Politics: New Political Television and Civic Culture. New York: Rowman and Littlefield Publishers, 2004. Fletcher, M.D. Contemporary Political Satire. New York: University Press of America, 1987. Friend, Tad. “Is It Funny Yet? Jon Stewart and the Comedy of Crisis”. The New Yorker 77.47 (11 Feb. 2002): 28(7). Huffington, Ariana. “Memo to Jon Stewart: Tread Lightly and Carry a Big Schtick.” 2 March 2006. 4 March 2006 http://www.huffingtonpost.com/arianna-huffington/memo-to-jon-stewart-trea_b_16642.html>. Latour, Bruno. “Why Has Critique Run Out of Steam? From Matters of Fact to Matters of Concern.” Critical Inquiry 30.2 (2004). http://www.uchicago.edu/research/jnl-crit-inq/issues/v30/30n2.Latour.html>. Marchlewski, Kathie. “Hoaxsters Target Dow, Midland Daily News.” 20 May 2005 http://www.theyesmen.org/articles/dowagmmidlanddailynews.html>. Speier, Hans, & Robert Jackall. “Wit and Politics: An Essay on Laughter and Power.” The American Journal of Sociology 103.5 (1998): 1352. “The News Hour with Jim Lehrer.” 8 Dec. 2005. http://www.pbs.org/newshour/bb/fedagencies/july-dec05/rumsfeld_12-08.html>. “Transcript – Bill Moyers Inverviews Jon Stewart.” 7 Nov. 2003 . Warner, Michael. “Publics and Counterpublics.” Public Culture 14.1 (2002): 49-90. Citation reference for this article MLA Style Boler, Megan. "The Transmission of Political Critique after 9/11: “A New Form of Desperation”?." M/C Journal 9.1 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0603/11-boler.php>. APA Style Boler, M. (Mar. 2006) "The Transmission of Political Critique after 9/11: “A New Form of Desperation”?," M/C Journal, 9(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0603/11-boler.php>.

43

Phillips, Dougal, and Oliver Watts. "Copyright, Print and Authorship in the Culture Industry." M/C Journal 8, no.2 (June1, 2005). http://dx.doi.org/10.5204/mcj.2340.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Historically the impact of the printing press on Western culture is a truism. Print gave rise to the mass reproduction and circulation of information with wide reaching consequences in all fields: political, social, and economic. An aspect that this paper wishes to focus on is that this moment also saw the birth (and necessity) of copyright legislation, to administer and protect this new found ability to package and disseminate text. The term copyright itself, used freely in debates surrounding contemporary topics such as iTunes, DVD piracy, and file-sharing, is not only semantically anachronistic but, as will be shown, is an anachronistic problem. The history that it carries, through almost three hundred years, underscores the difficulties at the heart of copyright in the contemporary scene. Indeed the reliance on copyright in these debates creates an argument based on circular definitions relating to only the statutory conception of cultural rights. No avenue is really left to imagine a space outside its jurisdiction. This paper asserts that notions of the “culture industry” (as opposed to some other conception of culture) are also inherently connected to the some three hundred years of copyright legislation. Our conceptions of the author and of intellectual pursuits as property can also be traced within this relatively small period. As clarified by Lord Chief Baron Pollock in the English courts in 1854, “copyright is altogether an artificial right” that does not apply at common law and relies wholly on statute (Jeffreys v Boosey). Foucault (124-42) highlights, in his attack on Romantic notions of the author-genius-God, that the author-function is expressed primarily as a legal term, through the legal concepts of censorship and copyright. Copyright, then, pays little attention to non-economic interests of the author and is used primarily to further economic interests. The corporate nature of the culture industry at present amounts to the successful application of copyright legislation in the past. This paper suggests that we look at our conception of literary and artistic work as separate from copyright’s own definitions of intellectual property and the commercialisation of culture. From Hogarth to File-Sharing The case of ‘DVD Jon’ is instructive. In 1999, Jon Lech Johansen, a Norwegian programmer, drew the ire of Hollywood by breaking the encryption code for DVDs (in a program called DeCSS). More recently, he has devised a program to circumvent the anti-piracy system for Apple’s iTunes music download service. With this program, called PyMusique, users still have to pay for the songs, but once these are paid for, users can use the songs on all operating systems and with no limits on copying, transfers or burning. Johansen, who publishes his wares on his blog entitled So Sue Me, was in fact sued in 1999 by the Motion Picture Association of America (MPAA) for copyright infringement. He argued that he created DeCSS as part of developing a DVD player for his Linux operating system, and that copying DVD movies was an ancillary function of the program for which he could not be held responsible. He was acquitted by an Oslo district court in early 2003 and again by an appeals court later that year. During this time many people on the internet found novel ways to publish the DeCSS code so as to avoid prosecution, including many different code encryptions incorporated into jpeg images (including the trademarked DVD logo, owned by DVD LLC) and mpeg movies, as an online MUD game scenario, and even produced in the form of a haiku (“42 Ways to Distribute DeCSS”). The ability to publish the code in a format not readily prosecutable owes less to encryption and clandestine messages than it does to anachronistic laws regarding the wholly legal right to original formats. Prior to 1709, copyright or licensing related to the book publishing industry where the work as formatted, pressed and disseminated was more important to protect than the text itself or the concept of the author as the writer of the text. Even today different copyrights may be held over the different formatting of the same text. The ability for hackers to attack the copyright legislation through its inherent anachronism is more than smart lawyering or a neat joke. These attacks, based on file sharing and the morphing fluid forms of information (rather than contained text, printed, broadcast, or expressed through form in general), amount to a real breach in copyright’s capability to administer and protect information. That the corporations are so excited and scared of these new technologies of dissemination should come as no surprise. It should also not be seen, as some commentators wish to, as a completely new approach to the dissemination of culture. If copyright was originally intended to protect the rights of the publisher, the passing of the Act of Anne in 1709 introduced two new concepts – an author being the owner of copyright, and the principle of a fixed term of protection for published works. In 1734, William Hogarth, wanting to ensure profits would flow from his widely disseminated prints (which attracted many pirate copies), fought to have these protections extended to visual works. What is notable about all this is that in 1734 the concept of copyright both in literary and artistic works applied only to published or reproduced works. It would be over one hundred years later, in the Romantic period, that a broader protection to all artworks would be available (for example, paintings, sculpture, etc). Born primarily out of guild systems, the socio-political aspect of protection, although with a passing nod to the author, was primarily a commercial concern. These days the statute has muddied its primary purpose; commercial interest is conflated and confused with the moral rights of the author (which, it might be added, although first asserted in the International Berne Convention of 1886 were only ratified in Australia in December 2000). For instance, in a case such as Sony Entertainment (Australia) Ltd v Smith (2005), both parties in fact want the protection of copyright. On one day the DJ in question (Pee Wee Ferris) might be advertising himself through his DJ name as an appropriative, sampling artist-author, while at the same time, we might assume, wishing to protect his own rights as a recording artist. Alternatively, the authors of the various DeCSS code works want both the free flow of information which then results in a possible free flow of media content. Naturally, this does not sit well with the current lords of copyright: the corporations. The new open-source author works contrary to all copyright. Freed Slaves The model of the open source author is not without precedent. Historically, prior to copyright and the culture industry, this approach to authorship was the norm. The Roman poet Martial, known for his wit and gifts of poetry, wrote I commend to you, Quintianus, my little books – if I can call them mine when your poet recites them: if they complain of their harsh servitude, you should come forward as their champion and give your guarantees; and when he calls himself their master you should say they are mine and have been granted their freedom. If you shout this out three or four times, you will make their kidnapper (plagiario) feel ashamed of himself. Here of course the cultural producer is a landed aristocrat (a situation common to early Western poets such as Chaucer, Spencer and More). The poem, or work, exists in the economy of the gift. The author-function here is also not the same as in modern times but was based on the advantages of reputation and celebrity within the Roman court. Similarly other texts such as stories, songs and music were circulated, prior to print, in a primarily oral economy. Later, with the rise of the professional guild system in late medieval times, the patronage system did indeed pay artists, sometimes royal sums. However, this bursary was not so much for the work than for upkeep as members of the household holding a particular skill. The commercial aspect of the author as owner only became fully realised with the rise of the middle classes in the eighteenth and nineteenth century and led to the global adoption of the copyright regime as the culture industry’s sanction. Added to this, the author is now overwhelmingly a corporation, not an individual, which has expanded the utilisation of these statutes for commercial advantage to, perhaps, an unforeseen degree. To understand the file-sharing period, which we are now entering at full speed, we cannot be confused by notions found in the copyright acts; definitions based on copyright cannot adequately express a culture without commercial concerns. Perhaps the discussion needs to return to concepts that predate copyright, before the author-function (as suggested by Foucault) and before the notion of intellectual property. That we have returned to a gift economy for cultural products is easily understood in the context of file-sharing. But what of the author? Here the figure of the hacker suggests a movement towards such an archaic model where the author’s remuneration comes in the form of celebrity, or a reputation as an exciting innovator. Another model, which is perhaps more likely, is an understanding that certain material disseminated will be sold and administered under copyright for profit and that the excess will be quickly and efficiently disseminated with no profit and with no overall duration of protection. Such an amalgamated approach is exemplified by Radiohead’s Kid A album, which, although available for free downloads, was still profitable because the (anachronistic) printed version, with its cover and artwork, still sold by the millions. Perhaps cultural works, the slaves of the author-corporation, should be granted their freedom: freedom from servitude to a commercial master, freedom to be re-told rather than re-sold, with due attribution to the author the only payment. This is a Utopian idea perhaps, but no less a fantasy than the idea that the laws of copyright, born of the printing press, can evolve to match the economy today that they purport to control. When thinking about ownership and authorship today, it must be recalled that copyright itself has a history of useful fictions. References Michel Foucault; “What Is an Author?” Twentieth-Century Literary Theory. Eds. Vassilis Lambropoulos and David Neal Miller. Albany: State UP of New York, 1987. 124-42. “42 Ways to Distribute DeCSS.” 5 Jun. 2005 http://decss.zoy.org/>. Jeffreys v Boosey, 1854. Johansen, Jon Lech. So Sue Me. 5 Jun. 2005 http://www.nanocrew.net/blog/>. Citation reference for this article MLA Style Phillips, Dougal, and Oliver Watts. "Copyright, Print and Authorship in the Culture Industry." M/C Journal 8.2 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0506/06-phillipswatts.php>. APA Style Phillips, D., and O. Watts. (Jun. 2005) "Copyright, Print and Authorship in the Culture Industry," M/C Journal, 8(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0506/06-phillipswatts.php>.

44

Fuller, Glen. "Punch-Drunk Love." M/C Journal 10, no.3 (June1, 2007). http://dx.doi.org/10.5204/mcj.2660.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

For once I want to be the car crash, Not always just the traffic jam. Hit me hard enough to wake me, And lead me wild to your dark roads. (Snow Patrol: “Headlights on Dark Roads”, Eyes Open, 2006) I didn’t know about the online dating site rsvp.com.au until a woman who I was dating at the time showed me her online profile. Apparently ‘everyone does rsvp’. Well, ‘everyone’ except me. (Before things ended I never did ask her why she listed herself as ‘single’ on her profile…) Forming relationships in our era of post-institutional modes of sociality is problematic. Some probably find such ‘romantically’ orientated ‘meet up’ sites to be a more efficient option for sampling what is available. Perhaps others want some loving on the side. In some ways these sites transform romance into the online equivalent of the logistics dock at your local shopping centre. ‘Just-in-time’ relationships rely less on social support structures of traditional institutions such as the family, workplace, and so on, including ‘love’ itself, and more on a hit and miss style of dating, organised like a series of car crashes and perhaps even commodified through an eBay-style online catalogue (see Crawford 83-88). Instead of image-commodities there are image-people and the spectacle of post-romance romance as a debauched demolition derby. Is romance still possible if it is no longer the naïve and fatalistic realisation of complementary souls? I watched Paul Thomas Anderson’s third film Punch-Drunk Love with the above rsvp.com.au woman. She interpreted it in a completely different manner to me. I shall argue (as I did with her) that the film captures some sense of romance in a post-romance world. The film was billed as a comedy/romance or comedy/drama, but I did not laugh either with or at the film. The story covers the trials of two people ‘falling in love’. Lena Leonard (Emma Watson) orchestrates an encounter with Barry Egan (Adam Sandler) after seeing a picture of him with his seven sisters. The trajectory of the romance is defined less by the meeting of two people, than the violence of contingency and of the world arrayed by the event of love. Contingency is central to complexity theory. Contingency is not pure chance, rather it exists as part of the processual material time of the event that defines events or a series of events as problematic (Deleuze, The Logic of Sense 52-53). To problematise events and recognise the contingencies they inculcate is to refuse the tendency to colonise the future through actuarial practices, such as ‘risk management’ and insurance or the probabilistic ‘Perfect Match’ success of internet dating sites (mirroring ‘Dexter’ from the 1980s dating television game show). Therefore, through Punch-Drunk Love I shall problematise the event of love so as to resuscitate the contingencies of post-romance romance. It is not surprising Punch-Drunk Love opens with a car crash for the film takes romance on a veritable post-Crash detour. Crash – novel and film – serves as an exploration of surfaces and desire in a world at the intersection of the accident. Jean Baudrillard, in his infamous essay on Crash (novel), dwells on the repositioning of the accident: [It] is no longer at the margin, it is at the heart. It is no longer the exception to a triumphal rationality, it has become the Rule, it has devoured the Rule. … Everything is reversed. It is the Accident that gives form to life, it is the Accident, the insane, that is the sex of life. (113) After the SUV rolls over in Punch-Drunk Love’s opening scene, a taxi van pauses long enough for an occupant to drop off a harmonium. A harmonium is a cross between an organ and a piano, but much smaller than both. It is a harmony machine. It breathes and wheezes to gather potentiality consonant sound waves of heterogeneous frequencies to produce a unique musicality of multiplicative resonance. No reason is given for the harmonium in the workings of the film’s plot. Another accident without any explanation, like the SUV crash, but this time it is an accidental harmony-machine. The SUV accident is a disorganising eruption of excess force, while the accidental harmony-machine is a synthesising organisation of force. One produces abolition, while the other produces a multiplicative affirmation. These are two tendencies that follow two different relations to the heterogeneous materialism of contingency. Punch-Drunk Love captures the contingency at the heart of post-romance romance. Instead of the layers of expectation habituated into institutional engagements of two subjects meeting, there is the accident of the event of love within which various parties are arrayed with various affects and desires. I shall follow Alain Badiou’s definition of the event of love, but only to the point where I shall shift the perspective from love to romance. Badiou defines love by initially offering a series of negative definitions. Firstly, love is not a fusional concept, the ‘two’ that is ‘one’. That is because, as Badiou writes, “an ecstatic One can only be supposed beyond the Two as a suppression of the multiple” (“What Is Love?” 38). Secondly, nor is love the “prostration of the Same on the alter of the Other.” Badiou argues that it is not an experience of the Other, but an “experience of the world [i.e. multiple], or of the situation, under the post-evental condition that there were Two” (“What Is Love?” 39). Lastly, the rejection of the ‘superstructural’ or illusory conception of love, that is, to the base of desire and sexual jealously (Badiou, “What Is Love?” 39). For Badiou love is the production of truth. The truth is that the Two, and not only the One, are at work in the situation. However, from the perspective of romance, there is no post-evental truth procedure for love as such. In Deleuze’s terminology, from the perspective of post-romance the Two serves an important role as the ‘quasi-cause’ of love (The Logic of Sense 33), or for Badiou it is the “noemenal possibility [virtualite]” (“What Is Love?” 51). The event of the Two, and, therefore, of love, is immanent to itself. However, this does not capture the romantic functioning of love swept up in the quasi-cause of the Two. Romance is the differential repetition of the event of love to-come and thus the repetition of the intrinsic irreducible wonder at the heart of the event. The wonder at love’s heart is the excess of potentiality, the excitement, the multiplicity, the stultifying surprise. To resuscitate the functioning of love is to disagree with Badiou’s axiom that there is an absolute disjunction between the (nominalist) Two. The Two do actually share a common dimension and that is the radical contingency at the heart of love. Love is not as a teleological destiny of the eternal quasi-cause, but the fantastic impossibility of its contingent evental site. From Badiou’s line of argument, romance is precisely the passage of this “aleatory enquiry” (“What is Love?” 45), of “the world from the point of view of the Two, and not an enquiry of each term of the Two about the other” (49). Romance is the insinuation of desire into this dynamic of enquiry. Therefore, the functioning of romance is to produce a virtual architecture of wonder hewn from seeming impossibility of contingency. It is not the contingency in itself that is impossible (the ‘chaosmos’ is a manifold of wonderless-contingency), but that contingency might be repeated as part of a material practice that produces love as an effect of differentiating wonder. Or, again, not that the encounter of love has happened, but that precisely it might happen again and again. Romance is the material and embodied practice of producing wonder. The materiality of romance needs to be properly outlined and to do this I turn to another of Badiou’s texts and the film itself. To explicate the materialism of romance is to begin outlining the problematic of romance where the material force of Lena and Barry’s harmony resonates in the virtuosic co-production of new potentialities. The practice of romance is evidenced in the scene where Lena and Barry are in Hawaii and Lena is speaking to Barry’s sister while Barry is watching her. A sense of wonder is produced not in the other person but of the world as multiplicity produced free from the burden of Barry’s sister, hence altering the material conditions of the differential repetition of contingency. The materialism in effect here is, to borrow from Michel Foucault, an ‘incorporeal materialism’ (169), and pertains to the virtual evental dimension of love. In his Handbook of Inaesthetics, Badiou sets up dance and theatre as metaphors for thought. “The essence of dance,” writes Badiou, “is virtual, rather than actual movement” (Handbook of Inaesthetics 61), while theatre is an “assemblage” (72) which in part is “the circulation of desire between the sexes” (71). If romance is the deliberate care for the event of love and its (im)possible contingency, then the dance of love requires the theatre of romance. To include music with dance is to malign Badiou’s conception of dance by polluting it with some elements of what he calls ‘theatre’. To return to the Hawaii scene, Barry is arrayed as an example of what Badiou calls the ‘public’ of theatre because he is watching Lena lie to his sister about his whereabouts, and therefore completes the ‘idea’ of theatre-romance as a constituent element (Badiou, Handbook of Inaesthetics 74). There is an incorporeal (virtual) movement here of pure love in the theatre of romance that repotentialises the conditions of the event of love by producing a repeated and yet different contingency of the world. Wonder triggered by a lie manifest of a truth to-come. According to Badiou, the history of dance is “governed by the perpetual renewal of the relation between vertigo and exactitude. What will remain virtual, what will be actualized, and precisely how is the restraint going to free the infinite?” (Handbook of Inaesthetics 70). Importantly, Badiou suggests that theatrical production “is often the reasoned trial of chances” (Handbook of Inaesthetics 74). Another way to think the materiality of romance is as the event of love, but without Badiou’s necessary declaration of love (“What Is Love?” 45). Even though the ‘truth’ of the Two acts as quasi-cause, love as such remains a pure (‘incorporeal’) Virtuality. As a process, there is no “absolute disappearance or eclipse” that belongs to the love-encounter (“What Is Love?” 45), thus instead producing a rhythmic or, better, melodic heterogeneous tension between the love-dance and romance-theatre. The rhythm-melody of the virtual-actual cascade is distributed around aleatory contingencies as the event of love is differentially repeated and is therefore continually repotentialised and exhausted at the same time. A careful or graceful balance needs to be found between potentiality and exhaustion. The film contains many examples of this (re)potentialising tension, including when Lena achieves the wonder of the ‘encounter’ by orchestrating a meeting. Similarly, Barry feigns a ‘business trip’ to Hawaii to meet up with Lena. This is proceeded by the increased urgency of Barry’s manipulation of the frequent flyer miles reward to meet with up with Lena. The tension is affective – both anxious and exciting – and belongs to the lived duration of contingency. In the same way as an actual material dance floor (or ‘theatre’ here) is repeated across multiple incorporeal dimensions of music’s virtuality through the repotentialisation of the dancer’s body, the multiple dimensions of love are repeated across the virtuality of the lovers’ actions through the repotentialisation of the conditions of the event of love. Punch-Drunk Love frames this problematic of romance by way of a second movement that follows the trajectory of the main character Barry. Barry is a depressive with an affect regulation problem. He flies into a rage whenever a childhood incident is mentioned and becomes anxious or ‘scared’ (as one sister described him) when in proximity to Lena. He tries to escape from the oppressive intimacy of his family. He plays with ‘identity’ in a childlike manner by dressing up as a businessman and wearing the blue suit. His small business is organised around selling plungers used to unblock toilets to produce flow. Indeed, Barry is defined by the blockages and flows of desire. His seven-sister over-Oedipalised familial unit continually operates as an apparatus of capture, a phone-sex pervert scam seeks to overcode desire in libidinal economy that becomes exploited in circuits of axiomatised shame (like an online dating site?), and a consumer rewards program that offers the dream of a frequent-flyer million-miles (line of) flight out of it all. ‘Oedipal’ in the expanded sense Deleuze and Guattari give the term as a “displaced or internalised limit where desire lets itself be caught. The Oedipal triangle is the personal and private territoriality that corresponds to all of capitalism’s efforts at social reterritorialisation” (266). Barry says he wants to ‘diversify’ his business, which is not the same thing as ‘expanding’ or developing an already established commercial interest. He does not have a clear idea of what domain or type of business he wants to enter into when diversifying. When he speaks to business contacts or service personnel on the phone he attempts to connect with them on a level of intimacy that is uncomfortably inappropriate for impersonal phone conversations. The inappropriate intimacy comes back to haunt him, of course, when a low-level crook attempts to extort money from him after Barry calls a phone sex line. The romance between Lena and Barry develops through a series of accident-contingencies that to a certain extent ‘unblocks’ Barry and allows him to connect with Lena (who also changes). Apparent contingencies that are not actually contingencies need to be explained as such (‘dropping car off’, ‘beat up bathrooms’, ‘no actual business in Hawaii’, ‘phone sex line’, etc.). Upon their first proper conversation a forklift in Barry’s business crashes into boxes. Barry calls the phone sex line randomly and this leads to the severe car crash towards the end of the film. The interference of Barry’s sisters occurs in an apparently random unexpected manner – either directly or indirectly through the retelling of the ‘gayboy’ story. Lastly, the climatic meeting in Hawaii where the two soon-to-be-lovers are framed by silhouette, their bodies meet not in an embrace but a collision. They emerge as if emitted from the throngs of the passing crowd. Barry has his hand extended as if they were going to shake and there is an audible grunt when their bodies collide in an embrace. To love is to endure the violence of a creative temporality, such as the production of harmony from heterogeneity. As Badiou argues, love cannot be a fusional relation between the two to make the one, nor can it be the relation of the Same to the Other, this is because the differential repetition of the conditions of love through the material practice of romance already effaces such distinctions. This is the crux of the matter: The maximum violence in the plot of Punch-Drunk Love is not born by Lena, even though she ends up in hospital, but by Barry. (Is this merely a masculinist reading of traditional male on male violence? Maybe, and perhaps why rsvp.com.au woman read it different to me.) What I am trying to get at is the positive or creative violence of the two movements within the plot – of the romance and of Barry’s depressive social incompetence – intersect in such a way to force Barry to renew himself as himself. Barry’s explosive fury belongs to the paradox of trying to ‘mind his own business’ while at the same time ‘diversifying’. The moments of violence directed against the world and the ‘glass enclosures’ of his subjectivity are transversal actualisations of the violence of love (on function of ‘glass’ in the film see King). (This raises the question, perhaps irrelevant, regarding the scale of Badiou’s conception of truth-events. After Foucault and Deleuze, why isn’t ‘life’ itself a ‘truth’ event (for Badiou’s position see Briefings on Existence 66-68)? For example, are not the singularities of Barry’s life also the singularities of the event of love? Is the post-evental ‘decision’ supposed to always axiomatically subtract the singular truth-supplement from the stream of singularities of life? Why…?) The violence of love is given literal expression in the film in the ‘pillow talk’ dialogue between Barry and Lena: Barry: I’m sorry, I forgot to shave. Lena: Your face is so adorable. Your skin and your cheek… I want to bite it. I want to bite on your cheek and chew on it, you’re so fucking cute. Barry: I’m looking at your face and I just wanna smash it. I just wanna fucking smash it with a sledgehammer and squeeze you, you’re so pretty… Lena: I wanna chew your face off and scoop out your eyes. I wanna eat them and chew them and suck on them… Barry: [nodding] Ok…yes, that’s funny… Lena: Yeah… Barry: [still nodding] This’s nice. What dismayed or perhaps intrigued Baudrillard about Crash was its mixing of bodies and technologies in a kind of violent eroticism where “everything becomes a hole to offer itself to the discharge reflex” (112). On the surface this exchange between Barry and Lena is apparently an example of such violent eroticism. For Baudrillard the accident is a product of the violence of technology in the logistics of bodies and signs which intervene in relations in such a way to render perversity impossible (as a threshold structuration of the Symbolic) because ‘everything’ becomes perverse. However, writer and director of Punch-Drunk Love, Paul Anderson, produces a sense of the wondrous (‘Punch-Drunk’) violence that is at the heart of love. This is not because of the actual violence of individual characters; in the film this only serves as a canvas of action to illustrate the intrinsic violence of contingency. Lena and Barry’s ‘pillow talk’ not so much as a dance but a case of the necessary theatre capturing the violence and restraint of love’s virtual dance. ‘Violence’ (in the sense it is used above) also describes the harmonic marshalling of the heterogeneous materiality of sound affected by the harmonium. The ‘violence’ of the harmonium is decisively expressed through the coalescence of the diegetic and nondiegetic soundtracks at the end of the film when Barry plays the harmonium concurrently with Jon Brion’s score for the film. King notes, the “diegetic and nondiegetic music playing together is a moment of cinematic harmony; Barry, Lena, and the harmonium are now in sync” (par. 19). The notes of music connect different diegetic and nondiegetic series which pivot around new possibilities. As Deleuze writes about the notes played at a concert, they are “pure Virtualities that are actualized in the origins [of playing], but also pure Possibilities that are attained in vibrations or flux [of sound]” (The Fold 91). Following Deleuze further (The Fold 146-157), the horizontal melodic movement of romance forms a diagonal or transversal line with the differentially repeated ‘harmonic’ higher unity of love. The unity is literally ‘higher’ to the extent it escapes the diegetic confines of the film itself. For Deleuze “harmonic unity is not that of infinity, but that which allows the existent to be thought of as deriving from infinity” (The Fold 147, ital. added). While Barry is playing the harmonium in this scene Lena announces, “So here we go.” These are the final words of the film. In Badiou’s philosophy this is a declaration of the truth of love. Like the ‘higher’ non/diegetic harmony of the harmonium, the truth of love “composes, compounds itself to infinity. It is thus never presented integrally. All knowledge [of romance] relative to this truth [of the Two, as quasi-cause] thus disposes itself as an anticipation” (“What is Love?” 49). Romance is therefore lived as a vertiginous state of anticipation of love’s harmony. The materiality of romance does not simply consist of two people coming together and falling in love. The ‘fall’ functions as a fatalistic myth used to inscribe bodies within the eschatological libidinal economies of ‘romantic comedies’. To anneal Baudrillard’s lament, perversity obviously still has a positive Symbolic function on the internet, especially online dating sites where anticipation can be modulated through the probabilistic manipulation of signs. In post-romance, the ‘encounter’ of love necessarily remains, but it is the contingency of this encounter that matters. The main characters in Punch-Drunk Love are continually arrayed through the contingencies of love. I have linked this to Badiou’s notion of the event of love, but have focused on what I have called the materiality of romance. The materiality of romance requires more than a ‘fall’ induced by a probabilistic encounter, and yet it is not the declaration of a truth. The post-evental truth procedure of love is impossible in post-romance romance because there is no ‘after’ or ‘supplement’ to an event of love; there is only the continual rhythm of romance and anticipation of the impossible. It is not a coincidence that the Snow Patrol lyrics that serve above as an epigraph resonate with Deleuze’s comment that a change in the situation of Leibnizian monads has occurred “between the former model, the closed chapel with imperceptible openings… [to] the new model invoked by Tony Smith [of] the sealed car speeding down the dark highway” (The Fold 157). Post-Crash post-romance romance unfolds like the driving-monad in an aleatory pursuit of accidents. That is, to care for the event of love is not to announce the truth of the Two, but to pursue the differential repetition of the conditions of love’s (im)possible contingency. This exquisite and beautiful care is required for the contingency of love to be maintained. Hence, the post-romance problematic of romance thus posited as the material practice of repeating the wonder at the heart of love. References Badiou, Alain. Briefings on Existence: A Short Treatise on Transitory Ontology. Trans. Norman Madrasz. Albany, New York: State U of New York P, 2006. ———. Handbook of Inaesthetics. Trans. Alberto Toscano. Stanford, Calif.: Stanford UP, 2005. ———. “What Is Love?” Umbr(a) 1 (1996): 37-53. Baudrillard, Jean. Simulacra and Simulation. Ann Arbor: U of Michigan P, 1994. Crawford, Kate. Adult Themes: Rewriting the Rules of Adulthood. Sydney: Macmillan, 2006. Deleuze, Gilles. The Fold: Leibniz and the Baroque. Minneapolis: U of Minnesota P, 1993. ———. The Logic of Sense. Trans. Mark Laster and Charles Stivale. European Perspectives. Ed. Constantin V. Boundas. New York: Columbia UP, 1990. Deleuze, Gilles, and Félix Guattari. Anti-Oedipus: Capitalism and Schizophrenia. Minneapolis: U of Minnesota P, 1983. Foucault, Michel. “Theatricum Philosophicum.” Language, Counter-Memory, Practice: Selected Essays and Interviews. Ed. D. F. Bouchard. New York: Cornell UP, 1977. 165-96. King, Cubie. “Punch Drunk Love: The Budding of an Auteur.” Senses of Cinema 35 (2005). Citation reference for this article MLA Style Fuller, Glen. "Punch-Drunk Love: A Post-Romance Romance." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/03-fuller.php>. APA Style Fuller, G. (Jun. 2007) "Punch-Drunk Love: A Post-Romance Romance," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/03-fuller.php>.

45

Seale, Kirsten. "Iain Sinclair's Excremental Narratives." M/C Journal 8, no.1 (February1, 2005). http://dx.doi.org/10.5204/mcj.2317.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

This consideration of British poet, novelist, and critic Iain Sinclair’s ‘bad’ writing begins at the summit of Beckton Alp, a pile of waste in London’s east that has been reconstituted as recreational space. For Sinclair, Beckton Alp functions as a totem signifying the pervasive regulatory influence of Panopticism in contemporary urban culture. It shares the Panopticon’s ‘see/being seen dyad’, which is delineated thus by Michel Foucault in Discipline and Punish: In the peripheric ring [which in this case acts as an analogue for London] one is seen, without ever seeing; in the central tower [for our purposes, Beckton Alp], one sees everything without being seen. (201) In his most recent novel, Dining on Stones (or, The Middle Ground), the prospect from Beckton Alp offers Sinclair the following image of London: Leaning on a creosoted railing London makes sense. There is a pattern, a working design. And there’s a word for it too: Obscenery. Blight. Stuttering movement. The distant river. The time membrane dissolves, in such a way that the viewer becomes the thing he is looking at. (190) The city, following Michel de Certeau, can be read as a text from Beckton Alp, one that appears intelligible, one that ‘makes sense’ (92). But what “sense” is the reader to make of Sinclair’s vision of London, a London characterised by this intriguing (and typically Sinclairean) neologism, obscenery? Obscenery’s etymological origins in the word ‘obscene’ suggest that it is indecent, unruly, offensive. It would seem to encompass everything that hegemonic culture would prefer to keep off-stage and unseen, everything that it considers ‘bad.’ Yet as Sinclair makes clear, it is hardly hidden—it can be seen from the Alp. By all accounts, obscenery proves to be the completely visible manifestation of what is normally segregated, managed and disposed of by disciplinary apparatuses, such as the Panoptic schema, which organise and supervise urban space. In summary, obscenery contends the regulatory power of Panopticism by being visible, obscenely so. Sinclair is careful to avoid a dialectic positing obscenery as the disordered antinomy to the pattern of hegemonic order. Instead, obscenery problematises the differentiations demarcating ‘good’ and ‘bad’ culture. Sinclair’s poiesis also blurs the boundaries between divergent spheres of culture as it oscillates between small press publishing and the mass market. His mimeographed chapbooks and limited edition hardcovers have for the major part of his career been conceived, produced, and disseminated outside the parameters of mainstream culture. An affiliation with the avant-garde British Poetry Revival indicates Sinclair’s dedication to alternative publishing, as does the existence of his own imprints: the punningly named horz commerz, and the Albion Village Press. But his mainstream publications (including Dining on Stones, which was released by multinational publishing house Penguin) complicate this position because although he is published and circulated within the sights of hegemonic literary culture, and therefore subject to the gaze of the Panopticon, Sinclair rejects hegemonic expectations about what comprises literature. He exploits written language, a tool licensed by the Panopticon, for unlicensed praxis. Identifying Sinclair’s cultural production as a type of textual obscenery, or ‘bad’ writing proposes an alternative model of cultural production, one that enables the creative practitioner to loosen the panoptic bonds with which Foucault pinions the individual and productively negotiate the archetypal struggle faced in a capitalist political economy: the conflict between artistic integrity and commercial imperative. In a sense, Sinclair and his circle of collaborators constitute a modern day la bohème—a league of artistic and literary putschists conspiring against the established order of cultural production, distribution, and consumption. As Sinclair commented in an interview: There’s no anxiety. Most of the stuff I have done didn’t have to win anybody’s approval. For me, there wasn’t that question of ‘How do I get published?’ that seems to preoccupy writers now. I used to publish myself. (Jeffries) For Sinclair, hegemonic culture is marching acquiescently, mindlessly to the ‘military/industrial two-step. That old standard… YES was the word.’ (Sinclair, London Orbital 4) If ‘yes’ is the mantra of this type of (false) consciousness, then Sinclair’s contrary creations are asserting a politics of ‘no.’ Sinclair’s refusal to accede to hegemonic attitudes regarding what is ‘good’ writing points to a deliberate decision to preserve what Herbert Marcuse terms ‘artistic alienation’ (Sinclair 63). According to Marcuse, artistic alienation, as distinct from traditional Marxist notions of alienation, should be encouraged in order to preserve the integrity of the work of art as something that has the power to rupture reality. In late era capitalism, reality is the totality of commodity culture, thus art must remain antagonistic to the ubiquity of the commodity form. Or, in Marcuse’s words, ‘art has …magic power only as the power of negation. It can speak its own language only as long as the images are alive which refuse and refute the established order’ (65). Within the panoptic schema, the disciplinary apparatus of capitalism, refusal, or refuse, is equivalent to obscenery. Like raw sewage washing up on the beach, or a split garbage bag lying uncollected in the street, Sinclair’s writing is matter out-of-place. If Panopticism, as Foucault theorises, is to efficiently and effectively implement discipline via real and imagined networks of surveillance that shift constantly between operations extrinsic and intrinsic to the subject, it does not necessarily prevent heterogeneous, transgressive, or subversive practice from emerging. However, it will, by means of this surveillance, draw attention to these practices, classify and segregate them, apply pejorative labels such as ‘bad’, ‘useless’, ‘harmful’, and relegate them to a social or spatial sphere outside the realm of the normative tastes and standards. In this process lies the Panopticon’s vast potential to devise, standardise, and regulate patterns of production and consumption. Practices and production that do not conform to hegemonic conventions are deemed aberrant, and rendered invisible. In a capitalist political economy, where governing institutions and operations function as extensions of systems predicated upon the fetishism of commodities, regulating patterns of consumption—by deciding what can and can’t be seen—imposes control. According to the logic of scopophilic culture, to be ‘unseen,’ by choice or otherwise, necessarily restricts consumption. In this manner, the Panopticon reinforces its role as arbiter of public taste. Obscenery’s visibility, however, rejects panoptic classification. It resists the panoptic systems that police cultural production, not by remaining hidden, or Other, but by declaring its presence. Unlike the commodity, which in its conformity is seamlessly assimilated into consumer culture, obscenery draws attention. Beckton Alp, a sanitised pile of waste rendered useful, palatable, is, in contrast, an example of obscenery averted (see endnote). As Marx explains, for a product to exist fully it must be consumed (91). A book becomes a product only when it is read. Writing that is designed to refuse the act of reading is perverse according to any schema of cultural logic, but particularly according to the logic of an economy driven by consumption. This refusal resonates with particular force within a capitalist schema of cultural production because it is fundamentally contrary to the process of commodification. Sinclair’s texts deny easy, uncritical consumption and subsequently cause a blockage in the process of commodification. In this manner, Sinclair contends the logos of capitalist alchemy. A book that resists being easily read, but is still visible to mainstream culture, constitutes a type of obscenery. Situating Sinclair’s poiesis within the domain of obscenery enables an understanding of why his texts have been judged by some critics and readers as ‘bad,’ difficult, inaccessible, impenetrable, even ‘unreadable’. Practitioners of counter-cultural and sub-cultural art and literature traditionally protect their minoritarian status and restrict access to their work by consciously constructing texts which might be considered ‘shit’; in other words, creating something that is deemed excremental, or ‘bad’ according to hegemonic tastes and standards. They create something that inhibits smooth digestion, something that causes a malfunction in the order of consumption. Stylistically, Sinclair employs a number of linguistic and formal devices to repulse the reader. Unrelenting verbiage and extreme parataxis are two such contrivances, as this exemplary excerpt from Dining on Stones illustrates: HEALTHY BOWELS? No problem in that department. Quite the reverse. Eyes: like looking out of week-old milk bottles. Ears clogged and sticky nose broken. But bowels ticked like a German motor: Stephen X, age unknown: writer. Marine exile. His walk, the colonnade. Wet suits for scuba divers. Yellowed wedding dresses. Black god franchises. Fast food. NO CASH KEPT ON PREMISES. The shops, beneath the hulk of the Ocean Queen flats, dealt in negatives, prohibitions – fear. They kept no stock beyond instantly forgotten memorabilia, concrete floors. Stephen releases a clutch of bad wind. (Sinclair 308) Sinclair’s writing constructs linguistic heterotopias that ‘desiccate speech, stop words in their tracks, contest the very possibility of grammar’ (Foucault, Archaeology xix). His language is clipped, elliptical, arrhythmic. In fact, Sinclair’s prose often doesn’t resemble prose; formally and syntactically, it is more aligned with poetry. It is peppered with paradoxical conceits—‘forgotten memorabilia’—which negate meaning and amplify the inscrutability of his words. His imagery is unexpected, discordant, frequently unsettling, as is his unpredictable register which veers from colloquialisms (‘No problem in that department’; Sinclair 308) to more formal, literary modes of expression (‘Stephen X, age unknown: writer’; Sinclair 308). Sinclair also alienates the reader through the use of digressive narrative, which in its Blakean insistence on cyclical shapes resists the linear structure associated with the shape of rational imagination. In terms of the economy of a teleological narrative, Sinclair’s storytelling in novels like Dining on Stones is wasteful in its diversions. His fictions and non-fictions contain characters and events that are incidental to what only occasionally resembles a plot. The apotheosis of the urge to contend linear forms of narrative is chronicled in Sinclair’s 2002 book London Orbital, a navigation of the M25 that as a circuitous journey has neither defined point of origin nor a locatable terminus. Sinclair’s novels, criticism, poetry, films constitute a hermeneutic circle, insisting that you have a working knowledge of the other texts in order to decipher the single text, and the body of work gives meaning to each discrete text. Acquiring Sinclair’s recondite code—which those who are cognisant with his style are well aware—is not a task for the uncommitted. The reader must assume the role of detective tracking down his poetry in second-hand bookshops. Obscure references that saturate the page must be researched. To read and understand Sinclair requires what sociologist Pierre Bourdieu has called ‘cultural competence’ (2). Bourdieu’s ideas on taste and consumption provide a framework for understanding Sinclair’s textual allegiances, his affinity for other types of textual obscenery—unsanctioned graffiti, small magazine poetry—which are also derided as ‘shit’, as ‘bad’ writing by those who have not acquired the cultural competence necessary to understand their coded information. There is a self-reflexive joke contained in the title Dining on Stones. After all, it is a novel that constantly urges the reader to swallow indigestible text and unsavoury subject matter. Sinclair’s writing continually forces our attentions back to the purlieus of urban culture, to everything that the centrifugal forces of Panopticism have driven to the periphery: social inequality, marginal spatial practice, refuse, shit. Sinclair’s textual obscenery is perceived as ‘bad’, as excremental because it denies mainstream literary audiences the satisfaction of uncomplicated, uncritical consumption. According to the restrictive logic of late era capitalism, Sinclair’s slippery, complex, inaccessible narratives are perverse. But they are also the source of perverse pleasure for those who refuse the inhibitions of conformity. Endnote Visual technology in the service of surveillance has been steadily integrated into the everyday, and, by virtue of its ubiquity, has become ‘unseen.’ Similar to the panoptic technologies described by Foucault, Beckton Alp, ‘a considerable event that nobody notices,’ (Sinclair, Dining on Stones, 179) is also assimilated into the urban landscape. References Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. London: Routledge, 2003. De Certeau, Michel. The Practice of Everyday Life. Berkeley: U of California P, 1988. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. London: Penguin, 1977. The Order of Things: An Archaeology of the Human Sciences. London and New York: Routledge, 2002. Jeffries, Stuart. “On the Road.” The Guardian Online 24 Apr. 2004. 28 Apr. 2004 http://books.guardian.co.uk/departments/generalfiction/story/0,,1201856,00.html>. Marcuse, Herbert. One-Dimensional Man. London & New York: Routledge, 2002. Marx, Karl. Grundrisse: Foundations of the Critique of Political Economy (Rough Draft). Trans. Martin Nicolaus. Harmondsworth: Penguin, 1973. Sinclair, Iain. Dining on Stones (or, the Middle Ground). London: Hamish Hamilton, 2004. Sinclair, Iain. London Orbital. London: Granta, 2002. Citation reference for this article MLA Style Seale, Kirsten. "Iain Sinclair's Excremental Narratives." M/C Journal 8.1 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0502/03-seale.php>. APA Style Seale, K. (Feb. 2005) "Iain Sinclair's Excremental Narratives," M/C Journal, 8(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0502/03-seale.php>.

46

Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone." M/C Journal 10, no.1 (March1, 2007). http://dx.doi.org/10.5204/mcj.2602.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction As the country with the fifth largest population in the world, Indonesia is a massive potential market for mobile technology adoption and development. Despite an annual per capita income of only $1,280 USD (World Bank), there are 63 million mobile phone users in Indonesia (Suhartono, sec. 1.7) and it is predicted to reach 80 million in 2007 (Jakarta Post 1). Mobile phones are not only a symbol of Indonesian modernity (Barendregt 5), but like other communication technology can become a platform through which to explore socio-political issues (Winner 28). In this article we explore the role mobile phone technology in contemporary forms of social, intimate, and sexual relationships in Indonesia. We argue that new forms of expression and relations are facilitated by the particular features of mobile technology. We discuss two cases from contemporary Indonesia: a mobile dating service (BEDD) and mobile phone pornography. For each case study, we first discuss the socio-political background in Indonesia, then describe the technological affordances of the mobile phone which facilitate dating and pornography, and finally give examples of how the mobile phone is effecting change in dating and pornographic practices. This study is placed at a time when social relations, intimacy, and sexuality in Indonesia have become central public issues. Since the end of the New Order whilst many people have embraced the new freedoms of reformasi and democratization, there is also a high degree of social anxiety, tension and uncertainty (Juliastuti 139-40). These social changes and desires have played out in the formations of new and exciting modes of creativity, solidarity, and sociality (Heryanto and Hadiz 262) and equally violence, terror and criminality (Heryanto and Hadiz 256). The diverse and plural nature of Indonesian society is alive with a myriad of people and activities, and it is into this diverse social body that the mobile phone has become a central and prominent feature of interaction. The focus of our study is dating and pornography as mediated by the mobile phone; however, we do not suggest that these are new experiences in Indonesia. Rather over the last decade social, intimate, and sexual relationships have all been undergoing change and their motivations can be traced to a variety of sources including the factors of globalization, democratization and modernization. Throughout Asia “new media have become a crucial site for constituting new Asian sexual identities and communities” (Berry, Martin, and Yue 13) as people are connecting through new communication technologies. In this article we suggest that mobile phone technology opens new possibilities and introduces new channels, dynamics, and intensities of social interaction. Mobile phones are particularly powerful communication tools because of their mobility, accessibility, and convergence (Ling 16-19; Ito 14-15; Katz and Aakhus 303). These characteristics of mobile phones do not in and of themselves bring about any particular changes in dating and pornography, but they may facilitate changes already underway (Barendegt 7-9; Barker 9). Mobile Dating Background The majority of Indonesians in the 1960s and 1970s had arranged marriages (Smith-Hefner 443). Education reform during the 70s and 80s encouraged more women to attain an education which in turn led to the delaying of marriage and the changing of courtship practices (Smith-Hefner 450). “Compared to previous generations, [younger Indonesians] are freer to mix with the opposite sex and to choose their own marriage,” (Utomo 225). Modern courtship in Java is characterized by “self-initiated romance” and dating (Smith-Hefner 451). Mobile technology is beginning to play a role in initiating romance between young Indonesians. Technology One mobile matching or dating service available in Indonesia is called BEDD (www.bedd.com). BEDD is a free software for mobile phones in which users fill out a profile about themselves and can meet BEDD members who are within 20-30 feet using a Bluetooth connection on their mobile devices. BEDD members’ phones automatically exchange profile information so that users can easily meet new people who match their profile requests. BEDD calls itself mobile social networking community; “BEDD is a new Bluetooth enabled mobile social medium that allows people to meet, interact and communicate in a new way by letting their mobile phones do all the work as they go throughout their day.” As part of a larger project on mobile social networking (Humphreys 6), a field study was conducted of BEDD users in Jakarta, Indonesia and Singapore (where BEDD is based) in early 2006. In-depth interviews and open-ended user surveys were conducted with users, BEDD’s CEO and strategic partners in order to understand the social uses and effects BEDD. The majority of BEDD members (which topped 100,000 in January 2006) are in Indonesia thanks to a partnership with Nokia where BEDD came pre-installed on several phone models. In management interviews, both BEDD and Nokia explained that they partnered because both companies want to help “build community”. They felt that Bluetooth technology such as BEDD could be used to help youth meet new people and keep in touch with old friends. Examples One of BEDD’s functions is to help lower barriers to social interaction in public spaces. By sharing profile information and allowing for free text messaging, BEDD can facilitate conversations between BEDD members. According to users, mediating the initial conversation also helps to alleviate social anxiety, which often accompanies meeting new people. While social mingling and hanging out between Jakarta teenagers is a relatively common practice, one user said that BEDD provides a new and fun way to meet and flirt. In a society that must balance between an “idealized morality” and an increasingly sexualized popular culture (Utomo 226), BEDD provides a modern mode of self-initiated matchmaking. While BEDD was originally intended to aid in the matchmaking process of dating, it has been appropriated into everyday life in Indonesia because of its interpretive flexibility (Pinch & Bjiker 27). Though BEDD is certainly used to meet “beautiful girls” (according to one Indonesian male user), it is also commonly used to text message old friends. One member said he uses BEDD to text his friends in class when the lecture gets boring. BEDD appears to be a helpful modern communication tool when people are physically proximate but cannot easily talk to one another. BEDD can become a covert way to exchange messages with people nearby for free. Another potential explanation for BEDD’s increasing popularity is its ability to allow users to have private conversations in public space. Bennett notes that courtship in private spaces is seen as dangerous because it may lead to sexual impropriety (154). Dating and courtship in public spaces are seen as safer, particularly for conserving the reputation young Indonesian women. Therefore Bluetooth connections via mobile technologies can be a tool to make private social connections between young men and women “safer”. Bluetooth communication via mobile phones has also become prevalent in more conservative Muslim societies (Sullivan, par. 7; Braude, par. 3). There are, however, safety concerns about meeting strangers in public spaces. When asked, “What advice would you give a first time BEDD user?” one respondent answered, “harus bisa mnilai seseorang krn itu sangat penting, kita mnilai seseorang bukan cuma dari luarnya” (translated: be careful in evaluating (new) people, and don’t ever judge the book by its cover”). Nevertheless, only one person participating in this study mentioned this concern. To some degree meeting someone in a public may be safer than meeting someone in an online environment. Not only are there other people around in public spaces to physically observe, but co-location means there may be some accountability for how BEDD members present themselves. The development and adoption of matchmaking services such as BEDD suggests that the role of the mobile phone in Indonesia is not just to communicate with friends and family but to act as a modern social networking tool as well. For young Indonesians BEDD can facilitate the transfer of social information so as to encourage the development of new social ties. That said, there is still debate about exactly whom BEDD is connecting and for what purposes. On one hand, BEDD could help build community in Indonesia. One the other hand, because of its privacy it could become a tool for more promiscuous activities (Bennett 154-5). There are user profiles to suggest that people are using BEDD for both purposes. For example, note what four young women in Jakarta wrote in the BEDD profiles: Personal Description Looking For I am a good prayer, recite the holy book, love saving (money), love cycling… and a bit narcist. Meaning of life Ordinary gurl, good student, single, Owen lover, and the rest is up to you to judge. Phrenz ?! Peace?! Wondeful life! I am talkative, have no patience but so sweet. I am so girly, narcist, shy and love cute guys. Check my fs (Friendster) account if you’re so curious. Well, I am just an ordinary girl tho. Anybody who wants to know me. A boy friend would be welcomed. Play Station addict—can’t live without it! I am a rebel, love rock, love hiphop, naughty, if you want proof dial 081********* phrenz n cute guyz As these profiles suggest, the technology can be used to send different kinds of messages. The mobile phone and the BEDD software merely facilitate the process of social exchange, but what Indonesians use it for is up to them. Thus BEDD and the mobile phone become tools through which Indonesians can explore their identities. BEDD can be used in a variety of social and communicative contexts to allow users to explore their modern, social freedoms. Mobile Pornography Background Mobile phone pornography builds on a long tradition of pornography and sexually explicit material in Indonesia through the use of a new technology for an old art and product. Indonesia has a rich sexual history with a documented and prevalent sex industry (Suryakusuma 115). Lesmana suggests that the country has a tenuous pornographic industry prone to censorship and nationalist politics intent on its destruction. Since the end of the New Order and opening of press freedoms there has been a proliferation in published material including a mushrooming of tabloids, men’s magazines such as FHM, Maxim and Playboy, which are often regarded as pornographic. This is attributed to the decline of the power of the bureaucracy and government and the new role of capital in the formation of culture (Chua 16). There is a parallel pornography industry, however, that is more amateur, local, and homemade (Barker 6). It is into this range of material that mobile phone pornography falls. Amongst the myriad forms of pornography and sexually explicit material available in Indonesia, the mobile phone in recent years has emerged as a new platform for production, distribution, and consumption. This section will not deal with the ethics of representation nor engage with the debate about definitions and the rights and wrongs of pornography. Instead what will be shown is how the mobile phone can be and has been used as an instrument/medium for the production and consumption of pornography within contemporary social relationships. Technology There are several technological features of the mobile phone that make pornography possible. As has already been noted the mobile phone has had a large adoption rate in Indonesia, and increasingly these phones come equipped with cameras and the ability to send data via MMS and Bluetooth. Coupled with the mobility of the phone, the convergence of technology in the mobile phone makes it possible for pornography to be produced and consumed in a different way than what has been possible before. It is only recently that the mobile phone has been marketed as a video camera with the release of the Nokia N90; however, quality and recording time are severely limited. Still, the mobile phone is a convenient and at-hand tool for the production and consumption of individually made, local, and non-professional pieces of porn, sex and sexuality. It is impossible to know how many such films are in circulation. A number of websites that offer these films for downloads host between 50 and 100 clips in .3gp file format, with probably more in actual circulation. At the very least, this is a tenfold increase in number compared to the recent emergence of non-professional VCD films (Barker 3). This must in part be attributed to the advantages that the mobile phone has over standard video cameras including cost, mobility, convergence, and the absence of intervening data processing and disc production. Examples There are various examples of mobile pornography in Indonesia. These range from the pornographic text message sent between lovers to the mobile phone video of explicit sexual acts (Barendregt 14-5). The mobile phone affords privacy for the production and exchange of pornographic messages and media. Because mobile devices are individually owned, however, pornographic material found on mobile phones can be directly tied to the individual owners. For example, police in Kotabaru inspected the phones of high school students in search of pornographic materials and arrested those individuals on whose phones it was found (Barendregt 18). Mobile phone pornography became a national political issue in 2006 when an explicit one-minute clip of a singer and an Indonesian politician became public. Videoed in 2004, the clip shows Maria Eva, a 27 year-old dangdut singer (see Browne, 25-6) and Yahya Zaini, a married 42 year-old who was head of religious affairs for the Golkar political party. Their three-year affair ended in 2005, but the film did not become public until 2006. It spread like wildfire between phones and across the internet, however, and put an otherwise secret relationship into the limelight. These types of affairs and relationships were common knowledge to people through gossip, exposes such as Jakarta Undercover (Emka 93-108) and stories in tabloids; yet this culture of adultery and prostitution continued and remained anonymous because of bureaucratic control of evidence and information (Suryakusuma 115). In this case, however, the filming of Maria Eva once public proves the identities of those involved and their infidelity. As a result of the scandal it was further revealed that Maria Eva had been forced by Yayha Zaini and his wife to have an abortion, deepening the moral crisis. Yahya Zaini later resigned as his party’s head of Religious Affairs (Asmarani, sec. 1-2), due to what was called the country’s “first real sex scandal” (Naughton, par. 2). As these examples show, there are definite risks and consequences involved in the production of mobile pornography. Even messages/media that are meant to be shared between two consenting individuals can eventually make their way into the public mobile realm and have serious consequences for those involved. Mobile video and photography does, however, represent a potential new check on the Indonesian bureaucratic elite which has not been previously available by other means such as a watchdog media. “The role of the press as a control mechanism is practically nonexistent [in Jakarta], which in effect protects corruption, nepotism, financial manipulation, social injustice, and repression, as well as the murky sexual life of the bureaucratic power elite,” (Suryakusuma 117). Thus while originally a mobile video may have been created for personal pleasure, through its mass dissemination via new media it can become a means of sousveillance (Mann, Nolan and Wellman 332-3) whereby the control of surveillance is flipped to reveal the often hidden abuses of power by officials. Whilst the debates over pornography in Indonesia tend to focus on the moral aspects of it, the broader social impacts of technology on relationships are often ignored. Issues related to power relations or even media as cultural expression are often disregarded as moral judgments cast a heavy shadow over discussions of locally produced Indonesian mobile pornography. It is possible to move beyond the moral critique of pornographic media to explore the social significance of its proliferation as a cultural product. Conclusion In these two case studies we have tried to show how the mobile phone in Indonesia has become a mode of interaction but also a platform through which to explore other current issues and debates related to dating, sexuality and media. Since 1998 and the fall of the New Order, Indonesia has been struggling with blending old and new, a desire of change and nostalgia for past, and popular desire for a “New Indonesia” (Heryanto, sec. Post-1998). Cultural products within Indonesia have played an important role in exploring these issues. The mobile phone in Indonesia is not just a technology, but also a product in and through which these desires are played out. Changes in dating and pornography practices have been occurring in Indonesia for some time. As people use mobile technology to produce, communicate, and consume, the device becomes intricately related to identity struggle and cultural production within Indonesia. It is important to keep in mind, however, that while mobile technology adoption within Indonesia is growing, it is still limited to a particular subset of the population. As has been previously observed (Barendregt 3), it is wealthier, young people in urban areas who are most intensely involved in mobile technology. As handset prices decrease and availability in rural areas increases, however, no longer will mobile technology be so demographically confined in Indonesia. The convergent technology of the mobile phone opens many possibilities for creative adoption and usage. As a communication device it allows for the creation, sharing, and viewing of messages. Therefore, the technology itself facilitates social connections and networking. As demonstrated in the cases of dating and pornography, the mobile phone is both a tool for meeting new people and disseminating sexual messages/media because it is a networked technology. The mobile phone is not fundamentally changing dating and pornography practices, but it is accelerating social and cultural trends already underway in Indonesia by facilitating the exchange and dissemination of messages and media. As these case studies show, what kinds of messages Indonesians choose to create and share are up to them. The same device can be used for relatively innocuous behavior as well as more controversial behavior. With increased adoption in Indonesia, the mobile will continue to be a lens through which to further explore modern socio-political issues. References Asmarani, Devi. “Indonesia: Top Golkar Official Quits over Sex Video.” The Straits Times 6 Dec. 2006. Barendregt, Bart. “Between M-Governance and Mobile Anarchies: Pornoaksi and the Fear of New Media in Present Day Indonesia.” European Association of Social Anthropologists Media Anthropology Network e-Seminar Series, 2006. Barker, Thomas. “VCD Pornography of Indonesia.” Asian Studies Association of Australia, Wollongong, 2006. BEDD Press Release. “World’s First Mobile Communities Software Is Bringing People Together in Singapore.” 8 June 2004. Bennett, Linda Rae. Women, Islam and Modernity: Single Women, Sexuality and Reproductive Health in Contemporary Indonesia. London: Routledge Curzon, 2005. Berry, Chris, Fran Martin, and Audrey Yue, eds. Mobile Cultures: New Media in Queer Asia. Durham, NC: Duke UP, 2003. Braude, Joseph. “How Bluetooth Helps Young Kuwaitis Get It On.” The New Republic Online 14 Sep. 2006. Browne, Susan. “The Gender Implications of Dangdut Kampungan: Indonesian ‘Low Class’ Popular Music.”* *Working Paper 109, Centre of Southeast Asian Studies, Monash University. 2000. Chua, Beng-Huat. “Consuming Asians: Ideas and Issues.” Consumption in Asia: Lifestyles and Identities. Ed. Beng-Huat Chua. London: Routledge, 2003. 1-34. Emka, Moammar. Jakarta Undercover: Sex n’ the City. Yogyakarta: Galang Press, 2002. Heryanto, Ariel. “New Media and Pop Cultures in(ter) Asia.” Soft Power and Spheres of Influence in South and Southeast Asia. National University of Singapore, 2006. Heryanto, Ariel, and Vedi Hadiz. “Post-Authoritarian Indonesia: A Comparative Southeast Asian Perspective.” Critical Asian Studies 37.2 (2005): 251-75. Humphreys, Lee. “Mobile Devices and Social Networking.” Mobile Pre-Conference at the International Communication Association. Erfurt, Germany, 2006. Ito, Mizuko. “Introduction: Personal, Portable, Pedestrian.” Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. Eds. Mizuko Ito, Diasuke Okabe, and Misa Matsuda. Cambridge, MA: MIT Press, 2005. 1-16. JakartaPost.com. “Cell-Phone Users May Reach 80m This Year.” 6 Jan. 2006. http://www.thejakartapost.com/detailheadlines.asp? fileid=20070106.@02&irec=1>. Juliastuti, Nuraini. “Whatever I Want: Media and Youth in Indonesia before and after 1998.” Inter-Asia Cultural Studies 7 (2006): 1. Katz, James E., and Mark Aakhus, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. New York: Cambridge UP, 2002. Lesmana, Tjipta. Pornografi dalam Media Massa. Jakarta: Puspa Swara, 1994. Ling, Richard. The Mobile Connection: The Cell Phone’s Impact on Society. San Francisco, CA: Morgan Kaufmann, 2004. Mann, Steve, Jason Nolan, and Barry Wellman. “Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.” Surveillance and Society 1.3 (2003): 331-55. Naughton, Philippe. “Video Sex Scandal Claims Indonesian MP.” The Times Online 8 Dec. 2006. Pinch, Trevor J., and Wiebe E. Bijker. “The Social Construction of Facts and Artifacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other.” The Social Construction of Technological Systems: New Direction in the Sociology and History of Technology. Eds. W. E. Bijker, T. P. Hughes and T.J. Pinch. Cambridge, MA: MIT Press, 1987. 17-51. Smith-Hefner, Nancy J. “The New Muslim Romance: Changing Patterns of Courtship and Marriage among Educated Javanese Youth.” Journal of Southeast Asian Studies 36.3 (2005): 441-59. Suhartono, Harry. “Mobile Penetration to Drive Market Leader’s Profit Gain.” Reuters News 27 Oct. 2006. Sullivan, Kevin. “Saudi Youth Use Cellphone Savvy to Outwit the Sentries of Romance.” The Washington Post 6 Aug. 2006: A01. Suryakusuma, Julia. “The State and Sexuality in New Order Indonesia.” Fantasizing the Feminine in Indonesia. Ed. Laurie J. Sears. Durham, NC: Duke UP, 1996. 92-119. Utomo, Iwu Dwisetyani. “Sexual Values and Early Experiences among Young People in Jakarta: Youth, Courtship and Sexuality.” Coming of Age in South and Southeast Asia. Eds. Lenore Manderson and Pranee Liamputtong. Surey: Curzon, 2002. 207-27. Winner, Langdon. “Do Artifacts Have Politics?” Social Shaping of Technology. 2nd ed. Eds. Donald MacKenzie and Judy Wajcman. Buckingham, UK: Open UP, 2002. 28-40. World Bank. 2004 Indonesia Data & Statistics. 4 Jan. 2006. http://web.worldbank.org/WBSITE/EXTERNAL/COUNTRIES/ EASTASIAPACIFICEXT/INDONESIAEXTN/0,,menuPK:287097~pagePK: 141132~piPK:141109~theSitePK:226309,00.html>. Citation reference for this article MLA Style Humphreys, Lee, and Thomas Barker. "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>. APA Style Humphreys, L., and T. Barker. (Mar. 2007) "Modernity and the Mobile Phone: Exploring Tensions about Dating and Sex in Indonesia," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/06-humphreys-barker.php>.

47

Gertz, Janine, Emma Maguire, Theresa Petray, and Bryan Smith. "Violence." M/C Journal 23, no.2 (May13, 2020). http://dx.doi.org/10.5204/mcj.1658.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

As part of an effort to grapple with the meaning of violence, Hannah Arendt argued that it was curious how infrequently violence was taken up for special consideration in conversations of history and politics, remarking that “this shows to what an extent violence and its arbitrariness were taken for granted and therefore neglected; no one questions or examines what is obvious to all” (8). While we are not suggesting that violence has eluded the critical eye in the time since Arendt’s argument, there is something remarkably resonant about the idea that violence is taken-for-granted as part of human existence, and thus—for privileged citizens protected from its affects—invisible. In this issue, the contributors explore how violence continues to define and shape social, political, and cultural terrains. In what follows, we explore what it means to talk about violence and follow this with a general introduction to the pieces in this special issue that tease out the various locations of violence and its representations across different spaces. Defining Violence In general in western society, we think of violence in its most manifest forms: war, terrorism or massacres. But violence operates in many forms, some of them more subtle or latent and arguably more destructive given their structural and far-reaching character. Some forms of violence are easily recognised, others decontextualised and depoliticised through complex cultural processes of normalisation and denial (Brison). Violence can become a spectacle, an aestheticised representation, or it can be reduced to banality when its horror and trauma is refracted through everyday lives and spaces which are shaped by violent systems and ideologies (Arendt). Notions of trauma, spectatorship, testimony, and witnessing circulate through narratives of violence. Ideas of “civilisation” implicitly and explicitly reference competing discourses of violence and put them to work in damaging ways, often in the service of ideals (liberalism, for example) that mask the very violence that supports them. Even those discourses that claim most ardently to uphold principles of safety and inclusion (for example, multiculturalism) are impeded by or invested in systems of violence, and in fact they depend on it for their very legitimacy. For those of us living and working in white, patriarchal, settler states, it is inevitable that our cultural and material conditions are underpinned by a systemic and perpetual condition of violence. Even for those of us who feel generally safe, violence is all around us, shaping how we live, work, think, feel, and act. However, violence is not equally experienced throughout the world or within our own communities, nor is the absence of violence. Ultimately, feeling safe from violence is often a marker of privilege and safety often comes at the price of violence enacted upon others. What makes violence so powerful as a force with material and symbolic consequences is both this articulation with privilege and its resultant banal expression in everyday spaces. Projects of racial, gendered, sexed, classed and ableist exclusion and violence operate below the surface of conscious registration for those not immediately impacted by them, allowing violence to elude critical interrogation. In this respect, even the idea of safety is only possible through a guarantee of violence, a guarantee written into the lands themselves, the institutions of the state, and the discourse of Western liberal traditions. Both victims and perpetrators of violence differ in their visibility. In easily recognised forms of violence, there is usually an actor who is violent and a victim of that violence. However, even in the most obvious cases, there are examples of missing perpetrators. For example, domestic violence is often discussed using passive language that centres the victim and erases the perpetrator (Katz and Earp). Or in the case of police violence against minorities, even where there is compelling evidence of police brutality, legal systems fail to find and sentence perpetrators (e.g. Chernega; Waters). This process of erasure is itself a further act of violence that places blame on victims, leading outsiders to question why they didn’t take action to prevent their victimisation. However, increasing attention has been given to these subtle erasures; for example, Jane Gilmore’s book Fixed It: Violence and the Representation of Women in the Media calls the mainstream media to task for their representation of gender violence as a problem women experience, rather than a problem perpetrated by men. This issue of M/C Journal invited responses to the theme of “violence,” understood broadly, as it operates through various social, cultural, institutional, and affective domains. The articles included here demonstrate the complexity of different forms of violence. They cover terrain such as symbolic violence and the discursive, political and social domination that shapes contemporary or historical realities; pedagogical violence and the operation of power and control over the means of intellectual, social and cultural production in spaces of learning; physical violence and the attendant damages that this entails; technological violence and the ways in which media technologies facilitate or resist violence; and violence as a subject of public interest in forms including news media, true crime, and entertainment. This issue’s articles intersect in interesting ways which encourage readers to think about multiple aspects of violence. We explore some of the common themes below, and in doing so introduce readers to the rich collection of ideas included in this issue. Enacted Violence It is interesting to consider what we can learn from violence by thinking about the perspectives of those who perpetrate it, and those who experience it. As discussed above, sometimes these agents are easier to spot. Larissa Sexton-Finck’s contribution reminds us that the most visible forms of violence aren’t necessarily the most damaging. In her essay, she explores her experience of being in a car crash. The obvious perpetrator of violence is the driver of the car that caused the crash, but as we read through her experience we see that she was victimised in many ways by those who filmed her experience in order to sell it to the news. These ‘citizen journalists’ are likely to think of their work as important and not as enacting violence on others, but Sexton-Finck’s firsthand experience of being filmed highlights the violence of the act. Similarly, some practices are so commonplace that it is easy to overlook the violence inherent within them. Yirga Woldeyes gives us the example of museum collections, a taken-for-granted effect of colonisation, which perpetuates an ongoing violent epistemic power differential. This is another example of violence with an invisible perpetrator; museums consider themselves keepers of knowledge, protectors of culture and heritage. Where collecting is considered an act of violence, it is typically perceived as action from the past, rather than an ongoing act of violence with continuing experiences of victimisation. However, as Woldeyes’ article makes clear, the violence of the act reverberates for generations. For Ailie McDowall, violence works in subtle ways that are both unconscious or explicit. Exploring pre-service teacher engagements with an Indigenous education subject, McDowall speaks to the limits of intention (Milner) by highlighting how the good intentions of pre-service teachers can result in ideological violence through the bringing of Indigenous peoples and knowledges into Western epistemic comprehension as part of an effort to know. Further, while educators are often called to envision “preferred futures” (Hicks) in their teaching practice, McDowall shows us that ethical calls to teach and live responsibly and critically in the face of colonial logics results in a deferral of that responsibility to the future, what McDowall identifies as an act of violence. Representations of Violence Social understandings of violence are both shaped by, and influence, representations of violence in media, culture, and the arts. Such representations can themselves be forms of symbolic violence, that is, ”violence wielded with tacit complicity between its victims and its agents, insofar as both remain unconscious of submitting to or wielding it” (Bourdieu 17). As mechanisms for transmitting normalised ideas of politics and peoples, representations can effect such symbolic violence by disseminating hegemonic notions of exclusion/inclusion, safety/harm, and justifications and logics for violence. Indeed, as Dervin argues, “representations do have an ideological component and […] an exercise of power is always present in representations” (185). Yet, we are wise to remember that representations, the projection of power, and the ideological legitimation of symbolic violence that may inhere in representations can neither guarantee truth nor action as people exercise agency and speak and act back to and against those very representations of “truth”. The authors in this issue work within this tension, highlighting efforts by some to either create and deploy representation as an instrument of legitimating violence or critically engaging representations of violence as part of efforts to dismantle and surfaces the symbolic violence transmitted through various works. When considering the symbolic violence of media, it is crucial that we consider who is doing the representation, and how that representation is mediated. Social media (as discussed in the contribution by Milton and Petray), has different characteristics to products of the culture industry (Adorno) such as commercial news reporting (Sexton-Finck) or cinematic films (McKenzie-Craig). And these are different again in the literary genre of the autobiographical novel (Nile) or the form of the public testimony (Craven). Some representations of violence allow for more agency than others. Creative works by victims of violence, for example that discussed by Sexton-Finck, challenge viewers and draw our attention to the ways the commodification of the culture industry (Adorno) makes us complicit as spectators in acts of violence. In a similar way, creative representations of enacting violence can cause productive discomfort by going against stereotypes and norms about who perpetrates violence. Carolyn McKenzie-Craig's contribution compares representations of gender and violence that defy expectations. McKenzie-Craig considers the Swedish film Män som hatar kvinnor (released in English as The Girl with the Dragon Tattoo) alongside work from non-binary artist, Cassils, and her own creative works. In all three of these works, women and non-binary agents enact violence in ways that unsettle viewers, forcing contemplation about the nature of violence. Likewise, literature provides a fruitful arena for examining violence as a cultural force. Indeed, post-colonial scholars have shown us that literature has been a tool of violence, and has, in contrast, also been used to “write back” to oppressive ideologies (Ashcroft, Griffiths, and Tiffin, after Salman Rushdie). Richard Nile’s essay considers the power of violence to echo through families in cases of intergenerational trauma. In considering an autobiographical novel that takes the form of a family drama, Nile traces the reverberations of real wartime violence and family violence and shows how fictionalising such trauma can reveal new ways of looking at it, both for the author of such a work and for the historians and literary scholars who examine such work. In the article by Milton and Petray, the authors explore how violence mediates and regulates ideas of belonging as it is is represented through a lens of citizenship via social media. Through an exploration of a digital space, Milton and Petray highlight the bifurcation of people into us/them, a split predicated on desires to protect the sanctity of “us” and “our” citizenship through the use of violent discourse to normalise the divide. What is perhaps most striking is the reminder that categories of inclusion are powerfully framed through everything from the banality of seemingly mundane language and everyday languages of race (Billig; Hill) through to more abhorrent language and far reaching discourses of normalised violence. Through this, Milton and Petray draw our attention not just to the manifestation of violence online but also its use as a strategy for regulating inclusion into the deemed “legitimate” community through the very act of representing people as either legitimate citizens or not. As who counts as a citizen in need of state protection is contested, so is what counts as violence. In “The Last of the Long Takes: Feminism, Sexual Harassment, and the Action of Change”, Allison Craven reminds us that the naming of systemic violence remains a crucial early step in the fight against it, and goes some way toward dismantling its taken-for-grandness. In considering Lauren Berlant’s notion of the “diva citizen” in relation to Anita Hill’s 1991 testimony of sexual harassment, Craven reframes the #metoo movement as a call to action to which, crucially, the body politic must respond. Craven draws our attention to the fact that the second-wave feminist movement’s naming of workplace sexual harassment created the conditions for a public that would hear and witness these later testimonies. In naming violence where we see it and considering violence from various and multiple scholarly dimensions, the essays in this issue refuse to shelter it beneath the veil of the everyday, the arbitrary, the taken for granted. In explicitly naming violence, they bring it out into the open, and they allow us to consider alternatives. Creative works, for example, offer an opportunity to play with the meanings of violence, and to reimagine what it means to be an aggressor or a victim (McKenzie-Craig; Sexton-Finck). Through such explorations, these pieces collectively draw to our attention the possibility and need for futures different from the histories and present that we inherit and live within today. Together, the arguments, insights and calls for something different compel us to confront that which some seek not to discuss, that which some of us might take for granted as a condition of everyday life. Through such calls, we are asked to confront what it means to live and relate ethically together for something and somewhere different. References Adorno, Theodor W. “Culture Industry Reconsidered.” Media Studies. Eds. P. Marris and S. Thornham. Edinburgh: Edinburgh University Press, 1999. 31–7. Arendt, Hannah. On Violence. London: Harcourt, 1970. Ashcroft, Bill, Gareth Griffiths, and Helen Tiffin. The Empire Writes Back: Theory and Practice in Postcolonial Literatures. London: Routledge, 1989. Billig, Michael. Banal Nationalism. Thousand Oaks: Sage, 1995. Bourdieu, Pierre. On Television and Journalism. London: Pluto Press, 1998. Chernega, Jennifer. “Black Lives Matter: Racialised Policing in the United States.” Comparative American Studies 14.3-4 (2016): 234-45. Dervin, Fred. “Cultural Identity, Representation and Othering.” The Routledge Handbook of Language and Intercultural Communication. Ed Jane Jackson. New York: Routledge, 2012. 181–94. Gilmore, Jane. Fixed It: Violence and the Representation of Women in the Media. Melbourne: Penguin Random House, 2019.Hicks, David. Lessons for the Future: The Missing Dimension in Education. New York: Routledge Falmer, 2002. Hill, Jane. The Everyday Language of White Racism. Malden, MA: Wiley-Blackwell, 2008. Katz, Jackson, and Jeremy Earp. Tough Guise. 2011. Milner, H. Richard. “But Good Intentions Are Not Enough: Doing What’s Necessary to Teach for Diversity.” White Teachers, Diverse Classrooms: Creating Inclusive Schools, Building on Students’ Diversity, and Providing True Educational Equity. Eds. Julie. Landsman and Chance Lewis. 2nd ed. Stirling, VA: Stylus Publishing, 2011. 56–74. Waters, Jeff. Gone for a Song: A Death in Custody on Palm Island. Sydney: Harper Collins, 2008.

48

Hjorth, Larissa, and Olivia Khoo. "Collect Calls." M/C Journal 10, no.1 (March1, 2007). http://dx.doi.org/10.5204/mcj.2586.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Synonymous with globalism, the mobile phone has become an integral part of contemporary everyday life. As a global medium, the mobile phone is a compelling phenomenon that demonstrates the importance of the local in shaping and adapting the technology. The adaptation and usage of the mobile phone can be read on two levels simultaneously – the micro, individual level and the macro, socio-cultural level. Symbolic of the pervasiveness and ubiquity of global ICTs (Information and Communication Technologies) in the everyday, the mobile phone demonstrates that the experiences of the local are divergent in the face of global convergence. The cultural significance of mobile technologies sees it often as a symbol for discussion around issues of democracy, capitalism, individualism and redefinitions of place. These debates are, like all forms of mediation, riddled with paradoxes. As Michael Arnold observes, mobile media is best encapsulated by the notion of “janus-faced” which sees an ongoing process of pushing and pulling whereby one is set free to be anywhere but is on a leash to whims of others anytime. This paradox, for Arnold, is central to all technologies; the more we try to overcome various forms of distance (geographic, temporal, cultural), the more we avoid closeness and intimacy. For Jack Qui, mobile technologies are indeed the ultimate “wireless leash”. These paradoxes see themselves played in a variety of ways. This is particularly the case in the Asia-Pacific region, which houses divergence and uneven adoption, production and consumption of mobile technologies. The region simultaneously displays distinctive characteristics and a possible future of mobile media worldwide. From the so-called ‘centres’ for mobile innovation such as Tokyo and Seoul that have gained attention in global press to Asian “tigers” such as Singapore, Hong Kong and Taiwan that demonstrate high penetration rates (Singapore has a 110% penetration rate), the region often plays out its dynamics through mobile technologies. The Philippines, for example, is known as the ‘texting capital of the world’ with 300 million text messages sent per day. Moreover, the region has taken central focus for debates around the so-called democratic potential of the mobile phone through examples such as the demise of President Joseph Estrada in the Philippines and the election of President Roh in South Korea (Pertierra, Transforming Technologies; Kim). Through the use of mobile technologies and the so-called rise of the “prosumer” (consumer as producer), we can see debates about the rhetoric and reality of democracy and capitalism in the region. In the case of nascent forms of capitalism, the rise of the mobile phone in China has often been seen as China’s embrace, and redefinition, of capitalism away from being once synonymous with westernisation. As Chua Beng Huat observes, after the 1997 financial crisis in the region notions of consumerism and modernity ceased to be equated with westernization. In the case of China, the cell phone has taken on a pivotal role in everyday life with over 220 billion messages – over half the world’s SMS – sent yearly in China. Despite the ubiquity and multi-layered nature of mobile media in the region, this area has received little attention in the growing literature on mobile communication globally. Publications often explore ‘Asia’ in the context of ‘global’ media or Asia in contrast to Europe. Examples include Katz and Aakhus’s (eds.) seminal anthology Perpetual Contact, Pertierra’s (ed.) The Social Construction and Usage of Communication Technologies: European and Asian experiences and, more recently, Castells et al., Mobile Communication and Society: A Global Perspective. When publications do focus specifically on ‘Asia’, they single out particular locations in the region, such as Ito et al.’s compelling study on Japan, Personal, Portable, Pedestrian: Mobile Phones in Japanese Life and Pertierra’s eloquent discussion of the Philippines in Transforming Technologies: Altered Selves. This issue of M/C Journal attempts to address the dynamic and evolving role of mobile technologies in the Asia-Pacific region. By deploying various approaches to different issues involving mobile media, this issue aims to connect, through a regional imaginary, some of the nuances of local experience within the Asia-Pacific. As a construct, the region of the Asia-Pacific is ever evolving with constantly shifting economic and political power distributions. The rapid economic growth of parts of the region (Japan, Singapore, Taiwan, Korea, Hong Kong, and now China, Vietnam, Malaysia, the Philippines and Indonesia) over the last two to three decades, has led to increasing linkages between these nations in creating transnational networks. The boundaries of the Asia-Pacific are indeterminate and open to contestation and social construction. Initially, the Asia-Pacific was a Euro-American invention, however, its ‘Asian’ content is now playing a greater role in self-constructions, and in influencing the economic, cultural and political entity that is the Asia-Pacific. There have been alternative terms and definitions proffered to describe or delimit the area posited as the Asia-Pacific in an attempt to acknowledge, or subsume, the hierarchies inherent within the region. For example, John Eperjesi has critiqued the ‘American Pacific’ which “names the regional imaginary through which capital looked to expand into Asia and the Pacific at the turn of the [last] century” (195). Arif Dirlik has also suggested two other terms: ‘Asian Pacific’ and ‘Euro-American Pacific.’ He suggests, “the former refers not just to the region’s location, but, more important, to its human constitution; the latter refers to another human component of the region (at least at present) and also to its invention as a regional structure.” (“Asia-Pacific Idea”, 64). Together, Rob Wilson and Arif Dirlik use the configuration ‘Asia/Pacific’ to discuss the region as a space of cultural production, social migration, and transnational innovation, whereby “the slash would signify linkage yet difference” (6). These various terms are useful only insofar as they expose the ideological bases of the definitions, and identify its centre(s). In this emphasis on geography, it is important not to obscure the temporal and spatial characteristics of human activities that constitute regions. As Arif Dirlik notes, “[an] emphasis on human activity shifts attention from physical area to the construction of geography through human interactions; it also underlines the historicity of the region’s formations” (What Is in a Rim?, 4). The three-part structure of this issue seeks to provide various perspectives on the use of mobile technologies and media – from a macro, regional level, to micro, local case studies – in the context of both historical and contemporary formations and definitions of the Asia-Pacific. In an age of mobile technologies we see that rather than erode, notions of place and locality take on increasing significance. The first four papers by Jaz Hee-jeong Choi, Gerard Raiti, Yasmin Ibrahim, and Collette Snowden & Kerry Green highlight some of the key concepts and phenomena associated with mobile media in the region. Choi’s paper provides a wonderful introduction to the culture of mobile technologies in East Asia, focusing largely on South Korea, China and Japan. She problematises the rhetoric surrounding technological fetishism and techno-orientalism in definitions of ‘mobile’ and ‘digital’ East Asia and raises important questions regarding the transformation and future of East Asia’s mobile cultures. Gerard Raiti examines the behemoth of globalization from the point of view of personal intimacy. He asks us to reconsider notions of intimacy in a period marked by co-presence; particularly in light of the problematic conflation between love and technological intimacy. Yasmin Ibrahim considers the way the body is increasingly implicated through the personalisation of mobile technologies and becomes a collaborator in the creation of media events. Ibrahim argues that what she calls the ‘personal gaze’ of the consumer is contributing to the visual narratives of global and local events. What we have is a figure of the mediated mobile body that participates in the political economy of events construction. The paradoxical role of mobile technologies as both pushing and pulling us, helping and hindering us (Arnold) is taken up in Collette Snowden and Kerry Green’s paper on the role of media reporting, mobility and trauma. Extending some of Ibrahim’s comments in the specific case of the reporting of traumatic events, Snowden and Green provide a wonderful companion piece about how media reporting is being transformed by contemporary mobile practices. As an integral component of contemporary visual cultures, camera phone practices are arguably both extending and creating emerging ways of seeing and representing. In the second section, we begin our case studies exploring the socio-cultural particularities of various adaptations of mobile media within specific locations in the Asia-Pacific. Randy Jay C. Solis elaborates on Gerard Raiti’s discussion of intimacy and love by exploring how the practice of ‘texting’ has contributed to the development of romantic relationships in the Philippines in terms of its convenience and affordability. Lee Humphreys and Thomas Barker further extend this discussion by investigating the way Indonesians use the mobile phone for dating and sex. As in Solis’s article, the authors view the mobile phone as a tool of communication, identity management and social networking that mediates new forms of love, sex and romance in Indonesia, particularly through mobile dating software and mobile pornography. Li Li’s paper takes the playful obsession the Chinese and South Koreans have with lucky numbers and locates its socio-cultural roots. Through a series of semi-structured interviews, the author traces this use of lucky mobile numbers to the rise of consumerism in China and views this so-called ‘superstition’ in terms of the entry into modernity for both China and South Korea. Chih-Hui Lai’s paper explores the rise of Web 2.0. in Taiwan, which, in comparison to other locations in the region, is still relatively under-documented in terms of its usage of mobile media. Here Lai addresses this gap by exploring the burgeoning role of mobile media to access and engage with online communities through the case study of EzMoBo. In the final section we problematise Australia’s place in the Asia-Pacific and, in particular, the nation’s politically and culturally uncomfortable relationship with Asia. Described as ‘west in Asia’ by Rao, and as ‘South’ of the West by Gibson, Yue, and Hawkins, Australia’s uneasy relationship with Asia deserves its own location. We begin this section with a paper by Mariann Hardey that presents a case study of Australian university students and their relationship to, and with, the mobile phone, providing original empirical work on the country’s ‘iGeneration’. Next Linda Leung’s critique of mobile telephony in the context of immigration detention centres engages with the political dimensions of technology and difference between connection and contact. Here we reminded of the luxury of mobile technologies that are the so-called necessity of contemporary everyday life. We are also reminded of the ‘cost’ of different forms of mobility and immobility – technological, geographic, physical and socio-cultural. Leung’s discussion of displacement and mobility amongst refugees calls upon us to reconsider some of the conflations occurring around mobile telephony and new media outside the comfort of everyday urbanity. The final paper, by Peter B. White and Naomi Rosh White, addresses the urban and rural divide so pointed in Australia (with 80% of the population living in urban areas) by discussing an older, though still relevant mobile technology, the CB radio. This paper reminds us that despite the technological fetishism of urban Australia, once outside of urban contexts, we are made acutely aware of Australia as a land containing a plethora of black spots (in which mobile phones are out of range). All of the papers in this issue address, in their own way, theoretical and empirical ‘black spots’ in research and speak to the ‘future’ of mobile media in a region that, while diverse, is being increasingly brought together by technologies such as the mobile phone. Lastly, we are pleased to include a photo essay by Andrew Johnson. Entitled Zeitgeist, this series of artworks sees Johnson exploring the symbolic dimensions of the hand phone in South Korea by drawing on the metaphor of the dust mask. According the Johnson, these images refer to ‘the visibility and invisibility of communication’ that characterises the spirit of our time. The cover image is by Larissa Hjorth as part of her Snapshots: Portrait of the Mobile series conducted whilst on an Asialink residency at Ssamzie space (Seoul, South Korea) in 2005. The editors would like to offer a special note of thanks to all of our external reviewers who answered our pleas for help with willingness, enthusiasm, and especially, promptness. This issue could not have been completed without your support. References Arnold, Michael. “On the Phenomenology of Technology: The ‘Janus-Faces’ of Mobile Phones.” Information and Organization 13 (2003): 231-256. Castells, Manuel, et al., Mobile Communication and Society: A Global Perspective. Cambridge, Mass.: MIT Press, 2007. Chua, Beng Huat, ed. Consumption in Asia. London: Routledge, 2000. Dirlik, Arif. “The Asia-Pacific Idea: Reality and Representation in the Invention of a Regional Structure.” Journal of World History 3.1 (1992): 55-79. Dirlik, Arif, ed. What Is in a Rim? Critical Perspectives on the Pacific Region Idea. Boulder: Westview, 1993. Eperjesi, John. “The American Asiatic Association and the Imperialist Imaginary of the American Pacific.” Boundary 2 28.1 (Spring 2001): 195-219. Gibson, Ross. South of the West: Postcolonialism and the Narrative Construction of Australia. Bloomington and Indianapolis: Indiana UP, 1996. Ito, Mizuko, Daisuke Okabe, and Misa Matsuda, eds. Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. Cambridge, Mass.: MIT Press, 2005. Katz, James E., and Mark Aakhus, eds. Perpetual Contact: Mobile Communications, Private Talk, Public Performance. Cambridge: Cambridge UP, 2002 Kim, Shin Dong. “The Shaping of New Politics in the Era of Mobile and Cyber Communication.” Mobile Democracy: Essays on Society, Self and Politics. Ed. Kristof Nyiri. Vienna: Van Passen Verlag, 2003. Pertierra, Raul, ed. The Social Construction and Usage of Communication Technologies: European and Asian Experiences. Singapore: Singapore UP, 2005. –––. Transforming Technologies: Altered Selves. Philippines: De La Salle UP, 2006. Qui, Jack. “The Wireless Leash: Mobile Messaging Service as a Means of Control.” International Journal of Communication 1 (2007): 74-91. Rao, Madanmohan, ed. News Media and New Media: The Asia-Pacific Internet Handbook. Singapore: Times Academic Press, 2004. Wilson, Robert, and Afir Dirlik, eds. Asia/Pacific as Space of Cultural Production. Durham: Duke UP, 1995. Yue, Audrey. “Asian Australian Cinema, Asian-Australian Modernity.” Diaspora: Negotiating Asian-Australia. Eds. Helen Gilbert et al. St Lucia: U of Queensland P, 2000. 190–99. Yue, Audrey, and Gay Hawkins. “Going South.” New Formations 40 (Spring 2000): 49-63. Citation reference for this article MLA Style Hjorth, Larissa, and Olivia Khoo. "Collect Calls." M/C Journal 10.1 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0703/00-editorial.php>. APA Style Hjorth, L., and O. Khoo. (Mar. 2007) "Collect Calls," M/C Journal, 10(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0703/00-editorial.php>.

49

Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail." M/C Journal 10, no.4 (August1, 2007). http://dx.doi.org/10.5204/mcj.2696.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction It has frequently been noted that ICTs and social networking applications have blurred the once-clear boundary between work, leisure and entertainment, just as they have collapsed the distinction between public and private space. While each individual has a sense of what “home” means, both in terms of personal experience and more conceptually, the following three examples of online interaction (based on participants’ interest, or involvement, in activities traditionally associated with the home: pet care, craft and cooking) suggest that the utilisation of online communication technologies can lead to refined and extended definitions of what “home” is. These examples show how online communication can assist in meeting the basic human needs for love, companionship, shelter and food – needs traditionally supplied by the home environment. They also provide individuals with a considerably expanded range of opportunities for personal expression and emotional connection, as well as creative and commercial production, than that provided by the purely physical (and, no doubt, sometimes isolated and isolating) domestic environment. In this way, these case studies demonstrate the interplay and melding of physical and virtual “home” as domestic practices leach from the most private spaces of the physical home into the public space of the Internet (for discussion, see Gorman-Murray, Moss, and Rose). At the same time, online interaction can assert an influence on activity within the physical space of the home, through the sharing of advice about, and modeling of, domestic practices and processes. A Dog’s (Virtual) Life The first case study primarily explores the role of online communities in the formation and expression of affective values and personal identity – as traditionally happens in the domestic environment. Garber described the 1990s as “the decade of the dog” (20), citing a spate of “new anthropomorphic” (22) dog books, Internet “dog chat” sites, remakes of popular classics such as Lassie Come Home, dog friendly urban amenities, and the meteoric rise of services for pampered pets (28-9). Loving pets has become a lifestyle and culture, witnessed and commodified in Pet Superstores as well as in dog collectables and antiques boutiques, and in publications like The Bark (“the New Yorker of Dog Magazines”) and Clean Run, the international agility magazine, Website, online book store and information gateway for agility products and services. Available online resources for dog lovers have similarly increased rapidly during the decade since Garber’s book was published, with the virtual world now catering for serious hobby trainers, exhibitors and professionals as well as the home-based pet lover. At a recent survey, Yahoo Groups – a personal communication portal that facilitates social networking, in this case enabling users to set up electronic mailing lists and Internet forums – boasted just over 9,600 groups servicing dog fanciers and enthusiasts. The list Dogtalk is now an announcement only mailing list, but was a vigorous discussion forum until mid-2006. Members of Dogtalk were Australian-based “clicker-trainers”, serious hobbyist dog trainers, many of whom operated micro-businesses providing dog training or other pet-related services. They shared an online community, but could also engage in “flesh-meets” at seminars, conferences and competitive dog sport meets. An author of this paper (Rutherford) joined this group two years ago because of her interest in clicker training. Clicker training is based on an application of animal learning theory, particularly psychologist E. F. Skinner’s operant conditioning, so called because of the trademark use of a distinctive “click” sound to mark a desired behaviour that is then rewarded. Clicker trainers tend to dismiss anthropomorphic pack theory that positions the human animal as fundamentally opposed to non-human animals and, thus, foster a partnership (rather than a dominator) mode of social and learning relationships. Partnership and nurturance are common themes within the clicker community (as well as in more traditional “home” locations); as is recognising and valuing the specific otherness of other species. Typically, members regard their pets as affective equals or near-equals to the human animals that are recognised members of their kinship networks. A significant function of the episodic biographical narratives and responses posted to this list was thus to affirm and legitimate this intra-specific kinship as part of normative social relationship – a perspective that is not usually validated in the general population. One of the more interesting nexus that evolved within Dogtalk links the narrativisation of the pet in the domestic sphere with the pictorial genre of the family album. Emergent technologies, such as digital cameras together with Web-based image manipulation software and hosting (as provided by portals like Photobucket and Flickr ) democratise high quality image creation and facilitate the sharing of these images. Increasingly, the Dogtalk list linked to images uploaded to free online galleries, discussed digital image composition and aesthetics, and shared technical information about cameras and online image distribution. Much of this cultural production and circulation was concerned with digitally inscribing particular relationships with individual animals into cultural memory: a form of family group biography (for a discussion of the family photograph as a display of extended domestic space, see Rose). The other major non-training thread of the community involves the sharing and witnessing of the trauma suffered due to the illness and loss of pets. While mourning for human family members is supported in the off-line world – with social infrastructure, such as compassionate leave and/or bereavement counselling, part of professional entitlements – public mourning for pets is not similarly supported. Yet, both cultural studies (in its emphasis on cultural memory) and trauma theory have highlighted the importance of social witnessing, whereby traumatic memories must be narratively integrated into memory and legitimised by the presence of a witness in order to loosen their debilitating hold (Felman and Laub 57). Postings on the progress of a beloved animal’s illness or other misfortune and death were thus witnessed and affirmed by other Dogtalk list members – the sick or deceased pet becoming, in the process, a feature of community memory, not simply an individual loss. In terms of such biographical narratives, memory and history are not identical: “Any memories capable of being formed, retained or articulated by an individual are always a function of socially constituted forms, narratives and relations … Memory is always subject to active social manipulation and revision” (Halbwachs qtd. in Crewe 75). In this way, emergent technologies and social software provide sites, akin to that of physical homes, for family members to process individual memories into cultural memory. Dogzonline, the Australian Gateway site for purebred dog enthusiasts, has a forum entitled “Rainbow Bridge” devoted to textual and pictorial memorialisation of deceased pet dogs. Dogster hosts the For the Love of Dogs Weblog, in which images and tributes can be posted, and also provides links to other dog oriented Weblogs and Websites. An interesting combination of both therapeutic narrative and the commodification of affect is found in Lightning Strike Pet Loss Support which, while a memorial and support site, also provides links to the emerging profession of pet bereavement counselling and to suppliers of monuments and tributary urns for home or other use. loobylu and Narratives of Everyday Life The second case study focuses on online interactions between craft enthusiasts who are committed to the production of distinctive objects to decorate and provide comfort in the home, often using traditional methods. In the case of some popular craft Weblogs, online conversations about craft are interspersed with, or become secondary to, the narration of details of family life, the exploration of important life events or the recording of personal histories. As in the previous examples, the offering of advice and encouragement, and expressions of empathy and support, often characterise these interactions. The loobylu Weblog was launched in 2001 by illustrator and domestic crafts enthusiast Claire Robertson. Robertson is a toy maker and illustrator based in Melbourne, Australia, whose clients have included prominent publishing houses, magazines and the New York Public Library (Robertson “Recent Client List” online). She has achieved a measure of public recognition: her loobylu Weblog has won awards and been favourably commented upon in the Australian press (see Robertson “Press for loobylu” online). In 2005, an article in The Age placed Robertson in the context of a contemporary “craft revolution”, reporting her view that this “revolution” is in “reaction to mass consumerism” (Atkinson online). The hand-made craft objects featured in Robertson’s Weblogs certainly do suggest engagement with labour-intensive pursuits and the construction of unique objects that reject processes of mass production and consumption. In this context, loobylu is a vehicle for the display and promotion of Robertson’s work as an illustrator and as a craft practitioner. While skills-based, it also, however, promotes a family-centred lifestyle; it advocates the construction by hand of objects designed to enhance the appearance of the family home and the comfort of its inhabitants. Its specific subject matter extends to related aspects of home and family as, in addition to instructions, ideas and patterns for craft, the Weblog features information on commercially available products for home and family, recipes, child rearing advice and links to 27 other craft and other sites (including Nigella Lawson’s, discussed below). The primary member of its target community is clearly the traditional homemaker – the mother – as well as those who may aspire to this role. Robertson does not have the “celebrity” status of Lawson and Jamie Oliver (discussed below), nor has she achieved their market saturation. Indeed, Robertson’s online presence suggests a modest level of engagement that is placed firmly behind other commitments: in February 2007, she announced an indefinite suspension of her blog postings so that she could spend more time with her family (Robertson loobylu 17 February 2007). Yet, like Lawson and Oliver, Robertson has exploited forms of domestic competence traditionally associated with women and the home, and the non-traditional medium of the Internet has been central to her endeavours. The content of the loobylu blog is, unsurprisingly, embedded in, or an accessory to, a unifying running commentary on Robertson’s domestic life as a parent. Miles, who has described Weblogs as “distributed documentaries of the everyday” (66) sums this up neatly: “the weblogs’ governing discursive quality is the manner in which it is embodied within the life world of its author” (67). Landmark family events are narrated on loobylu and some attract deluges of responses: the 19 June 2006 posting announcing the birth of Robertson’s daughter Lily, for example, drew 478 responses; five days later, one describing the difficult circumstances of her birth drew 232 comments. All of these comments are pithy, with many being simple empathetic expressions or brief autobiographically based commentaries on these events. Robertson’s news of her temporary retirement from her blog elicited 176 comments that both supported her decision and also expressed a sense of loss. Frequent exclamation marks attest visually to the emotional intensity of the responses. By narrating aspects of major life events to which the target audience can relate, the postings represent a form of affective mass production and consumption: they are triggers for a collective outpouring of largely homogeneous emotional reaction (joy, in the case of Lily’s birth). As collections of texts, they can be read as auto/biographic records, arranged thematically, that operate at both the individual and the community levels. Readers of the family narratives and the affirming responses to them engage in a form of mass affirmation and consumerism of domestic experience that is easy, immediate, attractive and free of charge. These personal discourses blend fluidly with those of a commercial nature. Some three weeks after loobylu announced the birth of her daughter, Robertson shared on her Weblog news of her mastitis, Lily’s first smile and the family’s favourite television programs at the time, information that many of us would consider to be quite private details of family life. Three days later, she posted a photograph of a sleeping baby with a caption that skilfully (and negatively) links it to her daughter: “Firstly – I should mention that this is not a photo of Lily”. The accompanying text points out that it is a photo of a baby with the “Zaky Infant Sleeping Pillow” and provides a link to the online pregnancystore.com, from which it can be purchased. A quotation from the manufacturer describing the merits of the pillow follows. Robertson then makes a light-hearted comment on her experiences of baby-induced sleep-deprivation, and the possible consequences of possessing the pillow. Comments from readers also similarly alternate between the personal (sharing of experiences) to the commercial (comments on the product itself). One offshoot of loobylu suggests that the original community grew to an extent that it could support specialised groups within its boundaries. A Month of Softies began in November 2004, describing itself as “a group craft project which takes place every month” and an activity that “might give you a sense of community and kinship with other similar minded crafty types across the Internet and around the world” (Robertson A Month of Softies online). Robertson gave each month a particular theme, and readers were invited to upload a photograph of a craft object they had made that fitted the theme, with a caption. These were then included in the site’s gallery, in the order in which they were received. Added to the majority of captions was also a link to the site (often a business) of the creator of the object; another linking of the personal and the commercial in the home-based “cottage industry” sense. From July 2005, A Month of Softies operated through a Flickr site. Participants continued to submit photos of their craft objects (with captions), but also had access to a group photograph pool and public discussion board. This extension simulates (albeit in an entirely visual way) the often home-based physical meetings of craft enthusiasts that in contemporary Australia take the form of knitting, quilting, weaving or other groups. Chatting with, and about, Celebrity Chefs The previous studies have shown how the Internet has broken down many barriers between what could be understood as the separate spheres of emotional (that is, home-based private) and commercial (public) life. The online environment similarly enables the formation and development of fan communities by facilitating communication between those fans and, sometimes, between fans and the objects of their admiration. The term “fan” is used here in the broadest sense, referring to “a person with enduring involvement with some subject or object, often a celebrity, a sport, TV show, etc.” (Thorne and Bruner 52) rather than focusing on the more obsessive and, indeed, more “fanatical” aspects of such involvement, behaviour which is, increasingly understood as a subculture of more variously constituted fandoms (Jenson 9-29). Our specific interest in fandom in relation to this discussion is how, while marketers and consumer behaviourists study online fan communities for clues on how to more successfully market consumer goods and services to these groups (see, for example, Kozinets, “I Want to Believe” 470-5; “Utopian Enterprise” 67-88; Algesheimer et al. 19-34), fans regularly subvert the efforts of those urging consumer consumption to utilise even the most profit-driven Websites for non-commercial home-based and personal activities. While it is obvious that celebrities use the media to promote themselves, a number of contemporary celebrity chefs employ the media to construct and market widely recognisable personas based on their own, often domestically based, life stories. As examples, Jamie Oliver and Nigella Lawson’s printed books and mass periodical articles, television series and other performances across a range of media continuously draw on, elaborate upon, and ultimately construct their own lives as the major theme of these works. In this, these – as many other – celebrity chefs draw upon this revelation of their private lives to lend authenticity to their cooking, to the point where their work (whether cookbook, television show, advertisement or live chat room session with their fans) could be described as “memoir-illustrated-with-recipes” (Brien and Williamson). This generic tendency influences these celebrities’ communities, to the point where a number of Websites devoted to marketing celebrity chefs as product brands also enable their fans to share their own life stories with large readerships. Oliver and Lawson’s official Websites confirm the privileging of autobiographical and biographical information, but vary in tone and approach. Each is, for instance, deliberately gendered (see Hollows’ articles for a rich exploration of gender, Oliver and Lawson). Oliver’s hip, boyish, friendly, almost frantic site includes the what are purported-to-be self-revelatory “Diary” and “About me” sections, a selection of captioned photographs of the chef, his family, friends, co-workers and sponsors, and his Weblog as well as footage streamed “live from Jamie’s phone”. This self-revelation – which includes significant details about Oliver’s childhood and his domestic life with his “lovely girls, Jools [wife Juliette Norton], Poppy and Daisy” – completely blurs the line between private life and the “Jamie Oliver” brand. While such revelation has been normalised in contemporary culture, this practice stands in great contrast to that of renowned chefs and food writers such as Elizabeth David, Julia Child, James Beard and Margaret Fulton, whose work across various media has largely concentrated on food, cooking and writing about cooking. The difference here is because Oliver’s (supposedly private) life is the brand, used to sell “Jamie Oliver restaurant owner and chef”, “Jamie Oliver cookbook author and TV star”, “Jamie Oliver advertising spokesperson for Sainsbury’s supermarket” (from which he earns an estimated £1.2 million annually) (Meller online) and “Jamie Oliver social activist” (made MBE in 2003 after his first Fifteen restaurant initiative, Oliver was named “Most inspiring political figure” in the 2006 Channel 4 Political Awards for his intervention into the provision of nutritious British school lunches) (see biographies by Hildred and Ewbank, and Smith). Lawson’s site has a more refined, feminine appearance and layout and is more mature in presentation and tone, featuring updates on her (private and public) “News” and forthcoming public appearances, a glamorous selection of photographs of herself from the past 20 years, and a series of print and audio interviews. Although Lawson’s children have featured in some of her television programs and her personal misfortunes are well known and regularly commented upon by both herself and journalists (her mother, sister and husband died of cancer) discussions of these tragedies, and other widely known aspects of her private life such as her second marriage to advertising mogul Charles Saatchi, is not as overt as on Oliver’s site, and the user must delve to find it. The use of Lawson’s personal memoir, as sales tool, is thus both present and controlled. This is in keeping with Lawson’s professional experience prior to becoming the “domestic goddess” (Lawson 2000) as an Oxford graduated journalist on the Spectator and deputy literary editor of the Sunday Times. Both Lawson’s and Oliver’s Websites offer readers various ways to interact with them “personally”. Visitors to Oliver’s site can ask him questions and can access a frequently asked question area, while Lawson holds (once monthly, now irregularly) a question and answer forum. In contrast to this information about, and access to, Oliver and Lawson’s lives, neither of their Websites includes many recipes or other food and cooking focussed information – although there is detailed information profiling their significant number of bestselling cookbooks (Oliver has published 8 cookbooks since 1998, Lawson 5 since 1999), DVDs and videos of their television series and one-off programs, and their name branded product lines of domestic kitchenware (Oliver and Lawson) and foodstuffs (Oliver). Instruction on how to purchase these items is also featured. Both these sites, like Robertson’s, provide various online discussion fora, allowing members to comment upon these chefs’ lives and work, and also to connect with each other through posted texts and images. Oliver’s discussion forum section notes “this is the place for you all to chat to each other, exchange recipe ideas and maybe even help each other out with any problems you might have in the kitchen area”. Lawson’s front page listing states: “You will also find a moderated discussion forum, called Your Page, where our registered members can swap ideas and interact with each other”. The community participants around these celebrity chefs can be, as is the case with loobylu, divided into two groups. The first is “foodie (in Robertson’s case, craft) fans” who appear to largely engage with these Websites to gain, and to share, food, cooking and craft-related information. Such fans on Oliver and Lawson’s discussion lists most frequently discuss these chefs’ television programs and books and the recipes presented therein. They test recipes at home and discuss the results achieved, any problems encountered and possible changes. They also post queries and share information about other recipes, ingredients, utensils, techniques, menus and a wide range of food and cookery-related matters. The second group consists of “celebrity fans” who are attracted to the chefs (as to Robertson as craft maker) as personalities. These fans seek and share biographical information about Oliver and Lawson, their activities and their families. These two areas of fan interest (food/cooking/craft and the personal) are not necessarily or always separated, and individuals can be active members of both types of fandoms. Less foodie-orientated users, however (like users of Dogtalk and loobylu), also frequently post their own auto/biographical narratives to these lists. These narratives, albeit often fragmented, may begin with recipes and cooking queries or issues, but veer off into personal stories that possess only minimal or no relationship to culinary matters. These members also return to the boards to discuss their own revealed life stories with others who have commented on these narratives. Although research into this aspect is in its early stages, it appears that the amount of public personal revelation either encouraged, or allowed, is in direct proportion to the “open” friendliness of these sites. More thus are located in Oliver’s and less in Lawson’s, and – as a kind of “control” in this case study, but not otherwise discussed – none in that of Australian chef Neil Perry, whose coolly sophisticated Website perfectly complements Perry’s professional persona as the epitome of the refined, sophisticated and, importantly in this case, unapproachable, high-end restaurant chef. Moreover, non-cuisine related postings are made despite clear directions to the contrary – Lawson’s site stating: “We ask that postings are restricted to topics relating to food, cooking, the kitchen and, of course, Nigella!” and Oliver making the plea, noted above, for participants to keep their discussions “in the kitchen area”. Of course, all such contemporary celebrity chefs are supported by teams of media specialists who selectively construct the lives that these celebrities share with the public and the postings about others’ lives that are allowed to remain on their discussion lists. The intersection of the findings reported above with the earlier case studies suggests, however, that even these most commercially-oriented sites can provide a fruitful data regarding their function as home-like spaces where domestic practices and processes can be refined, and emotional relationships formed and fostered. In Summary As convergence results in what Turow and Kavanaugh call “the wired homestead”, our case studies show that physically home-based domestic interests and practices – what could be called “home truths” – are also contributing to a refiguration of the private/public interplay of domestic activities through online dialogue. In the case of Dogtalk, domestic space is reconstituted through virtual spaces to include new definitions of family and memory. In the case of loobylu, the virtual interaction facilitates a development of craft-based domestic practices within the physical space of the home, thus transforming domestic routines. Jamie Oliver’s and Nigella Lawson’s sites facilitate development of both skills and gendered identities by means of a bi-directional nexus between domestic practices, sites of home labour/identity production and public media spaces. As participants modify and redefine these online communities to best suit their own needs and desires, even if this is contrary to the stated purposes for which the community was instituted, online communities can be seen to be domesticated, but, equally, these modifications demonstrate that the activities and relationships that have traditionally defined the home are not limited to the physical space of the house. While virtual communities are “passage points for collections of common beliefs and practices that united people who were physically separated” (Stone qtd in Jones 19), these interactions can lead to shared beliefs, for example, through advice about pet-keeping, craft and cooking, that can significantly modify practices and routines in the physical home. Acknowledgments An earlier version of this paper was presented at the Association of Internet Researchers’ International Conference, Brisbane, 27-30 September 2006. The authors would like to thank the referees of this article for their comments and input. Any errors are, of course, our own. References Algesheimer, R., U. Dholake, and A. Herrmann. “The Social Influence of Brand Community: Evidence from European Car Clubs”. Journal of Marketing 69 (2005): 19-34. Atkinson, Frances. “A New World of Craft”. The Age (11 July 2005). 28 May 2007 http://www.theage.com.au/articles/2005/07/10/1120934123262.html>. Brien, Donna Lee, and Rosemary Williamson. “‘Angels of the Home’ in Cyberspace: New Technologies and Biographies of Domestic Production”. Paper. Biography and New Technologies conference. Humanities Research Centre, Australian National University, Canberra, ACT. 12-14 Sep. 2006. Crewe, Jonathan. “Recalling Adamastor: Literature as Cultural Memory in ‘White’ South Africa”. In Acts of Memory: Cultural Recall in the Present, eds. Mieke Bal, Jonathan Crewe, and Leo Spitzer. Hanover, NH: Dartmouth College, 1999. 75-86. Felman, Shoshana, and Dori Laub. Testimony: Crises of Witnessing in Literature, Psychoanalysis, and History. New York: Routledge, 1992. Garber, Marjorie. Dog Love. New York: Touchstone/Simon and Schuster, 1996. Gorman-Murray, Andrew. “Homeboys: Uses of Home by Gay Australian Men”. Social and Cultural Geography 7.1 (2006): 53-69. Halbwachs, Maurice. On Collective Memory. Trans. Lewis A. Closer. Chicago: U of Chicago P, 1992. Hildred, Stafford, and Tim Ewbank. Jamie Oliver: The Biography. London: Blake, 2001. Hollows, Joanne. “Feeling like a Domestic Goddess: Post-Feminism and Cooking.” European Journal of Cultural Studies 6.2 (2003): 179-202. ———. “Oliver’s Twist: Leisure, Labour and Domestic Masculinity in The Naked Chef.” International Journal of Cultural Studies 6.2 (2003): 229-248. Jenson, J. “Fandom as Pathology: The Consequences of Characterization”. The Adoring Audience; Fan Culture and Popular Media. Ed. L. A. Lewis. New York, NY: Routledge, 1992. 9-29. Jones, Steven G., ed. Cybersociety, Computer-Mediated Communication and Community. Thousand Oaks, CA: Sage, 1995. Kozinets, R.V. “‘I Want to Believe’: A Netnography of the X’Philes’ Subculture of Consumption”. Advances in Consumer Research 34 (1997): 470-5. ———. “Utopian Enterprise: Articulating the Meanings of Star Trek’s Culture of Consumption.” Journal of Consumer Research 28 (2001): 67-88. Lawson, Nigella. How to Be a Domestic Goddess: Baking and the Art of Comfort Cooking. London: Chatto and Windus, 2000. Meller, Henry. “Jamie’s Tips Spark Asparagus Shortages”. Daily Mail (17 June 2005). 21 Aug. 2007 http://www.dailymail.co.uk/pages/live/articles/health/dietfitness.html? in_article_id=352584&in_page_id=1798>. Miles, Adrian. “Weblogs: Distributed Documentaries of the Everyday.” Metro 143: 66-70. Moss, Pamela. “Negotiating Space in Home Environments: Older Women Living with Arthritis.” Social Science and Medicine 45.1 (1997): 23-33. Robertson, Claire. Claire Robertson Illustration. 2000-2004. 28 May 2007 . Robertson, Claire. loobylu. 16 Feb. 2007. 28 May 2007 http://www.loobylu.com>. Robertson, Claire. “Press for loobylu.” Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/press.html>. Robertson, Claire. A Month of Softies. 28 May 2007. 21 Aug. 2007 . Robertson, Claire. “Recent Client List”. Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/clients.html>. Rose, Gillian. “Family Photographs and Domestic Spacings: A Case Study.” Transactions of the Institute of British Geographers NS 28.1 (2003): 5-18. Smith, Gilly. Jamie Oliver: Turning Up the Heat. Sydney: Macmillian, 2006. Thorne, Scott, and Gordon C. Bruner. “An Exploratory Investigation of the Characteristics of Consumer Fanaticism.” Qualitative Market Research: An International Journal 9.1 (2006): 51-72. Turow, Joseph, and Andrea Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, MA: MIT Press, 2003. Citation reference for this article MLA Style Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/10-brien.php>. APA Style Brien, D., L. Rutherford, and R. Williamson. (Aug. 2007) "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/10-brien.php>.

50

Soares, Felipe, and Raquel Recuero. "How the Mainstream Media Help to Spread Disinformation about Covid-19." M/C Journal 24, no.1 (March15, 2021). http://dx.doi.org/10.5204/mcj.2735.

Full text

APA, Harvard, Vancouver, ISO, and other styles

Abstract:

Introduction In this article, we hypothesise how mainstream media coverage can promote the spread of disinformation about Covid-19. Mainstream media are often discussed as opposed to disinformation (Glasser; Benkler et al.). While the disinformation phenomenon is related to the intentional production and spread of misleading and false information to influence public opinion (Fallis; Benkler et al.), mainstream media news is expected to be based on facts and investigation and focussed on values such as authenticity, accountability, and autonomy (Hayes et al.). However, journalists might contribute to the spread of disinformation when they skip some stage of information processing and reproduce false or misleading information (Himma-Kadakas). Besides, even when the purpose of the news is to correct disinformation, media coverage might contribute to its dissemination by amplifying it (Tsfati et al.). This could be particularly problematic in the context of social media, as users often just read headlines while scrolling through their timelines (Newman et al.; Ofcom). Thus, some users might share news from the mainstream media to legitimate disinformation about Covid-19. The pandemic creates a delicate context, as journalists are often pressured to produce more information and, therefore, are more susceptible to errors. In this research, we focussed on the hypothesis that legitimate news can contribute to the spread of disinformation on social media through headlines that reinforce disinformation discourses, even though the actual piece may frame the story differently. The research questions that guide this research are: are URLs with headlines that reinforce disinformation discourses and other mainstream media links shared into the same Facebook groups? Are the headlines that support disinformation discourses shared by Facebook users to reinforce disinformation narratives? As a case study, we look at the Brazilian disinformation context on Covid-19. The discussion about the disease in the country has been highly polarised and politically framed, often with government agents and scientists disputing the truth about facts on the disease (Araújo and Oliveira; Recuero and Soares; Recuero et al.). Particularly, the social media ecosystem seems to play an important role in these disputes, as Brazilian President Jair Bolsonaro and his supporters use it as a key channel to spread disinformation about the virus (Lisboa et al.; Soares et al.). We use data from public groups on Facebook collected through CrowdTangle and a combination of social network analysis and content analysis to analyse the spread and the content of URLs and posts. Theoretical Background Disinformation has been central to the Covid-19 “infodemic”, created by the overabundance of information about the pandemic, which makes it hard for people to find reliable guidance and exacerbates the outbreak (Tangcharoensathien et al.). We consider disinformation as distorted, manipulated, or false information intentionally created to mislead someone (Fallis; Benkler et al.). Disinformation is often used to strengthen radical political ideologies (Benkler et al.). Around the world, political actors politically framed the discussion about the pandemic, which created a polarised public debate about Covid-19 (Allcott et al., Gruzd and Mai; Recuero and Soares). On social media, contexts of polarisation between two different political views often present opposed narratives about the same fact that dispute public attention (Soares et al.). This polarisation creates a suitable environment for disinformation to thrive (Benkler et al.) The polarised discussions are often associated with the idea of “bubbles”, as the different political groups tend to share and legitimate only discourses that are aligned with the group's ideological views. Consequently, these groups might turn into ideological bubbles (Pariser). In these cases, content shared within one group is not shared within the other and vice versa. Pariser argues that users within the bubbles are exposed exclusively to content with which they tend to agree. However, research has shown that Pariser’s concept of bubbles has limitations (Bruns), as most social media users are exposed to a variety of sources of information (Guess et al.). Nevertheless, polarisation might lead to different media diets and disinformation consumption (Benkler et al.). That is, users would have contact with different types of information, but they would choose to share certain content over others because of their political alignment (Bruns). Therefore, we understand that bubbles are created by the action of social media users who give preference to circulate (through retweets, likes, comments, or shares) content that supports their political views, including disinformation (Recuero et al.). Thus, bubbles are ephemeral structures (created by users’ actions in the context of a particular political discussion) with permeable boundaries (users are exposed to content from the outside) in discussions on social media. This type of ephemeral bubble might use disinformation as a tool to create a unique discourse that supports its views. However, it does not mean that actors within a “disinformation bubble” do not have access to other content, such as the news from the mainstream media. It means that the group acts to discredit and to overlap this content with an “alternative” story (Larsson). In addition, the mainstream media might disseminate false or inaccurate disinformation (Tsfati et al.). Particularly, we focus on inaccurate headlines that reinforce disinformation narratives, as social media users often only read news headlines (Newman et al.; Ofcom). This is especially problematic because a large number of social media users are exposed to mainstream media content, while exposure to disinformation websites is heavily concentrated on only a few users (Guess et al.; Tsfati et al.). Therefore, when the mainstream media disseminate disinformation, it is more likely that a larger number of social media users will be exposed to this content and share it into ideological bubbles. Based on this discussion, we aim to understand how the mainstream media contribute to the spread of disinformation discourses about Covid-19. Methods This study is about how mainstream media coverage might contribute to the spread of disinformation about Covid-19 on Facebook. We propose two hypotheses, as follows: H1: When mainstream media headlines frame the information in a way that reinforces the disinformation narrative, the links go into a “disinformation bubble”. H2: In these cases, Facebook users might use mainstream media coverage to legitimate disinformation narratives. We selected three case studies based on events that created both political debate and high media coverage in Brazil. We chose them based on the hypothesis that part of the mainstream media links could have produced headlines that support disinformation discourses, as the political debate was high. The events are: On 24 March 2020, Brazilian President Jair Bolsonaro made a public pronouncement on live television. In the week before the pronouncement, Brazilian governors decided to follow World Health Organisation (WHO) protocols and closed non-essential business. In his speech, Bolsonaro criticised social distancing measures. The mainstream media reproduced some of his claims and claims from other public personalities, such as entrepreneurs who also said the protocols would harm the economy. On 8 June 2020, a WHO official said that it “seems to be rare that an asymptomatic person transmits [Covid-19] onward to a secondary individual”. Part of the mainstream media reproduced the claim out of context, which could promote the misperception that both asymptomatic and pre-symptomatic persons (early stages of an illness, before the first symptoms) do not transmit Covid-19 at all. On 9 November 2020, Brazil’s national sanitary watchdog Anvisa reported that they had halted the clinical studies on the CoronaVac vaccine, developed by the Chinese company Sinovac. Bolsonaro often criticised CoronaVac because it was being produced in partnership with São Paulo’s Butantan Institute and became the subject of a political dispute between Bolsonaro and the Governor of São Paulo, João Dória. Bolsonaro said the halt of the CoronaVac trial was "another victory for Jair Bolsonaro". Anvisa halted the trail after a "severe adverse event". The mainstream media rapidly reverberated the decision. Later, it was revealed that the incident was a death that had nothing to do with the vaccine. Before we created our final dataset that includes links from the three events together, we explored the most shared URLs in each event. We used keywords to collect posts shared in the public groups monitored by CrowdTangle, a tool owned by Facebook that tracks publicly available posts on the platform. We collected posts in a timeframe of three days for each event to prevent the collection of links unrelated to the cases. We collected only posts containing URLs. Table 1 summarises the data collected. Table 1: Data collected Dates March 24-26 2020 June 8-10 2020 November 9-11 2020 Keywords “Covid-19” or “coronavirus” and “isolation” or “economy” “Covid-19” or “coronavirus” and “asymptomatic” “vaccine” and “Anvisa” or “CoronaVac” Number of posts 4780 2060 3273 From this original dataset, we selected the 60 most shared links from each period (n=180). We then filtered for those which sources were mainstream media outlets (n=74). We used content analysis (Krippendorff) to observe which of these URLs headlines could reinforce disinformation narratives (two independent coders, Krippendorff’s Alpha = 0.76). We focussed on headlines because when these links are shared on Facebook, often it is the headline that appears to other users. We considered that a headlined reinforced disinformation discourses only when it was flagged by both coders (n=21 – some examples are provided in Table 3 in the Results section). Table 2 provides a breakdown of this analysis. Table 2: Content analysis Event Mainstream media links Headlines that support disinformation discourses Number of links Number of posts Economy and quarantine 24 7 112 Asymptomatic 22 7 163 Vaccine trial 28 7 120 Total 74 21 395 As the number of posts that shared URLs with headlines that supported disinformation was low (n=395), we conducted another CrowdTangle search to create our final dataset. We used a sample of the links we classified to create a “balanced” dataset. Out of the 21 links with headlines that reinforced disinformation, we collected the 10 most shared in public groups monitored by CrowdTangle (this time, without any particular timeframe) (n=1346 posts). In addition, we created a “control group” with the 10 most shared links that neither of the coders considered could reinforce disinformation (n=1416 posts). The purpose of the “control group” was to identify which Facebook groups tend to share mainstream media links without headlines that reinforce disinformation narratives. Therefore, our final dataset comprises 20 links and 2762 posts. We then used social network analysis (Wasserman and Faust) to map the spread of the 20 links. We created a bipartite network, in which nodes are (1) Facebook groups and (2) URLs; and edges represent when a post within a group includes a URL from our dataset. We applied a modularity metric (Blondel et al.) to identify clusters. The modularity metric allows us to identify “communities” that share the same or similar links in the network map. Thus, it helped us to identify if there was a “bubble” that only shares the links with headlines that support disinformation (H1). To understand if the disinformation was supporting a larger narrative shared by the groups, we explored the political alignments of each cluster (H2). We used Textometrica (Lindgreen and Palm) to create word clouds with the most frequent words in the names of the cluster groups (at least five mentions) and their connections. Finally, we also analysed the posts that shared each of the 10 links with headlines that reinforced disinformation. This also helped us to identify how the mainstream media links could legitimate disinformation narratives (H2). Out of the 1346 posts, only 373 included some message (the other 973 posts only shared the link). We used content analysis to see if these posts reinforced the disinformation (two independent coders – Krippendorff’s Alpha = 0.723). There were disagreements in the categorisation of 27 posts. The two coders reviewed and discussed the classification of these posts to reach an agreement. Results Bubbles of information In the graph (Figure 1), red nodes are links with headlines that support disinformation discourses, blue nodes are the other mainstream media links, and black nodes are Facebook groups. Our first finding is that groups that shared headlines that support disinformation rarely shared the other mainstream media links. Out of the 1623 groups in the network, only 174 (10.7%) shared both a headline that supports disinformation discourse, and another mainstream media link; 712 groups (43.8%) only shared headlines that support disinformation; and 739 groups (45.5%) only shared other links from the mainstream media. Therefore, users’ actions created two bubbles of information. Figure 1: Network graph The modularity metric confirmed this tendency of two “bubbles” in the network (Figure 2). The purple cluster includes seven URLs with headlines that support disinformation discourse. The green cluster includes three headlines that support disinformation discourse and the other 10 links from the mainstream media. This result partially supports H1: When mainstream media headlines frame the information in a way that reinforces the disinformation narrative, the links go into a “disinformation bubble”. As we identified, most of the headlines that support disinformation discourse went into a separate “bubble”, as users within the groups of this bubble did not share the other links from the mainstream media. Figure 2: Network graph with modularity This result shows that users’ actions boost the creation of bubbles (Bakshy et al.), as they choose to share one type of content over the other. The mainstream media are the source of all the URLs we analysed. However, users from the purple cluster chose to share only links with headlines that supported disinformation discourses. This result is also related to the political framing of the discussions, as we explore below. Disinformation and Political Discourse We used word clouds (Lindgreen and Palm) to analyse the Facebook groups’ names to explore the ideological affiliation of the bubbles. The purple bubble is strongly related to Bolsonaro and his discourse (Figure 3). Bolsonaro is the most frequent word. Other prevalent words are Brazil, patriots (both related to his nationalist discourse), right-wing, conservative, military (three words related to his conservative discourse and his support of the military dictatorship that ruled Brazil from 1964 to 1985), President, support, and Alliance [for Brazil] (the name of his party). Some of the most active groups within the purple bubble are “Alliance for Brazil”, “Bolsonaro 2022 [next presidential election]”, “Bolsonaro’s nation 2022”, and “I am right-wing with pride”. Figure 3: Purple cluster word cloud Bolsonaro is also a central word in the green cluster word cloud (Figure 4). However, it is connected to other words such as “against” and “out”, as many groups are anti-Bolsonaro. Furthermore, words such as left-wing, Workers’ Party (centre-left party), Lula and Dilma Rousseff (two Workers’ Party ex-presidents) show another ideological alignment in general. In addition, there are many local groups (related to locations such as Rio de Janeiro, São Paulo, Rio Grande do Sul, Minas Gerais, and others), and groups to share news (news, newspaper, radio, portal). “We are 70 per cent [anti-Bolsonaro movement]”, “Union of the Left”, “Lula president”, and “Anti-Bolsonaro” are some of the most active groups within the green cluster. Figure 4: Green cluster word cloud Then, we analysed how users shared the mainstream media links with headlines that support disinformation discourses. In total, we found that 81.8% of the messages in the posts that shared these links also reproduced disinformation narratives. The frequency was higher (86.2%) when considering only posts that shared one of the seven links from the purple cluster (based on the modularity metric). Consequently, it was lower (64%) in the messages that shared one of the other three links. The messages often showed support for Bolsonaro; criticised other political and health authorities (the WHO, São Paulo Governor João Dória, and others), China, and the “leftists” (all opposition to Bolsonaro); claimed that quarantine and social distancing measures were unnecessary; and framed vaccines as dangerous. We provide some examples of headlines and posts in Table 3 (we selected the most-shared URL for each event to illustrate). This result supports H2 as we found that users shared mainstream media headlines that reinforce disinformation discourse to legitimate the disinformation narrative; and that it was more prevalent in the purple bubble. Table 3: Examples of headlines and posts Headline Post "Unemployment is a crisis much worse than coronavirus", says Bolsonaro Go to social media to support the President. Unemployment kills. More than any virus... hunger, depression, despair and everything UNEMPLOYMENT, THE DEPUTIES CHAMBER, THE SENATE AND THE SUPREME COURT KILL MORE THAN COVID19 Asymptomatic patients do not boost coronavirus, says WHO QUARANTINE IS FAKE #StayHome, the lie of the century! THIS GOES TO THE PUPPETS OF THE COMMUNIST PARTIES THE AND FUNERARY MEDIA Anvisa halts Coronavac vaccine trial after "serious adverse event" [The event] is adverse and serious, so the vaccine killed the person by covid And Doria [Governor of São Paulo and political adversary of Bolsonaro] wants to force you to take this shit This result shows that mainstream media headlines that support disinformation narratives may be used to reinforce disinformation discourses when shared on Facebook, making journalists potential agents of disinformation (Himma-Kadakas; Tsfati et al.). In particular, the credibility of mainstream news is used to support an opposing discourse, that is, a disinformation discourse. This is especially problematic in the context of Covid-19 because the mainstream media end up fuelling the infodemic (Tangcharoensathien et al.) by sharing inaccurate information or reverberating false claims from political actors. Conclusion In this article, we analysed how the mainstream media contribute to the spread of disinformation about Covid-19. In particular, we looked at how links from the mainstream media with headlines that support disinformation discourse spread on Facebook, compared to other links from the mainstream media. Two research questions guided this study: Are URLs with headlines that reinforce disinformation discourses and other mainstream media links shared into the same Facebook groups? Are the headlines that support disinformation discourses shared by Facebook users to reinforce disinformation narratives? We identified that (1) some Facebook groups only shared links with headlines that support disinformation narratives. This created a “disinformation bubble”. In this bubble, (2) Facebook users shared mainstream media links to reinforce disinformation – in particular, pro-Bolsonaro disinformation, as many of these groups had a pro-Bolsonaro alignment. In these cases, the mainstream media contributed to the spread of disinformation. Consequently, journalists ought to take extra care when producing news, especially headlines, which will be the most visible part of the stories on social media. This study has limitations. We analysed only a sample of links (n=20) based on three events in Brazil. Other events and other political contexts might result in different outcomes. Furthermore, we used CrowdTangle for data collection. CrowdTangle only provides information about public posts in groups monitored by the tool. Therefore, our result does not represent the entire Facebook. References Allcott, Hunt, et al. “Polarization and Public Health: Partisan Differences in Social Distancing during the Coronavirus Pandemic.” National Bureau of Economic Research, Working Paper No. 26946 (2020). 6 Jan. 2021 <https://doi.org/10.3386/w26946>. Araújo, Ronaldo Ferreira, and Thaiane Moreira Oliveira. “Desinformação e Mensagens Sobre a Hidroxicloroquina no Twitter: Da Pressão Política à Disputa Científica.” Atoz – Novas Práticas em Informação e Conhecimento 9.2 (2020). 6 Jan. 2021 <http://dx.doi.org/10.5380/atoz.v9i2.75929>. Bakshy, Eytan, et al. “Exposure to Ideologically Diverse News and Opinion on Facebook.” Science 348.6239 (2015). 6 Jan. 2021 <https://science.sciencemag.org/content/348/6239/1130>. Benkler, Yochai, et al. Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. New York: Oxford University Press, 2018. Blondel, Vincent D., et al. “Fast Unfolding of Communities in Large Networks.” Physics.soc-ph (2008). 6 Jan. 2021 <http://lanl.arxiv.org/abs/0803.0476>. Bruns, Axel. Are Filter Bubbles Real?. Cambridge: Polity Press, 2019. CrowdTangle Team. CrowdTangle. Menlo Park, Calif.: Facebook, 2020. <https://apps.crowdtangle.com/search/>. Fallis, Don. “What Is Disinformation?” Library Trends 63.3 (2015): 401-426. Glasser, Susan B. “Covering Politics in a ‘Post-Truth’ America.” Brookings Institution Press, 2 Dec. 2016. 22 Feb. 2021 <https://www.brookings.edu/essay/covering-politics-in-a-post-truth-america/>. Gruzd, Anatoliy, and Philip Mai. “Going Viral: How a Single Tweet Spawned a COVID-19 Conspiracy Theory on Twitter.” Big Data & Society, 7.2 (2020). 6 Jan. 2021 <https://doi.org/10.1177/2053951720938405>. Guess, Andrew, et al. Avoiding the Echo Chamber about Echo Chambers: Why Selective Exposure to Like-Minded Political News Is Less Prevalent than You Think. Miami: John S. and James L. Knight Foundation, 2018. Hayes, Arthur S., et al. “Shifting Roles, Enduring Values: The Credible Journalist in a Digital Age.” Journal of Mass Media Ethics 22.4 (2007): 262-279. 22 Feb.2021 <https://doi.org/10.1080/08900520701583545>. Himma-Kadakas, Marju. “Alternative Facts and Fake News Entering Journalistic Content Production Cycle”. Cosmopolitan Civil Societies: An Interdisciplinary Journal 9.2 (2017). 6 Jan. 2021 <https://doi.org/10.5130/ccs.v9i2.5469>. Kripendorff, Klaus. Content Analysis: An Introduction to Its Methodology. California: Sage Publications, 2013. Larsson, Anders Olof. “News Use as Amplification – Norwegian National, Regional and Hyperpartisan Media on Facebook.” Journalism & Mass Communication Quarterly 96 (2019). 6 Jan. 2021 <https://doi.org/10.1177/1077699019831439>. Lindgreen, Simon, and Fredrik Palm. Textometrica Service Package (2011). 6 Jan. 2021 <http://textometrica.humlab.umu.se>. Lisboa, Lucas A., et al. “A Disseminação da Desinformação Promovida por Líderes Estatais na Pandemia da COVID-19.” Proceedings of the Workshop Sobre as Implicações da Computação na Sociedade (WICS), Porto Alegre: Sociedade Brasileira de Computação, 2020. 6 Jan. 2021 <https://doi.org/10.5753/wics.2020.11042>. Newman, Nic, et al. Reuters Institute Digital News Report 2018. Oxford: Oxford University, 2018. Ofcom. “Scrolling News: The Changing Face of Online News Consumption.” 2016. 23 Feb. 2021 <https://www.ofcom.org.uk/__data/assets/pdf_file/0022/115915/Scrolling-News.pdf>. Pariser, Eli. The Filter Bubble. New York: Penguin, 2011. Recuero, Raquel, and Felipe Soares. “O Discurso Desinformativo sobre a Cura do COVID-19 no Twitter: Estudo de Caso.” E-Compós (2020). 23 Feb. 2021 <https://doi.org/10.30962/ec.2127>. Recuero, Raquel, et al. “Polarization, Hyperpartisanship, and Echo Chambers: How the Disinformation about COVID-19 Circulates on Twitter.” Contracampo (2021, in press). 23 Feb. 2021 <https://doi.org/10.1590/SciELOPreprints.1154>. Soares, Felipe Bonow, et al. “Disputas discursivas e desinformação no Instagram sobre o uso da hidroxicloroquina como tratamento para o Covid-19.” Proceedings of the 43º Congresso Brasileiro de Ciências da Comunicação, Salvador: Intercom, 2020. 23 Feb. 2021 <http://www.intercom.org.br/sis/eventos/2020/resumos/R15-0550-1.pdf>. Tangcharoensathien, Viroj, et al. “Framework for Managing the COVID-19 Infodemic: Methods and Results of an Online Crowdsourced WHO Technical Consultation.” J Med Internet Res 22.6 (2020). 6 Jan. 2021 <https://doi.org/10.2196/19659>. Tsfati, Yariv, et al. “Causes and Consequences of Mainstream Media Dissemination of Fake News: Literature Review and Synthesis.” Annals of the International Communication Association 44.2 (2020): 157-173. 22 Feb. 2021 <https://doi.org/10.1080/23808985.2020.1759443>. Wasserman, Stanley, and Katherine Faust. Social Network Analysis: Methods and Applications. Cambridge: Cambridge UP, 1994.

To the bibliography
Journal articles: 'Echo (Online service)' – Grafiati (2024)

FAQs

How do I find journals online? ›

You can find journal articles by mining the bibliographies of sources you already have, by searching for articles on your topic in the Library's databases, or using search engines, including Google Scholar.

How to download journal without subscription? ›

The Top 21 Free Online Journal and Research Databases
  1. CORE.
  2. ScienceOpen.
  3. Directory of Open Access Journals.
  4. Education Resources Information Center.
  5. arXiv e-Print Archive.
  6. Social Science Research Network.
  7. Public Library of Science.
  8. OpenDOAR.

How to access free journal articles? ›

Google Scholar can be the best place to start when looking for an article, as it automatically provides links to many Open Access articles, institutional and subject repositories, preprint servers and academic social networks, as you can see in the example on this page.

How do I know if a journal article is online only? ›

You can usually tell the difference by looking for page numbers. If each article in the journal begins at page 1, or has no page number at all, it is likely to be an online-only journal.

How do I find journals on Google? ›

To find journals in Google Scholar, start by searching for the topic you are interested in. From the search results, click “More” and select “Journals” to filter for scholarly articles from academic journals. This will display a list of scholarly articles from academic journals related to your query.

How do I find a list of journals? ›

You may use the Library's Find a Resource tool to locate journals by exact title, keyword in title, or ISSN (International Standard Serial Number). The search results will tell you if the Library subscribes to the journal, what years the Library subscribes to, and in which databases.

How do you search a journal? ›

How do I search inside a journal?
  1. Locate a search box and enter your search terms. ...
  2. If no search box exists, find and click a link labeled Search within this publication, or some similar link.
  3. You should be on a screen with multiple search boxes.The journal name is in the top box.
Apr 2, 2022

Are there any online journals? ›

Start a free online diary with Adobe Express.

Whether you are making a public journal to document your travels and family life or a private journal to process through your feelings and record your memories, we've got just the right template for you.

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 6275

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.