Journal articles: 'Electronic mail and communication records of a similar nature' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / Electronic mail and communication records of a similar nature / Journal articles

To see the other types of publications on this topic, follow the link: Electronic mail and communication records of a similar nature.

Author: Grafiati

Published: 5 September 2021

Last updated: 13 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 24 journal articles for your research on the topic 'Electronic mail and communication records of a similar nature.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Andrus,CharlesH., and Mark Gaynor. "Successful HIT Requires Inter-Team Communication." Journal of Cases on Information Technology 15, no.4 (October 2013): 1–6. http://dx.doi.org/10.4018/jcit.2013100101.

Full text

Abstract:

When compared to traditional medical centers, academic medical centers have additional complexity caused by tension between clinical research and patient care, which adds structural and organization differences within the organization. Many academic medical centers have a separate physician practice plan and hospital organization. Usually this means the medical school and its faculty are responsible for outpatient practices, and a separate hospital organization performs the daily management and sustainability of the affiliated academic hospitals. With separate governing and executive bodies, information technology (IT) has additional challenges not found in community hospital settings where one, unified entity exists. Two different financial entities for one unified care delivery model results in differences in technology used at both entities. The hospital organization might use one e-mail system, while the medical school might use another. Though one might argue e-mail system differences are inconsequential, the opposite is true. Different e-mail systems result in meeting cancellations not flowing to the other system, the possibility of an incomplete address book, and security problems. These shortcomings result in user frustration because of inconsistent user experience and inefficient communication between parties. It is important to minimize such frustrations and inefficiencies for user adoption to be successful. Electronic medical records (EMRs) have similar problems. Due to differences in legal and financial responsibilities, the hospital and physician practice plan may have separate EMRs for the inpatient and outpatient experience respectively. This can not only create an incomplete user experience, but also cause interoperability problems. Therefore, whenever the system is changed for enhancement or to fix bugs, careful consideration must be taken to reduce unnecessary user angst.

APA, Harvard, Vancouver, ISO, and other styles

2

Murphy,DanielR., Louis Wu, EricJ.Thomas, SamuelN.Forjuoh, AshleyN.D.Meyer, and Hardeep Singh. "Electronic Trigger-Based Intervention to Reduce Delays in Diagnostic Evaluation for Cancer: A Cluster Randomized Controlled Trial." Journal of Clinical Oncology 33, no.31 (November1, 2015): 3560–67. http://dx.doi.org/10.1200/jco.2015.61.1301.

Full text

Abstract:

Purpose We tested whether prospective use of electronic health record-based trigger algorithms to identify patients at risk of diagnostic delays could prevent delays in diagnostic evaluation for cancer. Methods We performed a cluster randomized controlled trial of primary care providers (PCPs) at two sites to test whether triggers that prospectively identify patients with potential delays in diagnostic evaluation for lung, colorectal, or prostate cancer can reduce time to follow-up diagnostic evaluation. Intervention steps included queries of the electronic health record repository for patients with abnormal findings and lack of associated follow-up actions, manual review of triggered records, and communication of this information to PCPs via secure e-mail and, if needed, phone calls to ensure message receipt. We compared times to diagnostic evaluation and proportions of patients followed up between intervention and control cohorts based on final review at 7 months. Results We recruited 72 PCPs (36 in the intervention group and 36 in the control group) and applied the trigger to all patients under their care from April 20, 2011, to July 19, 2012. Of 10,673 patients with abnormal findings, the trigger flagged 1,256 patients (11.8%) as high risk for delayed diagnostic evaluation. Times to diagnostic evaluation were significantly lower in intervention patients compared with control patients flagged by the colorectal trigger (median, 104 v 200 days, respectively; n = 557; P < .001) and prostate trigger (40% received evaluation at 144 v 192 days, respectively; n = 157; P < .001) but not the lung trigger (median, 65 v 93 days, respectively; n = 19; P = .59). More intervention patients than control patients received diagnostic evaluation by final review (73.4% v 52.2%, respectively; relative risk, 1.41; 95% CI, 1.25 to 1.58). Conclusion Electronic trigger-based interventions seem to be effective in reducing time to diagnostic evaluation of colorectal and prostate cancer as well as improving the proportion of patients who receive follow-up. Similar interventions could improve timeliness of diagnosis of other serious conditions.

APA, Harvard, Vancouver, ISO, and other styles

3

Ульянова, Ульяна Александровна. "STRUCTURAL FEATURES OF ELECTRONIC MILITARY INFORMATION TEXTS." Tomsk state pedagogical university bulletin, no.5(211) (September7, 2020): 88–95. http://dx.doi.org/10.23951/1609-624x-2020-5-88-95.

Full text

Abstract:

Введение. Рассматриваются композиционные особенности электронных военно-информационных текстов. Необходимость описания данных текстов обусловлена переходом коммуникации в электронную плоскость, что оказало существенное влияние на их композицию. Цель – описать композиционные особенности электронных военно-информационных текстов. Материал и методы. Материалом исследования послужили военно-информационные тексты, извлеченные методом сплошной выборки, представленные на сайтах military.com (30 текстов) и nationalinterest.com (35 текстов). В качестве методов были выбраны метод композиционного анализа, описательно-аналитический и сравнительно-сопоставительный методы. Результаты и обсуждение. Установлены отличительные особенности электронного военно-информационного текста, к которым относятся мультимедийность, гипертекстовость, интерсемиотичность и интерактивность. Предложена классификация электронных военно-информационных текстов исходя из способа создания. В соответствии с этим параметром были выделены онлайн- и офлайн-электронные тексты. Установлено, что в военно-информационных текстах используются несколько типов ссылок: интратекстуальные ссылки, содержащие отсылку к материалам, опубликованным на других сайтах; внетекстовые автоссылки, содержащие информацию с контактными данными автора статьи; внетекстовые ссылки, переход по которым ведет к статье на схожую тематику. Была определена двойственная природа интерактивности как одного из элементов композиции электронного военно-информационного текста. С одной стороны, интерактивность обеспечивает непосредственное взаимодействие между адресатом и адресантом, с другой – реализуется через интерсемиотические элементы, которые позволяют распространить и поделиться информацией на разных интернет-площадках (социальных сетях, форумах, электронной почте). Гипертекстовость, интерсемиотичность, интерактивность относятся к обязательным характеристикам электронного текста. Мультимедийность рассматривается как факультативная характеристика электронного военно-информационного текста, так как видеофрагменты как один из коммуникативных блоков текста присутствуют не во всех текстах, несмотря на обязательное присутствие креолизованного компонента в форме статичной фотографии. Проведен сравнительно-сопоставительный анализ коммуникативных блоков в электронных текстах. На основе анализа результатов были выделены электронные военно-информационные тексты с жесткой и нежесткой структурой. Заключение. Доказано, что обязательными структурными признаками электронного военно-информационного текста являются интертекстовость, интерактивность и интерсемиотичность. Результаты анализа структурных особенностей свидетельствуют о перспективности исследования прагмастилистических характеристик электронных военно-информационных текстов. Introduction. The structural features of electronic military information texts have been analyzed. The necessity to describe the electronic texts is caused by the transition of communication to the electronic mode, which has had a significant impact on the composition of military information texts. The aim is to describe the compositional features of electronic military information texts. Material and methods. The research methods include compositional analysis, descriptive-analytical and comparative method. The material of the research is military information texts extracted by the random sampling method from the websites military.com (30 texts) and nationalinterest.com (35 texts). Results and discussion. Distinctive features of the electronic military information texts include multimedia, hypertext, intersemioticity and interactivity. The classification of electronic military-information texts on the basis of the means of communication has been presented. Online and offline electronic texts are distinguished in accordance with this parameter. Several types of hypertext links are used in military information texts: intratextual links containing reference to the materials published on other sites; non-textual auto hypertext links with contact information of the author of the article; non-textual hypertext links which lead to the article on similar subjects. The main types of hypertext links are also defined in terms of their language representation. The dual nature of interactivity as one of the elements of the composition of the electronic military information text was established. On the one hand, it provides the direct interaction between the addresser and the addressee. On the other hand, interactivity is realized through intersemiotic elements (cross-posting), which allow spreading and sharing information on different Internet sites (social networks, forums, e-mail). Hypertext, intersemioticity, interactivity are considered as obligatory characteristics of the electronic military information texts. Multimedia is regarded as an optional characteristic of the electronic military information text, because video fragments as one of the communication blocks of the text are not present in all texts, although a creolized component in the form of a photo is an obligatory part of text composition. A comparative analysis of the communication blocks in electronic texts has been carried out. Electronic military information texts with strict and free composition have been singled out. Conclusion. It has been proved that the obligatory compositional features of the electronic military information text are intertextuality, interactivity and intersemioticity. The results of the peculiarities of compositional analysis show the promising nature of the investigation of pragmastylistic features of electronic military information texts.

APA, Harvard, Vancouver, ISO, and other styles

4

Bhat, Nazir Ahmad. "Impact of advent of electronic information resources on performance of library users." Bottom Line 32, no.2 (May30, 2019): 135–43. http://dx.doi.org/10.1108/bl-12-2018-0048.

Full text

Abstract:

Purpose The purpose of this study is to assess the impact of advent of electronic information resources on “academic and carrier related core aspects of user performance”. Design/methodology/approach Seven sampled agricultural universities across northern India were surveyed personally by the investigator for collecting data about the questions under investigation through a structured questionnaire. The response of the users for each statement under investigation was collected with simple “Yes”/“No” option. The investigator also resorted to the telephonic and e-mail communication to collect prompt response and had a personal interaction with respondents to substantiate the collected responses and remove any ambiguity thereof. Findings It is found that the majority of respondents are of the opinion that due to advent of e-resources the users’ interest in studies has enhanced (62.90 per cent) and that the e-resources have played a significant role in timely completion/submission of their study related assignments (74.30 per cent). It is also evident that a good proportion of respondents agree that the advent of e-resources has laid a positive impact on performance of users in “academic examinations” (50.80 per cent), “competitive examinations” (52.80 per cent), and the “interviews” (46.18 per cent) they face. Statistically, it is also verified that the performance of users with respect to five aspects investigated in this study is significantly associated with advent of e-resources (p < 0.01), whereas it does not show any association with one aspect i.e. “timely completion of an academic degree”. Research limitations/implications The findings are based on mere opinion of users and need to be verified by devising a well-articulated methodology for verification of the user performance related facts both in print and electronic eras, independent of the users’ opinion. Practical implications The findings of this study shall prompt the budget allocating authorities of the libraries to reformulate their fund allocation policies. Findings of this study shall act as logical basis to enhance budget for improving the volume of e-resources. These also emphasize the fact that a provision of recurring fund needs to be created for facilitating single window based anytime anywhere access to the available e-information base, which may include annual subscription charges for availing (i) proxy software services for remote access and (ii) federated search engine for single window searching. Originality/value This is first work of its nature in northern Indian agricultural libraries. The findings will be useful for the authorities to decide about the degree of importance the libraries need to endorse with the procurement of information resources in electronic form. The study will really inspire the researchers and librarians to conduct similar studies in other specific domains of knowledge and come out with significant findings and suggestions.

APA, Harvard, Vancouver, ISO, and other styles

5

Mosweu, Olefhile, Kelvin Bwalya, and Athulang Mutshewa. "Examining factors affecting the adoption and usage of document workflow management system (DWMS) using the UTAUT model." Records Management Journal 26, no.1 (March21, 2016): 38–67. http://dx.doi.org/10.1108/rmj-03-2015-0012.

Full text

Abstract:

Purpose – Public sector organisations in the developing world contexts have hugely invested in procuring information management systems such as the electronic document and records management system (EDRMS). The procurement and implementation of these systems come at a huge cost to taxpayers. Unfortunately, most of these systems remain white elephants due to reluctance by the anticipated users to adopt and use them in their information management endeavours. This study aims to understand Action Officers’ perceptions of, adoption and/or usage of the document workflow management system (DWMS) at the Ministry of Trade and Industry in Botswana. The DWMS is one type of EDRMS. Design/methodology/approach – The survey uses a questionnaire distributed in Gaborone, Botswana to gather data on the perceptions of anticipated users of the DWMS. The study used a modified form of UTAUT as a theoretical lens to explore user’s perception on the adoption and use of DWMS at the Ministry of Trade and Industry, Botswana. The population of the study was 68. A total of 53 (86.89 per cent) out of 61 users of DWMS were purposively sampled and responded to the questionnaire. The rest took part in interviews. Findings – Negative attitudes to computers, computer anxiety, the complexity of DWMS and its incompatibility to current working practices influences Action and Records Officers’ unwillingness to adopt and use the DWMS. Research limitations/implications – This study was limited to the Ministry of Trade and Industry (MTI)’s Department of Corporate Services, so its findings cannot be statistically generalized to the MTI as a whole. Another limitation relates to the secretive nature of staff in some government departments which lead them to provide partial information related to the study. Finally, the additional technology adoption factors discovered from interviews (i.e. computer anxiety, incompatibility of DWMS to current work practices, negative attitudes to system use and complexity of the system) have not been empirically tested to ascertain their validity. This provides an opportunity for a future study to empirically test the said additional factors. Practical implications – To mitigate the lower DWMS adoption and usage, robust change management and communication were identified as some of the critical factors that should be considered. The identified factors may be used in drafting a model to aid the implementation of DWMS in Botswana or in a contextually similar environment in the developing world. Originality/value – This study provides empirical evidence from an original study.

APA, Harvard, Vancouver, ISO, and other styles

6

Patdu,IvyD. "Recommendations for Social Media Use in Hospitals and Health Care Facilities." Philippine Journal of Otolaryngology-Head and Neck Surgery 31, no.1 (June24, 2016): 6–9. http://dx.doi.org/10.32412/pjohns.v31i1.299.

Full text

Abstract:

Social Media is the new avenue for creating connections and sharing of information. Through social media, one can reach a global community. In recent years, we have seen how social media has changed the way we do things. Social Media has been extensively utilized for health education and promotion, proving itself to be an invaluable tool for public health, professional networking and patient care benefit. The challenge has been to use the power afforded by social media responsibly, and to define the line between use and abuse. While there may be laws, implementation proves to be a challenge in the digital age. Therefore, self-regulation and institutional policy remain a critical part. It is therefore urged that hospitals and health care facilities adopt their own social media use policy appropriate for the institution. Below are proposed rules that could guide institutions in developing their own policy for social media use: Sec. 1. Declaration of Policy. The health facility recognizes that the exercise of the freedom of expression comes with a responsibility and a duty to respect the rights of others. The health facility likewise acknowledges the fundamental right to privacy of every individual. This policy shall provide rules for responsible social media use. Sec. 2. Definition. For purposes of this policy, the following definitions shall be used: Social Media refers to electronic communication, websites or applications through which users connect, interact or share information or other content with other individuals, collectively part of an online community. This includes Facebook, Twitter, Google+, Instagram, LinkedIn, Pinterest, Blogs, Social Networking sites. Health facility shall refer to the hospital or other health care facilities, including training and educational institutions. Individual shall refer to physicians, employees, other health facility staff, residents, or students to which this policy would apply Sec. 3. Applicability. This policy shall apply to all physicians, health professionals, employees and other health facility staff, including students or residents in training, practicing their profession, working, or fulfilling academic and clinical requirements within the health facility, whether temporary or permanent. Sec. 4. General Principles. Social media use shall be guided by the following principles: In using social media, an individual should always be mindful of his or her duties to the patient and community, his profession and his colleagues. The individual should always be conscious of his or her online image and how it impacts his or her profession, or the institution where he or she is professionally employed, affiliated or otherwise connected. Responsible social media use also requires the individual to ensure that in his or her social media activity, there is no law violated, including copyright, libel and cybercrime laws. At all times, the individual shall respect the right of privacy of others. Use of social media requires a personal commitment to uphold the ethical standards required of those providing health services, upon which patient trust is built. Sec. 5. Social Media for Health Education or Promotion a.The individual using social media for health education or promotion must be well-informed of the matter subject of the social media post, comment or other activity. The individual shall refrain from any activity which spreads or tends to spread misinformation. An article written by an individual and posted in social media must be evidence-based and disclose connections with pharmaceutical or health product companies or other sources of possible conflict of interest. c.Social media shall not be used to dispense specific medical diagnosis, advice, treatment or projection but shall consist of general opinions only. Use of social media should include statements that a person should not rely on the advice given online, and that medical concerns are best addressed in the appropriate setting. The individual shall be careful in posting or publishing his or her opinion and shall ensure that such opinion will not propagate misinformation or constitute a misrepresentation. The individual shall not make any misrepresentations in his or her social media activity relating to content, his or her employment or credentials, and any other information that may be misconstrued or taken out of context. Sec. 6. Professionalism in Social Media Use Individuals are discouraged from using a single account for both professional and private use. Be mindful that an electronic mail address used professionally may readily be linked to a social media site used privately. The individual shall conduct himself or herself in social media or online the same way that he would in the public, mindful of acting in a manner befitting his profession, or that would inspire trust in the service he or she provides, especially if the individual has not separated his or her professional and personal accounts in social media. The individual shall likewise refrain from using the name, logo or other symbol of an institution without prior authority in his or her social media activity. An individual shall not identify himself or herself as a representative of an institution in social media without being authorized to do so. Individuals shall not accept former or current patients as friends or contacts in their personal accounts, unless there is justification to do so, such as a pre-existing relationship or when unavoidable for patient care. In case of online interaction with patients, this should be limited to matters related to the patient’s treatment and management, and which could be properly disclosed. Informal and personal information concerning a patient, colleague or the health facility shall not be posted, shared or otherwise used in social media. Social media shall not be used to establish inappropriate relationships with patients or colleagues, and shall not be used to obtain information that would negatively impact on the provision of services and professional management of the patient. An individual shall refrain from posting, sharing or otherwise using photos or videos taken within the health facility, which would give the impression of unprofessionalism, show parts of the health facility where there is an expectation of privacy, or those which includes colleagues, employees, other health facility staff, or patients without their express consent. The consent requirement shall apply even if the other individuals included are not readily identifiable. Sec. 7. Responsible Social Media Activity In using social media, the individual shall respect the dignity, personality, privacy and peace of mind of another. The individual shall not post, share or otherwise use social media with the intent of damaging the reputation of any other individual or institution, especially if the subject is identified or identifiable. c.Derogatory comments about patients, colleagues, employers and institutions or companies should be avoided. An individual may “like” a defamatory post but he or she must use caution when sharing, retweeting or contributing anything that might be construed as a new defamatory statement. A post, comment or other social media activity is considered defamatory if: 1) The activity imputes a discreditable act or condition to another; 2) The activity is viewed or seen by any other person; 3) The person or institution defamed is identified or readily identifiable; 4) There is malice or intent to damage the reputation of another. He or she shall be careful of sharing posts or other contents that are unverified, particularly if it discredits another person or institution, or imputes the commission of a crime or violation of law even before trial and judgment, and violates the privacy of another. Fair and true reporting on matters of public concern shall be allowed provided that the content was obtained lawfully and with due respect for the right of privacy. An individual shall not use copyrighted materials other than for fair use where there is proper citation of source and author. Use of copyrighted material for purpose of criticism, comment, news, reporting, teaching, scholarship, research, and similar purposes is compatible with fair use. An individual is prohibited from: 1) Social media activities that defame, harass, stalk, or bully another person or institution. 2) The use or access of personal social media accounts of others without authority. 3) Posting, sharing or otherwise using any information intended to be private or obtained through access to electronic data messages or documents. 4) Posting, sharing or otherwise using recorded conversations between doctors, individuals or patients, when such recording, whether audio or video, was obtained without consent of all the parties to the conversation Individuals should use conservative privacy settings in their social media account used professionally. The individual should also practice due diligence in keeping their social media accounts safe such as through regular password change and logging out after social media use. Sec. 8. Health Information Privacy The individual shall respect the right to privacy of others and shall not collect, use, access or disclose information, pictures and other personal or sensitive information without obtaining consent from the individual concerned. Physicians, health facility employees and other health staff shall have the duty of protecting patient confidentiality in their social media activity. Personal health information, including photos or videos of patients, shall not be posted, shared or otherwise used in social media without consent of patient. Consent shall be obtained after explaining to the patient the purpose of the intended collection, use, access and disclosure. Consent for use of personal health information shall be written or evidenced by electronic means. An individual shall not post, share or otherwise use any information which could be used to identify patients without their consent, including patient’s location, room numbers, and photographs or videos of patients or their body parts, including code names referring to patients. The individual shall not post, share or otherwise use any other information acquired in attending to a patient in a professional capacity, and which would blacken the reputation of the patient. The duty of maintaining patient confidentiality remains even after patient’s death. An individual shall not post, share or otherwise use any information relating to the identity, status and personal details of persons with HIV, those who have undergone drug rehabilitation, and victims of domestic violence, rape and child abuse. Sec. 9. Compliance and Reporting. An individual shall strive to develop, support and maintain a privacy culture in the health facility. He or she shall abide by the social media use policy of the institution. An individual who becomes aware of unprofessional behavior, misinformation or privacy violations in social media shall report the matter to the hospital’s privacy officer or the proper office or authority within the facility. Health facilities shall in so far as practicable monitor the social media activity of all physicians, employees and other health facility staff, including students or residents in training, practicing their profession, working, or fulfilling academic and clinical requirements within the health facility, whether temporary or permanent. Sec. 10. Penalty. A violation of this policy may constitute a violation of the code of ethics of physicians and other professions, and other applicable laws. Health Professionals, employees and other Health Facility Staff. Any person found violating this policy will be considered in violation of health facility rules and regulations, and shall be subjected to health facility administrative proceedings, which after notice and hearing, and depending on the severity of the violation, could result to termination of service or withdrawal of privileges. A lighter penalty may likewise be imposed. In determining the severity of the violation, the following factors may be considered: previous violation, if any, the nature of the violation, and the extent of injury or damage. The penalty imposed by the health facility shall be without prejudice to the filing of a complaint before the Civil Service Commission, the Professional Regulations Commission, the Office of the Prosecutor or Ombudsman, or proper courts. Students. In case of students, they shall be reported to the college wherein they are enrolled and shall be subjected to disciplinary proceedings, which could result to expulsion, depending on the severity of the violation, and in accordance with the applicable University and respective College rules. A lighter penalty may likewise be imposed. The disciplinary proceedings shall be without prejudice to other applicable legal remedies.

APA, Harvard, Vancouver, ISO, and other styles

7

Downes,DanielM. "The Medium Vanishes?" M/C Journal 3, no.1 (March1, 2000). http://dx.doi.org/10.5204/mcj.1829.

Full text

Abstract:

Introduction The recent AOL/Time-Warner merger invites us to re-think the relationships amongst content producers, distributors, and audiences. Worth an estimated $300 billion (US), the largest Internet transaction of all time, the deal is 45 times larger than the AOL/Netscape merger of November 1998 (Ledbetter). Additionally, the Time Warner/EMI merger, which followed hard on the heels of the AOL/Time-Warner deal and is itself worth $28 billion (US), created the largest content rights organisation in the music industry. The joining of the Internet giant (AOL) with what was already the world's largest media corporation (Time-Warner-EMI) has inspired some exuberant reactions. An Infoworld column proclaimed: The AOL/Time-Warner merger signals the demise of traditional media companies and the ascendancy of 'new economy' media companies that will force any industry hesitant to adopt a complete electronic-commerce strategy to rethink and put itself on Internet time. (Saap & Schwarrtz) This comment identifies the distribution channel as the dominant component of the "new economy" media. But this might not really be much of an innovation. Indeed, the assumption of all industry observers is that Time-Warner will provide broadband distribution (through its extensive cable holdings) as well as proprietary content for AOL. It is also expected that Time-Warner will adopt AOL's strategy of seeking sponsorship for development projects as well as for content. However, both of these phenomena -- merger and sponsorship -- are at least as old as radio. It seems that the Internet is merely repeating an old industrial strategy. Nonetheless, one important difference distinguishes the Internet from earlier media: its characterisation of the audience. Internet companies such as AOL and Microsoft tend towards a simple and simplistic media- centred view of the audience as market. I will show, however, that as the Internet assumes more of the traditional mass media functions, it will be forced to adopt a more sophisticated notion of the mass audience. Indeed, the Internet is currently the site in which audience definitions borrowed from broadcasting are encountering and merging with definitions borrowed from marketing. The Internet apparently lends itself to both models. As a result, definitions of what the Internet does or is, and of how we should understand the audience, are suitably confused and opaque. And the behaviour of big Internet players, such as AOL and MSN, perfectly reflects this confusion as they seem to careen between a view of the Internet as the new television and a contrasting view of the Internet as the new shopping mall. Meanwhile, Internet users move in ways that most observers fail to capture. For example, Baran and Davis characterise mass communication as a process involving (1) an organized sender, (2) engaged in the distribution of messages, (3) directed toward a large audience. They argue that broadcasting fits this model whereas a LISTSERV does not because, even though the LISTSERV may have very many subscribers, its content is filtered through a single person or Webmaster. But why is the Webmaster suddenly more determining than a network programmer or magazine editor? The distinction seems to grow out of the Internet's technological characteristics: it is an interactive pipeline, therefore its use necessarily excludes the possibility of "broadcasting" which in turn causes us to reject "traditional" notions of the audience. However, if a media organisation were to establish an AOL discussion group in order to promote Warner TV shows, for example, would not the resulting communication suddenly fall under the definition as set out by Baran and Davis? It was precisely the confusion around such definitions that caused the CRTC (Canada's broadcasting and telecommunications regulator) to hold hearings in 1999 to determine what kind of medium the Internet is. Unlike traditional broadcasting, Internet communication does indeed include the possibility of interactivity and niche communities. In this sense, it is closer to narrowcasting than to broadcasting even while maintaining the possibility of broadcasting. Hence, the nature of the audience using the Internet quickly becomes muddy. While such muddiness might have led us to sharpen our definitions of the audience, it seems instead to have led many to focus on the medium itself. For example, Morris & Ogan define the Internet as a mass medium because it addresses a mass audience mediated through technology (Morris & Ogan 39). They divide producers and audiences on the Internet into four groups: One-to-one asynchronous communication (e-mail); Many-to-many asynchronous communication (Usenet and News Groups); One-to-one, one-to-few, and one-to-many synchronous communication (topic groups, construction of an object, role-playing games, IRC chats, chat rooms); Asynchronous communication (searches, many-to-one, one-to-one, one to- many, source-receiver relations (Morris & Ogan 42-3) Thus, some Internet communication qualifies as mass communication while some does not. However, the focus remains firmly anchored on either the sender or the medium because the receiver --the audience -- is apparently too slippery to define. When definitions do address the content distributed over the Net, they make a distinction between passive reception and interactive participation. As the World Wide Web makes pre-packaged content the norm, the Internet increasingly resembles a traditional mass medium. Timothy Roscoe argues that the main focus of the World Wide Web is not the production of content (and, hence, the fulfilment of the Internet's democratic potential) but rather the presentation of already produced material: "the dominant activity in relation to the Web is not producing your own content but surfing for content" (Rosco 680). He concludes that if the emphasis is on viewing material, the Internet will become a medium similar to television. Within media studies, several models of the audience compete for dominance in the "new media" economy. Denis McQuail recalls how historically, the electronic media furthered the view of the audience as a "public". The audience was an aggregate of common interests. With broadcasting, the electronic audience was delocalised and socially decomposed (McQuail, Mass 212). According to McQuail, it was not a great step to move from understanding the audience as a dispersed "public" to thinking about the audience as itself a market, both for products and as a commodity to be sold to advertisers. McQuail defines this conception of the audience as an "aggregate of potential customers with a known social- economic profile at which a medium or message is directed" (McQuail, Mass 221). Oddly though, in light of the emancipatory claims made for the Internet, this is precisely the dominant view of the audience in the "new media economy". Media Audience as Market How does the marketing model characterise the relationship between audience and producer? According to McQuail, the marketing model links sender and receiver in a cash transaction between producer and consumer rather than in a communicative relationship between equal interlocutors. Such a model ignores the relationships amongst consumers. Indeed, neither the effectiveness of the communication nor the quality of the communicative experience matters. This model, explicitly calculating and implicitly manipulative, is characteristically a "view from the media" (McQuail, Audience 9). Some scholars, when discussing new media, no longer even refer to audiences. They speak of users or consumers (Pavick & Dennis). The logic of the marketing model lies in the changing revenue base for media industries. Advertising-supported media revenues have been dropping since the early 1990s while user-supported media such as cable, satellite, online services, and pay-per-view, have been steadily growing (Pavlik & Dennis 19). In the Internet-based media landscape, the audience is a revenue stream and a source of consumer information. As Bill Gates says, it is all about "eyeballs". In keeping with this view, AOL hopes to attract consumers with its "one-stop shopping and billing". And Internet providers such as MSN do not even consider their subscribers as "audiences". Instead, they work from a consumer model derived from the computer software industry: individuals make purchases without the seller providing content or thematising the likely use of the software. The analogy extends well beyond the transactional moment. The common practice of prototyping products and beta-testing software requires the participation of potential customers in the product development cycle not as a potential audience sharing meanings but as recalcitrant individuals able to uncover bugs. Hence, media companies like MTV now use the Internet as a source of sophisticated demographic research. Recently, MTV Asia established a Website as a marketing tool to collect preferences and audience profiles (Slater 50). The MTV audience is now part of the product development cycle. Another method for getting information involves the "cookie" file that automatically provides a Website with information about the user who logs on to a site (Pavick & Dennis). Simultaneously, though, both Microsoft and AOL have consciously shifted from user-subscription revenues to advertising in an effort to make online services more like television (Gomery; Darlin). For example, AOL has long tried to produce content through its own studios to generate sufficiently heavy traffic on its Internet service in order to garner profitable advertising fees (Young). However, AOL and Microsoft have had little success in providing content (Krantz; Manes). In fact, faced with the AOL/Time-Warner merger, Microsoft declared that it was in the software rather than the content business (Trott). In short, they are caught between a broadcasting model and a consumer model and their behaviour is characteristically erratic. Similarly, media companies such as Time-Warner have failed to establish their own portals. Indeed, Time-Warner even abandoned attempts to create large Websites to compete with other Internet services when it shut down its Pathfinder site (Egan). Instead it refocussed its Websites so as to blur the line between pitching products and covering them (Reid; Lyons). Since one strategy for gaining large audiences is the creation of portals - - large Websites that keep surfers within the confines of a single company's site by providing content -- this is the logic behind the AOL/Time-Warner merger though both companies have clearly been unsuccessful at precisely such attempts. AOL seems to hope that Time- Warner will act as its content specialist, providing the type of compelling material that will make users want to use AOL, whereas Time- Warner seems to hope that AOL will become its privileged pipeline to the hearts and minds of untold millions. Neither has a coherent view of the audience, how it behaves, or should behave. Consequently, their efforts have a distinctly "unmanaged" and slighly inexplicable air to them, as though everyone were simultaneously hopeful and clueless. While one might argue that the stage is set to capitalise on the audience as commodity, there are indications that the success of such an approach is far from guaranteed. First, the AOL/Time-Warner/EMI transaction, merely by existing, has sparked conflicts over proprietary rights. For example, the Recording Industry Association of America, representing Sony, Universal, BMG, Warner and EMI, recently launched a $6.8 billion lawsuit against MP3.com -- an AOL subsidiary -- for alleged copyright violations. Specifically, MP3.com is being sued for selling digitized music over the Internet without paying royalties to the record companies (Anderson). A similar lawsuit has recently been launched over the issue of re- broadcasting television programs over the Internet. The major US networks have joined together against Canadian Internet company iCravetv for the unlawful distribution of content. Both the iCravetv and the MP3.com cases show how dominant media players can marshal their forces to protect proprietary rights in both content and distribution. Since software and media industries have failed to recreate the Internet in the image of traditional broadcasting, the merger of the dominant players in each industry makes sense. However, their simultaneous failure to secure proprietary rights reflects both the competitive nature of the "new media economy" and the weakness of the marketing view of the audience. Media Audience as Public It is often said that communication produces social cohesion. From such cohesion communities emerge on which political or social orders can be constructed. The power of social cohesion and attachment to group symbols can even create a sense of belonging to a "people" or nation (Deutsch). Sociologist Daniel Bell described how the mass media helped create an American culture simply by addressing a large enough audience. He suggested that on the evening of 7 March 1955, when one out of every two Americans could see Mary Martin as Peter Pan on television, a kind of social revolution occurred and a new American public was born. "It was the first time in history that a single individual was seen and heard at the same time by such a broad public" (Bell, quoted in Mattelart 72). One could easily substitute the 1953 World Series or the birth of little Ricky on I Love Lucy. The desire to document such a process recurs with the Internet. Internet communities are based on the assumption that a common experience "creates" group cohesion (Rheingold; Jones). However, as a mass medium, the Internet has yet to find its originary moment, that event to which all could credibly point as the birth of something genuine and meaningful. A recent contender was the appearance of Paul McCartney at the refurbished Cavern Club in Liverpool. On Tuesday, 14 December 1999, McCartney played to a packed club of 300 fans, while another 150,000 watched on an outdoor screen nearby. MSN arranged to broadcast the concert live over the Internet. It advertised an anticipated global audience of 500 million. Unfortunately, there was such heavy Internet traffic that the system was unable to accommodate more than 3 million people. Servers in the United Kingdom were so congested that many could only watch the choppy video stream via an American link. The concert raises a number of questions about "virtual" events. We can draw several conclusions about measuring Internet audiences. While 3 million is a sizeable audience for a 20 minute transmission, by advertising a potential audience of 500 million, MSN showed remarkably poor judgment of its inherent appeal. The Internet is the first medium that allows access to unprocessed material or information about events to be delivered to an audience with neither the time constraints of broadcast media nor the space limitations of the traditional press. This is often cited as one of the characteristics that sets the Internet apart from other media. This feeds the idea of the Internet audience as a participatory, democratic public. For example, it is often claimed that the Internet can foster democratic participation by providing voters with uninterpreted information about candidates and issues (Selnow). However, as James Curran argues, the very process of distributing uninterrupted, unfiltered information, at least in the case of traditional mass media, represents an abdication of a central democratic function -- that of watchdog to power (Curran). In the end, publics are created and maintained through active and continuous participation on the part of communicators and audiences. The Internet holds together potentially conflicting communicative relationships within the same technological medium (Merrill & Ogan). Viewing the audience as co-participant in a communicative relationship makes more sense than simply focussing on the Internet audience as either an aggregate of consumers or a passively constructed symbolic public. Audience as Relationship Many scholars have shifted attention from the producer to the audience as an active participant in the communication process (Ang; McQuail, Audience). Virginia Nightingale goes further to describe the audience as part of a communicative relationship. Nightingale identifies four factors in the relationship between audiences and producers that emphasize their co-dependency. The audience and producer are engaged in a symbiotic relationship in which consumption and use are necessary but not sufficient explanations of audience relations. The notion of the audience invokes, at least potentially, a greater range of activities than simply use or consumption. Further, the audience actively, if not always consciously, enters relationships with content producers and the institutions that govern the creation, distribution and exhibition of content (Nightingale 149-50). Others have demonstrated how this relationship between audiences and producers is no longer the one-sided affair characterised by the marketing model or the model of the audience as public. A global culture is emerging based on critical viewing skills. Kavoori calls this a reflexive mode born of an increasing familiarity with the narrative conventions of news and an awareness of the institutional imperatives of media industries (Kavoori). Given the sophistication of the emergent global audience, a theory that reduces new media audiences to a set of consumer preferences or behaviours will inevitably prove inadequate, just as it has for understanding audience behavior in old media. Similarly, by ignoring those elements of audience behavior that will be easily transported to the Web, we run the risk of idealising the Internet as a medium that will create an illusory, pre-technological public. Conclusion There is an understandable confusion between the two models of the audience that appear in the examples above. The "new economy" will have to come to terms with sophisticated audiences. Contrary to IBM's claim that they want to "get to know all about you", Internet users do not seem particularly interested in becoming a perpetual source of market information. The fragmented, autonomous audience resists attempts to lock it into proprietary relationships. Internet hypesters talk about creating publics and argue that the Internet recreates the intimacy of community as a corrective to the atomisation and alienation characteristic of mass society. This faith in the power of a medium to create social cohesion recalls the view of the television audience as a public constructed by the common experience of watching an important event. However, MSN's McCartney concert indicates that creating a public from spectacle it is not a simple process. In fact, what the Internet media conglomerates seem to want more than anything is to create consumer bases. Audiences exist for pleasure and by the desire to be entertained. As Internet media institutions are established, the cynical view of the audience as a source of consumer behavior and preferences will inevitably give way, to some extent, to a view of the audience as participant in communication. Audiences will be seen, as they have been by other media, as groups whose attention must be courted and rewarded. Who knows, maybe the AOL/Time-Warner merger might, indeed, signal the new medium's coming of age. References Anderson, Lessley. "To Beam or Not to Beam. MP3.com Is Being Sued by the Major Record Labels. Does the Digital Download Site Stand a Chance?" Industry Standard 31 Jan. 2000. <http://www.thestandard.com>. Ang, Ien. Watching Dallas: Soap Opera and the Melodramatic Imagination. London: Methuen, 1985. Baran, Stanley, and Dennis Davis. Mass Communication Theory: Foundations, Ferment, and Future. 2nd ed. Belmont, Calif.: Wadsworth 2000. Curran, James. "Mass Media and Democracy Revisited." Mass Media and Society. Eds. James Curran and Michael Gurevitch. New York: Hodder Headline Group, 1996. Darlin, Damon. "He Wants Your Eyeballs." Forbes 159 (16 June 1997): 114-6. Egan, Jack, "Pathfinder, Rest in Peace: Time-Warner Pulls the Plug on Site." US News and World Report 126.18 (10 May 1999): 50. Gomery, Douglas. "Making the Web Look like Television (American Online and Microsoft)." American Journalism Review 19 (March 1997): 46. Jones, Steve, ed. CyberSociety: Computer-Mediated Communication and Community. Thousand Oaks: Sage, 1995. Kavoori, Amandam P. "Discursive Texts, Reflexive Audiences: Global Trends in Television News Texts and Audience Reception." Journal of Broadcasting and Electronic Media 43.3 (Summer 1999): 386-98. Krantz, Michael. "Is MSN on the Block?" Time 150 (20 Oct. 1997): 82. Ledbetter, James. "AOL-Time-Warner Make It Big." Industry Standard 11 Jan. 2000. <http://www.thestandard.com>. Lyons, Daniel. "Desparate.com (Media Companies Losing Millions on the Web Turn to Electronic Commerce)." Forbes 163.6 (22 March 1999): 50-1. Manes, Stephen. "The New MSN as Prehistoric TV." New York Times 4 Feb. 1997: C6. McQuail, Denis. Audience Analysis. Thousand Oaks, Calif.: Sage, 1997. ---. Mass Communication Theory. 2nd ed. London: Sage, 1987. Mattelart, Armand. Mapping World Communication: War, Progress, Culture. Trans. Susan Emanuel and James A. Cohen. Minneapolis: U of Minnesota P, 1994. Morris, Merrill, and Christine Ogan. "The Internet as Mass Medium." Journal of Communications 46 (Winter 1996): 39-50. Nightingale, Virginia. Studying Audience: The Shock of the Real. London: Routledge, 1996. Pavlik, John V., and Everette E. Dennis. New Media Technology: Cultural and Commercial Perspectives. 2nd ed. Boston: Allyn and Bacon, 1998. Reid, Calvin. "Time-Warner Seeks Electronic Synergy, Profits on the Web (Pathfinder Site)." Publisher's Weekly 242 (4 Dec. 1995): 12. Rheingold, Howard. Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. Roscoe, Timothy. "The Construction of the World Wide Web Audience." Media, Culture and Society 21.5 (1999): 673-84. Saap, Geneva, and Ephraim Schwarrtz. "AOL-Time-Warner Deal to Impact Commerce, Content, and Access Markets." Infoworld 11 January 2000. <http://infoworld.com/articles/ic/xml/00/01/11/000111icimpact.xml>. Slater, Joanna. "Cool Customers: Music Channels Hope New Web Sites Tap into Teen Spirit." Far Eastern Economic Review 162.9 (4 March 1999): 50. Trott, Bob. "Microsoft Views AOL-Time-Warner as Confirmation of Its Own Strategy." Infoworld 11 Jan. 2000. <http://infoworld.com/articles/pi/xml/00/01/11/000111pimsaoltw.xml>. Yan, Catherine. "A Major Studio Called AOL?" Business Week 1 Dec. 1997: 1773-4. Citation reference for this article MLA style: Daniel M. Downes. "The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy." M/C: A Journal of Media and Culture 3.1 (2000). [your date of access] <http://www.uq.edu.au/mc/0003/mass.php>. Chicago style: Daniel M. Downes, "The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy," M/C: A Journal of Media and Culture 3, no. 1 (2000), <http://www.uq.edu.au/mc/0003/mass.php> ([your date of access]). APA style: Daniel M. Downes. (2000) The Medium Vanishes? The Resurrection of the Mass Audience in the New Media Economy. M/C: A Journal of Media and Culture 3(1). <http://www.uq.edu.au/mc/0003/mass.php> ([your date of access]).

APA, Harvard, Vancouver, ISO, and other styles

8

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no.2 (March8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text

Abstract:

Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisem*nts which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.

APA, Harvard, Vancouver, ISO, and other styles

9

Waelder, Pau. "The Constant Murmur of Data." M/C Journal 13, no.2 (April15, 2010). http://dx.doi.org/10.5204/mcj.228.

Full text

Abstract:

Our daily environment is surrounded by a paradoxically silent and invisible flow: the coming and going of data through our network cables, routers and wireless devices. This data is not just 1s and 0s, but bits of the conversations, images, sounds, thoughts and other forms of information that result from our interaction with the world around us. If we can speak of a global ambience, it is certainly derived from this constant flow of data. It is an endless murmur that speaks to our machines and gives us a sense of awareness of a certain form of surrounding that is independent from our actual, physical location. The constant “presence” of data around us is something that we have become largely aware of. Already in 1994, Phil Agre stated in an article in WIRED Magazine: “We're so accustomed to data that hardly anyone questions it” (1). Agre indicated that this data is in fact a representation of the world, the discrete bits of information that form the reality we are immersed in. He also proposed that it should be “brought to life” by exploring its relationships with other data and the world itself. A decade later, these relationships had become the core of the new paradigm of the World Wide Web and our interaction with cyberspace. As Mitchell Whitelaw puts it: “The web is increasingly a set of interfaces to datasets ... . On the contemporary web the data pour has become the rule, rather than the exception. The so-called ‘web 2.0’ paradigm further abstracts web content into feeds, real-time flows of XML data” ("Art against Information"). These feeds and flows have been used by artists and researchers in the creation of different forms of dynamic visualisations, in which data is mapped according to a set of parameters in order to summarise it in a single image or structure. Lev Manovich distinguishes in these visualisations those made by artists, to which he refers as “data art”. Unlike other forms of mapping, according to Manovich data art has a precise goal: “The more interesting and at the end maybe more important challenge is how to represent the personal subjective experience of a person living in a data society” (15). Therefore, data artists extract from the bits of information available in cyberspace a dynamic representation of our contemporary environment, the ambience of our digital culture, our shared, intimate and at the same time anonymous, subjectivity. In this article I intend to present some of the ways in which artists have dealt with the murmur of data creatively, exploring the immense amounts of user generated content in forms that interrogate our relationship with the virtual environment and the global community. I will discuss several artistic projects that have shaped the data flow on the Internet in order to take the user back to a state of contemplation, as a listener, an observer, and finally encountering the virtual in a physical form. Listening The concept of ambience particularly evokes an auditory experience related to a given location: in filmmaking, it refers to the sounds of the surrounding space and is the opposite of silence; as a musical genre, ambient music contributes to create a certain atmosphere. In relation to flows of data, it can be said that the applications that analyze Internet traffic and information are “listening” to it, as if someone stands in a public place, overhearing other people's conversations. The act of listening also implies a reception, not an emission, which is a substantial distinction given the fact that data art projects work with given data instead of generating it. As Mitchell Whitelaw states: “Data here is first of all indexical of reality. Yet it is also found, or to put it another way, given. ... Data's creation — in the sense of making a measurement, framing and abstracting something from the flux of the real — is left out” (3). One of the most interesting artistic projects to initially address this sort of “listening” is Carnivore (2001) by the Radical Software Group. Inspired by DCS1000, an e-mail surveillance software developed by the FBI, Carnivore (which was actually the original name of the FBI's program) listens to Internet traffic and serves this data to interfaces (clients) designed by artists, which interpret the provided information in several ways. The data packets can be transformed into an animated graphic, as in amalgamatmosphere (2001) by Joshua Davis, or drive a fleet of radio controlled cars, as in Police State (2003) by Jonah Brucker-Cohen. Yet most of these clients treat data as a more or less abstract value (expressed in numbers) that serves to trigger the reactions in each client. Carnivore clients provide an initial sense of the concept of ambience as reflected in the data circulating the Internet, yet other projects will address this subject more eloquently. Fig. 1: Ben Rubin, Mark Hansen, Listening Post (2001-03). Multimedia installation. Photo: David Allison.Listening Post (2001-04) by Mark Hansen and Ben Rubin is an installation consisting of 231 small electronic screens distributed in a semicircular grid [fig.1: Listening Post]. The screens display texts culled from thousands of Internet chat rooms, which are read by a voice synthesiser and arranged synchronically across the grid. The installation thus becomes a sort of large panel, somewhere between a videowall and an altarpiece, which invites the viewer to engage in a meditative contemplation, seduced by the visual arrangement of the flickering texts scrolling on each screen, appearing and disappearing, whilst sedated by the soft, monotonous voice of the machine and an atmospheric musical soundtrack. The viewer is immersed in a particular ambience generated by the fragmented narratives of the anonymous conversations extracted from the Internet. The setting of the piece, isolated in a dark room, invites contemplation and silence, as the viewer concentrates on seeing and listening. The artists clearly state that their goal in creating this installation was to recreate a sense of ambience that is usually absent in electronic communications: “A participant in a chat room has limited sensory access to the collective 'buzz' of that room or of others nearby – the murmur of human contact that we hear naturally in a park, a plaza or a coffee shop is absent from the online experience. The goal of Listening Post is to collect this buzz and render it at a human scale” (Hansen 114-15). The "buzz", as Hansen and Rubin describe it, is in fact nonexistent in the sense that it does not take place in any physical environment, but is rather the imagined output of the circulation of a myriad blocks of data through the Net. This flow of data is translated into audible and visible signals, thus creating a "murmur" that the viewer can relate to her experience in interacting with other humans. The ambience of a room full of people engaged in conversation is artificially recreated and expanded beyond the boundaries of a real space. By extracting chats from the Internet, the murmur becomes global, reflecting the topics that are being shared by users around the world, in an improvised, ever-changing embodiment of the Zeitgeist, the spirit of the time, or even a certain stream of consciousness on a planetary scale. Fig. 2: Gregory Chatonsky, L'Attente - The Waiting (2007). Net artwork. Photo: Gregory Chatonsky.The idea of contemplation and receptiveness is also present in another artwork that elaborates on the concept of the Zeitgeist. L'Attente [The Waiting] (2007) by Gregory Chatonsky is a net art piece that feeds from the data on the Internet to create an open, never-ending fiction in real time [Fig.2: The Waiting]. In this case, the viewer experiences the artwork on her personal computer, as a sort of film in which words, images and sounds are displayed in a continuous sequence, driven by a slow paced soundtrack that confers a sense of unity to the fragmented nature of the work. The data is extracted in real time from several popular sites (photos from Flickr, posts from Twitter, sound effects from Odeo), the connection between image and text being generated by the network itself: the program extracts text from the posts that users write in Twitter, then selects some words to perform a search on the Flickr database and retrieve photos with matching keywords. The viewer is induced to make sense of this concatenation of visual and audible content and thus creates a story by mentally linking all the elements into what Chatonsky defines as "a fiction without narration" (Chatonsky, Flußgeist). The murmur here becomes a story, but without the guiding voice of a narrator. As with Listening Post, the viewer is placed in the role of a witness or a voyeur, subject to an endless flow of information which is not made of the usual contents distributed by mainstream media, but the personal and intimate statements of her peers, along with the images they have collected and the portraits that identify them in the social networks. In contrast to the overdetermination of History suggested by the term Zeitgeist, Chatonsky proposes a different concept, the spirit of the flow or Flußgeist, which derives not from a single idea expressed by multiple voices but from a "voice" that is generated by listening to all the different voices on the Net (Chatonsky, Zeitgeist). Again, the ambience is conceived as the combination of a myriad of fragments, which requires attentive contemplation. The artist describes this form of interacting with the contents of the piece by making a reference to the character of the angel Damiel in Wim Wenders’s film Wings of Desire (Der Himmel über Berlin, 1987): “to listen as an angel distant and proximate the inner voice of people, to place the hand on their insensible shoulder, to hold without being able to hold back” (Chatonsky, Flußgeist). The act of listening as described in Wenders's character illustrates several key aspects of the above mentioned artworks: there is, on the one hand, a receptiveness, carried out by the applications that extract data from the Internet, which cannot be “hold back” by the user, unable to control the flow that is evolving in front of her. On the other hand, the information she receives is always fragmentary, made up of disconnected parts which are, in the words of the artist Lisa Jevbratt, “rubbings ... indexical traces of reality” (1). Observing The observation of our environment takes us to consider the concept of landscape. Landscape, in its turn, acquires a double nature when we compare our relationship with the physical environment and the digital realm. In this sense, Mitchell Whitelaw stresses that while data moves at superhuman speed, the real world seems slow and persistent (Landscape). The overlapping of dynamic, fast-paced, virtual information on a physical reality that seems static in comparison is one of the distinctive traits of the following projects, in which the ambience is influenced by realtime data in a visual form that is particularly subtle, or even invisible to the naked eye. Fig. 3: Carlo Zanni, The Fifth Day (2009). Net artwork. Screenshot retrieved on 4/4/2009. Photo: Carlo Zanni. The Fifth Day (2009) by Carlo Zanni is a net art piece in which the artist has created a narration by displaying a sequence of ten pictures showing a taxi ride in the city of Alexandria [Fig.3: The Fifth Day]. Although still, the images are dynamic in the sense that they are transformed according to data retrieved from the Internet describing the political and cultural status of Egypt, along with data extracted from the user's own identity on the Net, such as her IP or city of residence. Every time a user accesses the website where the artwork is hosted, this data is collected and its values are applied to the photos by cloning or modifying particular elements in them. For instance, a photograph of a street will show as many passersby as the proportion of seats held by women in national parliament, while the reflection in the taxi driver's mirror in another photo will be replaced by a picture taken from Al-Jazeera's website. Zanni addresses the viewer's perception of the Middle East by inserting small bits of additional information and also elements from the viewer's location and culture into the images of the Egyptian city. The sequence is rendered as the trailer of a political thriller, enhanced by a dramatic soundtrack and concluded with the artwork's credits. As with the abovementioned projects, the viewer must adopt a passive role, contemplating the images before her and eventually observing the minute modifications inserted by the data retrieved in real time. Yet, in this case, the ambience is not made manifest by a constant buzz to which one must listen, but quite more subtly it is suggested by the fact that not even a still image is always the same. As if observing a landscape, the overall impression is that nothing has changed while there are minor transformations that denote a constant evolution. Zanni has explored this idea in previous works such as eBayLandscape (2004), in which he creates a landscape image by combining data extracted from several websites, or My Temporary Visiting Position from the Sunset Terrace Bar (2007), in which a view of the city of Ahlen (Germany) is combined with a real time webcam image of the sky in Naples (Italy). Although they may seem self-enclosed, these online, data-driven compositions also reflect the global ambience, the Zeitgeist, in different forms. As Carlo Giordano puts it: "Aesthetically, the work aims to a nearly seamless integration of mixed fragments. The contents of these parts, reflecting political and economical issues ... thematize actuality and centrality, amplifying the author's interest in what everybody is talking about, what happens hic et nunc, what is in the fore of the media and social discourse" (16-17). A landscape made of data, such as Zanni's eBayLandscape, is the most eloquent image of how an invisible layer of information is superimposed over our physical environment. Fig. 4: Clara Boj and Diego Díaz, Red Libre, Red Visible (2004-06). Intervention in the urban space. Photo: Lalalab.Artists Clara Boj and Diego Díaz, moreover, have developed a visualisation of the actual flows of data that permeate the spaces we inhabit. In Red Libre, Red Visible [Free Network, Visible Network] (2004-06), Boj and Díaz used Augmented Reality (AR) technology to display the flows of data in a local wireless network by creating AR marker tags that were placed on the street. A Carnivore client developed by the artists enabled anyone with a webcam pointing towards the marker tag and connected to the Wi-Fi network to see in real time the data packets flowing from their computer towards the tag [Fig.4: Red Libre]. The marker tags therefore served both as a tool for the visualisation of network activity as well as a visual sign of the existence of an open network in a particular urban area. Later on, they added the possibility of inserting custom made messages, 3D shapes and images that would appear when a particular AR marker tag was seen through the lens of the webcam. With this project, Boj and Díaz give the user the ability to observe and interact with a layer of her environment that was previously invisible and in some senses, out of reach. The artists developed this idea further in Observatorio [Observatory] (2008), a sightseeing telescope that reveals the existence of Wi-Fi networks in an urban area. In both projects, an important yet unnoticed aspect of our surroundings is brought into focus. As with Carlo Zanni's projects, we are invited to observe what usually escapes our perception. The ambience in our urban environment has also been explored by Julian Oliver, Clara Boj, Diego Díaz and Damian Stewart in The Artvertiser (2009-10), a hand-held augmented reality (AR) device that allows to substitute advertising billboards with custom made images. As Naomi Klein states in her book No Logo, the public spaces in most cities have been dominated by corporate advertising, allowing little or no space for freedom of expression (Klein 399). Oliver's project faces this situation by enabling a form of virtual culture jamming which converts any billboard-crowded plaza into an unparalleled exhibition space. Using AR technology, the artists have developed a system that enables anyone with a camera phone, smartphone or the customised "artvertiser binoculars" to record and substitute any billboard advertisem*nt with a modified image. The user can therefore interact with her environment, first by observing and being aware of the presence of these commercial spaces and later on by inserting her own creations or those of other artists. By establishing a connection to the Internet, the modified billboard can be posted on sites like Flickr or YouTube, generating a constant feedback between the real location and the Net. Gregory Chatonsky's concept of the Flußgeist, which I mentioned earlier, is also present in these works, visually displaying the data on top of a real environment. Again, the user is placed in a passive situation, as a receptor of the information that is displayed in front of her, but in this case the connection with reality is made more evident. Furthermore, the perception of the environment minimises the awareness of the fragmentary nature of the information generated by the flow of data. Embodying In her introduction to the data visualisation section of her book Digital Art, Christiane Paul stresses the fact that data is “intrinsically virtual” and therefore lacking a particular form of manifestation: “Information itself to a large extent seems to have lost its 'body', becoming an abstract 'quality' that can make a fluid transition between different states of materiality” (Paul 174). Although data has no “body”, we can consider, as Paul suggests, any object containing a particular set of information to be a dataspace in its own. In this sense, a tendency in working with the Internet dataflow is to create a connection between the data and a physical object, either as the end result of a process in which the data has been collected and then transferred to a physical form, or providing a means of physically reshaping the object through the variable input of data. The objectification of data thus establishes a link between the virtual and the real, but in the context of an artwork it also implies a particular meaning, as the following examples will show.Fig. 5: Gregory Chatonsky, Le Registre - The Register (2007). Book shelf and books. Photo: Pau Waelder. In Le Registre [The Register] (2007), Gregory Chatonsky developed a software application that gathers sentences related to feelings found on blogs. These sentences are recorded and put together in the form a 500-page book every hour. Every day, the books are gathered in sets of 24 and incorporated to an infinite library. Chatonsky has created a series of bookshelves to collect the books for one day, therefore turning an abstract process into an object and providing a physical embodiment of the murmur of data that I have described earlier [Fig.5: Le Registre]. As with L'Attente, in this work Chatonsky elaborates on the concept of Flußgeist, by “listening” to a specific set of data (in a similar way as in Hansen and Rubin's Listening Post) and bringing it into salience. The end product of this process is not just a meaningless object but actually what makes this work profoundly ironic: printing the books is a futile effort, but also constitutes a borgesque attempt at creating an endless library of something as ephemeral as feelings. In a similar way, but with different intentions, Jens Wunderling brings the online world to the physical world in Default to Public (2009). A series of objects are located in several public spaces in order to display information extracted from users of the Twitter network. Wunderling's installation projects the tweets on a window or prints them in adhesive labels, while informing the users that their messages have been taken for this purpose. The materialisation of information meant for a virtual environment implies a new approach to the concept of ambiance as described previously, and in this case also questions the intimacy of those participating in social networks. As the artist puts it: "In times of rapid change concerning communication behavior, media access and competence, the project Default to Public aims to raise awareness of the possible effects on our lives and our privacy" (Wunderling 155). Fig. 6: Moisés Mañas, Stock (2009). Networked installation. Photo: Moisés Mañas. Finally, in Stock (2009), Moisés Mañas embodies the flow of data from stock markets in an installation consisting of several trench coats hanging from automated coat hangers which oscillate when the stock values of a certain company rise. The resulting movement of the respective trench coat simulates a person laughing. In this work, Mañas translates the abstract flow of data into a clearly understandable gesture, providing at the same time a comment on the dynamics of stock markets [Fig.6: Stock]. Mañas´s project does not therefore simply create a physical output of a specific information (such as the stock value of a company at any given moment), but instead creates a dynamic sculpture which suggests a different perception of an otherwise abstract data. On the one hand, the trenchcoats have a ghostly presence and, as they move with unnatural spams, they remind us of the Freudian concept of the Uncanny (Das Umheimliche) so frequently associated with robots and artificial intelligence. On the other hand, the image of a person laughing, in the context of stock markets and the current economical crisis, becomes an ironic symbol of the morality of some stockbrokers. In these projects, the ambience is brought into attention by generating a physical output of a particular set of data that is extracted from certain channels and piped into a system that creates an embodiment of this immaterial flow. Yet, as the example of Mañas's project clearly shows, objects have particular meanings that are incorporated into the artwork's concept and remind us that the visualisation of information in data art is always discretionary, shaped in a particular form in order to convey the artist's intentions. Beyond the Buzz The artworks presented in this article revealt that, beyond the murmur of sentences culled from chats and blogs, the flow of data on the Internet can be used to express our difficult relationship with the vast amount of information that surrounds us. As Mitchell Whitelaw puts it: “Data art reflects a contemporary worldview informed by data excess; ungraspable quantity, wide distribution, mobility, heterogeneity, flux. Orienting ourselves in this domain is a constant challenge; the network exceeds any overview or synopsis” (Information). This excess is compared by Lev Manovich with the Romantic concept of the Sublime, that which goes beyond the limits of human measure and perception, and suggests an interpretation of data art as the Anti-Sublime (Manovich 11). Yet, in the projects that I have presented, rather than making sense of the constant flow of data there is a sort of dialogue, a framing of the information under a particular interpretation. Data is channeled through the artworks's interfaces but remains as a raw material, unprocessed to some extent, retrieved from its original context. These works explore the possibility of presenting us with constantly renewed content that will develop and, if the artwork is preserved, reflect the thoughts and visions of the next generations. A work constantly evolving in the present continuous, yet also depending on the uncertain future of social network companies and the ever-changing nature of the Internet. The flow of data will nevertheless remain unstoppable, our ambience defined by the countless interactions that take place every day between our divided self and the growing number of machines that share information with us. References Agre, Phil. “Living Data.” Wired 2.11 (Nov. 1994). 30 April 2010 ‹http://www.wired.com/wired/archive/2.11/agre.if.html›. Chatonsky, Gregory. “Flußgeist, une fiction sans narration.” Gregory Chatonsky, Notes et Fragments 13 Feb. 2007. 28 Feb. 2010 ‹http://incident.net/users/gregory/wordpress/13-flusgeist-une-fiction-sans-narration/›. ———. “Le Zeitgeist et l'esprit de 'nôtre' temps.” Gregory Chatonsky, Notes et Fragments 21 Jan. 2007. 28 Feb. 2010 ‹http://incident.net/users/gregory/wordpress/21-le-zeigeist-et-lesprit-de-notre-temps/›. Giordano, Carlo. Carlo Zanni. Vitalogy. A Study of a Contemporary Presence. London: Institute of Contemporary Arts, 2005. Hansen, Mark, and Ben Rubin. “Listening Post.” Cyberarts 2004. International Compendium – Prix Ars Electronica 2004. Ed. Hannes Leopoldseder and Christine Schöpf. Ostfildern: Hate Cantz, 2004. 112-17. ———. “Babble Online: Applying Statistics and Design to Sonify the Internet.” Proceedings of the 2001 International Conference on Auditory Display, Espoo, Finland. 30 April 2010 ‹http://www.acoustics.hut.fi/icad2001/proceedings/papers/hansen.pdf›. Jevbratt, Lisa. “Projects.” A::minima 15 (2003). 30 April 2010 ‹http://aminima.net/wp/?p=93&language=en›. Klein, Naomi. No Logo. [El poder de las marcas]. Barcelona: Paidós, 2007. Manovich, Lev. “Data Visualization as New Abstraction and Anti-Sublime.” Manovich.net Aug. 2002. 30 April 2010 ‹http://www.manovich.net/DOCS/data_art_2.doc›. Paul, Christiane. Digital Art. London: Thames & Hudson, 2003. Whitelaw, Mitchell. “Landscape, Slow Data and Self-Revelation.” Kerb 17 (May 2009). 30 April 2010 ‹http://teemingvoid.blogspot.com/2009/05/landscape-slow-data-and-self-revelation.html›. ———. “Art against Information: Case Studies in Data Practice.” Fibreculture 11 (Jan. 2008). 30 April 2010 ‹http://journal.fibreculture.org/issue11/issue11_whitelaw.html›. Wunderling, Jens. "Default to Public." Cyberarts 2009. International Compendium – Prix Ars Electronica 2004. Ed. Hannes Leopoldseder, Christine Schöpf and Gerfried Stocker. Ostfildern: Hate Cantz, 2009. 154-55.

APA, Harvard, Vancouver, ISO, and other styles

10

Wagman, Ira. "Wasteaminute.com: Notes on Office Work and Digital Distraction." M/C Journal 13, no.4 (August18, 2010). http://dx.doi.org/10.5204/mcj.243.

Full text

Abstract:

For those seeking a diversion from the drudgery of work there are a number of websites offering to take you away. Consider the case of wasteaminute.com. On the site there is everything from flash video games, soft-core p*rnography and animated nudity, to puzzles and parlour games like poker. In addition, the site offers links to video clips grouped in categories such as “funny,” “accidents,” or “strange.” With its bright yellow bubble letters and elementary design, wasteaminute will never win any Webby awards. It is also unlikely to be part of a lucrative initial public offering for its owner, a web marketing company based in Lexington, Kentucky. The internet ratings company Alexa gives wasteaminute a ranking of 5,880,401 when it comes to the most popular sites online over the last three months, quite some way behind sites like Wikipedia, Facebook, and Windows Live.Wasteaminute is not unique. There exists a group of websites, a micro-genre of sorts, that go out of their way to offer momentary escape from the more serious work at hand, with a similar menu of offerings. These include sites with names such as ishouldbeworking.com, i-am-bored.com, boredatwork.com, and drivenbyboredom.com. These web destinations represent only the most overtly named time-wasting opportunities. Video sharing sites like YouTube or France’s DailyMotion, personalised home pages like iGoogle, and the range of applications available on mobile devices offer similar opportunities for escape. Wasteaminute inspired me to think about the relationship between digital media technologies and waste. In one sense, the site’s offerings remind us of the Internet’s capacity to re-purpose old media forms from earlier phases in the digital revolution, like the retro video game PacMan, or from aspects of print culture, like crosswords (Bolter and Grusin; Straw). For my purposes, though, wasteaminute permits the opportunity to meditate, albeit briefly, on the ways media facilitate wasting time at work, particularly for those working in white- and no-collar work environments. In contemporary work environments work activity and wasteful activity exist on the same platform. With a click of a mouse or a keyboard shortcut, work and diversion can be easily interchanged on the screen, an experience of computing I know intimately from first-hand experience. The blurring of lines between work and waste has accompanied the extension of the ‘working day,’ a concept once tethered to the standardised work-week associated with modernity. Now people working in a range of professions take work out of the office and find themselves working in cafes, on public transportation, and at times once reserved for leisure, like weekends (Basso). In response to the indeterminate nature of when and where we are at work, the mainstream media routinely report about the wasteful use of computer technology for non-work purposes. Stories such as a recent one in the Washington Post which claimed that increased employee use of social media sites like Facebook and Twitter led to decreased productivity at work have become quite common in traditional media outlets (Casciato). Media technologies have always offered the prospect of making office work more efficient or the means for management to exercise control over employees. However, those same technologies have also served as the platforms on which one can engage in dilatory acts, stealing time from behind the boss’s back. I suggest stealing time at work may well be a “tactic,” in the sense used by Michel de Certeau, as a means to resist the rules and regulations that structure work and the working life. However, I also consider it to be a tactic in a different sense: websites and other digital applications offer users the means to take time back, in the form of ‘quick hits,’ providing immediate visual or narrative pleasures, or through interfaces which make the time-wasting look like work (Wagman). Reading sites like wasteaminute as examples of ‘office entertainment,’ reminds us of the importance of workers as audiences for web content. An analysis of a few case studies also reveals how the forms of address of these sites themselves recognise and capitalise on an understanding of the rhythms of the working day, as well as those elements of contemporary office culture characterised by interruption, monotony and surveillance. Work, Media, Waste A mass of literature documents the transformations of work brought on by industrialisation and urbanisation. A recent biography of Franz Kafka outlines the rigors imposed upon the writer while working as an insurance agent: his first contract stipulated that “no employee has the right to keep any objects other than those belonging to the office under lock in the desk and files assigned for its use” (Murray 66). Siegfried Kracauer’s collection of writings on salaried workers in Germany in the 1930s argues that mass entertainment offers distractions that inhibit social change. Such restrictions and inducements are exemplary of the attempts to make work succumb to managerial regimes which are intended to maximise productivity and minimise waste, and to establish a division between ‘company time’ and ‘free time’. One does not have to be an industrial sociologist to know the efforts of Frederick W. Taylor, and the disciplines of “scientific management” in the early twentieth century which were based on the idea of making work more efficient, or of the workplace sociology scholarship from the 1950s that drew attention to the ways that office work can be monotonous or de-personalising (Friedmann; Mills; Whyte). Historian JoAnne Yates has documented the ways those transformations, and what she calls an accompanying “philosophy of system and efficiency,” have been made possible through information and communication technologies, from the typewriter to carbon paper (107). Yates evokes the work of James Carey in identifying these developments, for example, the locating of workers in orderly locations such as offices, as spatial in nature. The changing meaning of work, particularly white-collar or bureaucratic labour in an age of precarious employment and neo-liberal economic regimes, and aggressive administrative “auditing technologies,” has subjected employees to more strenuous regimes of surveillance to ensure employee compliance and to protect against waste of company resources (Power). As Andrew Ross notes, after a deep period of self-criticism over the drudgery of work in North American settings in the 1960s, the subsequent years saw a re-thinking of the meaning of work, one that gradually traded greater work flexibility and self-management for more assertive forms of workplace control (9). As Ross notes, this too has changed, an after-effect of “the shareholder revolution,” which forced companies to deliver short-term profitability to its investors at any social cost. With so much at stake, Ross explains, the freedom of employees assumed a lower priority within corporate cultures, and “the introduction of information technologies in the workplace of the new capitalism resulted in the intensified surveillance of employees” (12). Others, like Dale Bradley, have drawn attention to the ways that the design of the office itself has always concerned itself with the bureaucratic and disciplinary control of bodies in space (77). The move away from physical workspaces such as ‘the pen’ to the cubicle and now from the cubicle to the virtual office is for Bradley a move from “construction” to “connection.” This spatial shift in the way in which control over employees is exercised is symbolic of the liquid forms in which bodies are now “integrated with flows of money, culture, knowledge, and power” in the post-industrial global economies of the twenty-first century. As Christena Nippert-Eng points out, receiving office space was seen as a marker of trust, since it provided employees with a sense of privacy to carry out affairs—both of a professional or of a personal matter—out of earshot of others. Privacy means a lot of things, she points out, including “a relative lack of accountability for our immediate whereabouts and actions” (163). Yet those same modalities of control which characterise communication technologies in workspaces may also serve as the platforms for people to waste time while working. In other words, wasteful practices utilize the same technology that is used to regulate and manage time spent in the workplace. The telephone has permitted efficient communication between units in an office building or between the office and outside, but ‘personal business’ can also be conducted on the same line. Radio stations offer ‘easy listening’ formats, providing unobtrusive music so as not to disturb work settings. However, they can easily be tuned to other stations for breaking news, live sports events, or other matters having to do with the outside world. Photocopiers and fax machines facilitate the reproduction and dissemination of communication regardless of whether it is it work or non-work related. The same, of course, is true for computerised applications. Companies may encourage their employees to use Facebook or Twitter to reach out to potential clients or customers, but those same applications may be used for personal social networking as well. Since the activities of work and play can now be found on the same platform, employers routinely remind their employees that their surfing activities, along with their e-mails and company documents, will be recorded on the company server, itself subject to auditing and review whenever the company sees fit. Employees must be careful to practice image management, in order to ensure that contradictory evidence does not appear online when they call in sick to the office. Over time the dynamics of e-mail and Internet etiquette have changed in response to such developments. Those most aware of the distractive and professionally destructive features of downloading a funny or comedic e-mail attachment have come to adopt the acronym “NSFW” (Not Safe for Work). Even those of us who don’t worry about those things are well aware that the cache and “history” function of web browsers threaten to reveal the extent to which our time online is spent in unproductive ways. Many companies and public institutions, for example libraries, have taken things one step further by filtering out access to websites that may be peripheral to the primary work at hand.At the same time contemporary workplace settings have sought to mix both work and play, or better yet to use play in the service of work, to make “work” more enjoyable for its workers. Professional development seminars, team-building exercises, company softball games, or group outings are examples intended to build morale and loyalty to the company among workers. Some companies offer their employees access to gyms, to game rooms, and to big screen TVs, in return for long and arduous—indeed, punishing—hours of time at the office (Dyer-Witheford and Sherman; Ross). In this manner, acts of not working are reconfigured as a form of work, or at least as a productive experience for the company at large. Such perks are offered with an assumption of personal self-discipline, a feature of what Nippert-Eng characterises as the “discretionary workplace” (154). Of course, this also comes with an expectation that workers will stay close to the office, and to their work. As Sarah Sharma recently argued in this journal, such thinking is part of the way that late capitalism constructs “innovative ways to control people’s time and regulate their movement in space.” At the same time, however, there are plenty of moments of gentle resistance, in which the same machines of control and depersonalisation can be customised, and where individual expressions find their own platforms. A photo essay by Anna McCarthy in the Journal of Visual Culture records the inspirational messages and other personalised objects with which workers adorn their computers and work stations. McCarthy’s photographs represent the way people express themselves in relation to their work, making it a “place where workplace politics and power relations play out, often quite visibly” (McCarthy 214). Screen SecretsIf McCarthy’s photo essay illustrates the overt ways in which people bring personal expression or gentle resistance to anodyne workplaces, there are also a series of other ‘screen acts’ that create opportunities to waste time in ways that are disguised as work. During the Olympics and US college basketball playoffs, both American broadcast networks CBS and NBC offered a “boss button,” a graphic link that a user could immediately click “if the boss was coming by” that transformed the screen to something was associated with the culture of work, such as a spreadsheet. Other purveyors of networked time-wasting make use of the spreadsheet to mask distraction. The website cantyouseeimbored turns a spreadsheet into a game of “Breakout!” while other sites, like Spreadtweet, convert your Twitter updates into the form of a spreadsheet. Such boss buttons and screen interfaces that mimic work are the presentday avatars of the “panic button,” a graphic image found at the bottom of websites back in the days of Web 1.0. A click of the panic button transported users away from an offending website and towards something more legitimate, like Yahoo! Even if it is unlikely that boss keys actually convince one’s superiors that one is really working—clicking to a spreadsheet only makes sense for a worker who might be expected to be working on those kinds of documents—they are an index of how notions of personal space and privacy play out in the digitalised workplace. David Kiely, an employee at an Australian investment bank, experienced this first hand when he opened an e-mail attachment sent to him by his co-workers featuring a scantily-clad model (Cuneo and Barrett). Unfortunately for Kiely, at the time he opened the attachment his computer screen was visible in the background of a network television interview with another of the bank’s employees. Kiely’s inauspicious click (which made his the subject of an investigation by his employees) continues to circulate on the Internet, and it spawned a number of articles highlighting the precarious nature of work in a digitalised environment where what might seem to be private can suddenly become very public, and thus able to be disseminated without restraint. At the same time, the public appetite for Kiely’s story indicates that not working at work, and using the Internet to do it, represents a mode of media consumption that is familiar to many of us, even if it is only the servers on the company computer that can account for how much time we spend doing it. Community attitudes towards time spent unproductively online reminds us that waste carries with it a range of negative signifiers. We talk about wasting time in terms of theft, “stealing time,” or even more dramatically as “killing time.” The popular construction of television as the “boob tube” distinguishes it from more ‘productive’ activities, like spending time with family, or exercise, or involvement in one’s community. The message is simple: life is too short to be “wasted” on such ephemera. If this kind of language is less familiar in the digital age, the discourse of ‘distraction’ is more prevalent. Yet, instead of judging distraction a negative symptom of the digital age, perhaps we should reinterpret wasting time as the worker’s attempt to assert some agency in an increasingly controlled workplace. ReferencesBasso, Pietro. Modern Times, Ancient Hours: Working Lives in the Twenty-First Century. London: Verso, 2003. Bolter, Jay David, and Richard Grusin. Remediation: Understanding New Media. Cambridge: MIT Press, 2000.Bradley, Dale. “Dimensions Vary: Technology, Space, and Power in the 20th Century Office”. Topia 11 (2004): 67-82.Casciato, Paul. “Facebook and Other Social Media Cost UK Billions”. Washington Post, 5 Aug. 2010. 11 Aug. 2010 ‹http://www.washingtonpost.com/wp-dyn/content/article/2010/08/05/AR2010080503951.html›.Cuneo, Clementine, and David Barrett. “Was Banker Set Up Over Saucy Miranda”. The Daily Telegraph 4 Feb. 2010. 21 May 2010 ‹http://www.dailytelegraph.com.au/entertainment/sydney-confidential/was-banker-set-up-over-saucy-miranda/story-e6frewz0-1225826576571›.De Certeau, Michel. The Practice of Everyday Life. Vol. 1. Berkeley: U of California P. 1988.Dyer-Witheford, Nick, and Zena Sharman. "The Political Economy of Canada's Video and Computer Game Industry”. Canadian Journal of Communication 30.2 (2005). 1 May 2010 ‹http://www.cjc-online.ca/index.php/journal/article/view/1575/1728›.Friedmann, Georges. Industrial Society. Glencoe, Ill.: Free Press, 1955.Kracauer, Siegfried. The Salaried Masses. London: Verso, 1998.McCarthy, Anna. Ambient Television. Durham: Duke UP, 2001. ———. “Geekospheres: Visual Culture and Material Culture at Work”. Journal of Visual Culture 3 (2004): 213-21.Mills, C. Wright. White Collar. Oxford: Oxford UP, 1951. Murray, Nicholas. Kafka: A Biography. New Haven: Yale UP, 2004.Newman, Michael. “Ze Frank and the Poetics of Web Video”. First Monday 13.5 (2008). 1 Aug. 2010 ‹http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2102/1962›.Nippert-Eng, Christena. Home and Work: Negotiating Boundaries through Everyday Life. Chicago: U. of Chicago P, 1996.Power, Michael. The Audit Society. Oxford: Oxford UP, 1997. Ross, Andrew. No Collar: The Humane Workplace and Its Hidden Costs. Philadelphia: Temple UP, 2004. Sharma, Sarah. “The Great American Staycation and the Risk of Stillness”. M/C Journal 12.1 (2009). 11 May 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/viewArticle/122›. Straw, Will. “Embedded Memories”. Residual Media Ed. Charles Acland. U. of Minnesota P., 2007. 3-15.Whyte, William. The Organisation Man. New York: Simon and Schuster, 1957. Wagman, Ira. “Log On, Goof Off, Look Up: Facebook and the Rhythms of Canadian Internet Use”. How Canadians Communicate III: Contexts for Popular Culture. Eds. Bart Beaty, Derek, Gloria Filax Briton, and Rebecca Sullivan. Athabasca: Athabasca UP 2009. 55-77. ‹http://www2.carleton.ca/jc/ccms/wp-content/ccms-files/02_Beaty_et_al-How_Canadians_Communicate.pdf›Yates, JoAnne. “Business Use of Information Technology during the Industrial Age”. A Nation Transformed by Information. Eds. Alfred D. Chandler & James W. Cortada. Oxford: Oxford UP., 2000. 107-36.

APA, Harvard, Vancouver, ISO, and other styles

11

Toop, David. "Jammed in an Unknown Device." M/C Journal 9, no.6 (December1, 2006). http://dx.doi.org/10.5204/mcj.2678.

Full text

Abstract:

In 2005, in response to student interest and at the request of Cathy Lane, at that time course director of Sound Arts and Design at the London College of Communication, I began to run courses in improvisation for 2nd year undergraduates. The workshops are a core option for the BA, alongside other courses such as environmental sound recording, studio production and Max/MSP. In 2004 I had been awarded a three year practice based research fellowship by the AHRC (Arts and Humanities Research Council); my project was entitled Sound Body, an investigation into the impact of digital technology on improvised music performance and other forms of sonic art. For this reason, and because only a minority of Sound Arts and Design students perform on conventional musical instruments, the course was called Digital Improvisation. In practice, however, the sound sources used were a rich and sometimes comical mix of laptop computers, turntables, homemade analogue electronic devices, power drills, electronic keyboards and sampling devices, and even an acoustic violin, though this was processed through another student’s equipment. Responding to the unpredictability of the mix, I called the group Unknown Devices, though within the college it is known more generically as the Laptop Orchestra. The digital improvisation workshop has three main aims: To encourage an awareness and understanding of musical, interpersonal and technical issues involved in sonic improvisation. To nurture confidence and sensitivity in the playing of improvised music. To develop a practical and professional approach to performing group improvisation. The sessions are held over six consecutive weeks and each may last from 90 minutes to 3 hours. Punctuality is stressed, partly to prepare those students who are unfamiliar with the practicalities of public performance, and partly to minimise the period of setting up that begins each class. The first session is devoted to a discussion in which students give their views on improvised music: what is it, how does it work, how does it relate to other forms of improvisation in the arts, and how might it connect with the improvisation of daily life? Many students begin with very limited ideas about improvisation. Some think of it as an excuse for ‘jamming’, which may seem an easy option for a Monday afternoon. For most of them this has connotations, either positive or negative depending on the student, of a self-indulgent free-for-all, an emotional outlet with little discipline and few boundaries. In order to refine these ideas, we begin to explore some of the hidden rules of improvisation, such as the necessity for restraint, collective discipline, self-control, self-criticism, close listening, dynamic group analysis, and a willingness to balance personal aims, desires and skills (or the lack of them) with the needs of the group. Though discussed from the outset, the concept of jamming remains as a grey eminence throughout. For some students it is hard to dislodge this approach, and equally hard for me, as the director of each session, to open up a path through which they can interact in more specific and considered ways. What is jamming, the question is asked, and the answer is that jamming is associated predominantly with a known form, the participants play in order to exercise their skill, even to the point of competitiveness, but also for the pleasure of interaction without the need for perfection. Perhaps this is why recorded jam sessions can be disappointing. Two examples from my own record collection – Charlie Christian experimenting with the new bebop at Minton’s Playhouse, and John McLaughlin with Jimi Hendrix – are both interesting as historic documents but pale beside the more finished work of all these artists. Improvisation demands a closer awareness of the group. During the first session, we consider some of the qualities that are needed to create improvisations that are satisfying both for the participant and for the listener. Students are given a worksheet, drawn from my own experience as an improviser, which lists examples of these qualities. From a list of 38, this is a selection: The urge to play. An aptitude for reacting quickly to unexpected, sometimes unwelcome developments. Being able to produce ideas and techniques that allow a variety of responses, both to individuals, and to the overall group sound. A sense of form. An acute awareness of time. The ability to identify the nature of a sound and produce an engaging response (this means being able to work with pitch relationships, rhythmic elements, or the complexity of individual sounds). Silence and stillness. A knowledge of your instrument, and confidence in using it. Patience. The ability to think and act at microscopic and macroscopic levels simultaneously. Experience in scanning and evaluating complex situations from moment to moment, yet maintaining personal focus. Tolerance. The strength to fight for space. The ability to turn any of the above qualities on their head. The strength to be quiet. Exercises in playing, listening, and mutual criticism are used to develop these qualities during the course of the six weeks. The class may be divided into two sections. One group performs an exercise; the other group listens and then gives a critique of the performance based on its success in achieving its aims. The worksheet includes observations which are analysed either in specific points of development during a class, or applied throughout the six sessions. From a list of 32, here are 6 examples: Learn to maintain intensity, concentration, and relaxation simultaneously. Consider the layout and appearance of whatever you’re playing. Is it set up so that you’re going to trip over a cable, or so that you can’t reach something quickly? Does it look like a pile of junk to the audience? Is that the effect you want to achieve? Are you invisible to the audience? Do you want that? Learn how to change a situation when it’s stuck. Learn how to be supportive, and how to be disruptive. Don’t try to be liked: don’t go out of your way to be disliked. Don’t be afraid to stay in one spot; don’t be afraid to move on. Some students have professional experience of performing and highly developed instrumental abilities. Others may have no experience of making live music or using any kind of instrument. Conflicts can arise in situations in which one person’s confidence may be excessive, their self-absorption effectively preventing them from listening or responding to the group, whereas another person may be so timid that their ability to participate is seriously impaired. Musical and aesthetic tastes and theories are also an issue, and clashes between incompatible styles are common. Such tensions may tap into conflicts and alliances that already exist at an interpersonal level, so a part of the development of the group will inevitably require a willingness to compromise and negotiate, and to find ways of resolving conflict through musical cooperation. I give them practical exercises during each class and certain of these exercises will be revisited over the 6 week period as a measure of progress. Four examples from the worksheet are given below: STILL: The group sits very quietly, listening to the sound of the room, identifying each component of the sound and placing it within the space. Each player is allowed one short contribution, which can be made after the stillness and the room sound has affected their ideas about what they might play. After making the one contribution, the player then sits quietly again. The piece ends when everybody has made their contribution. COMMUNITIES: The large group splits into three or four smaller groups. One group begins an improvisation; after five minutes, the second group joins in. The first group stops playing after a minute of overlap. Then the third group joins in after another five minutes, and the second group stops after a minute’s overlap. COMMUNITIES II: In a second version of this strategy, the groups decide when to make their own entries and exits. All groups may play at the same time, or stop at the same time, but they must stay aware of their role as a group within a group. Each group must find ways of starting together, and finishing together, without any verbal communication. CRESCENDO: beginning by listening closely to the room, the group moves from silence to loud noise at a similar pace, taking a few minutes to do so and adjusting volume to match volume levels as closely as possible. Everybody attempts to stop at the same time. DIMINUENDO: the group moves from loud noise down to silence over a three minute period, trying to match volume levels as closely as possible. At the end of the 6 week period, the group gives a public performance. This impending exposure to an audience is an important goal – a test of how far they have come and an incentive to resolve technical problems, focus on learning during each session, set aside conflicts, and even begin to self-organise. At the beginning of the course they are highly critical of their own capacity to work together as a group, and in some cases sceptical of the whole idea of improvisation. In all examples of the Orchestra giving a public performance, although individuals have expressed disappointment that certain pieces could have been played better, the overall feeling is a sense of pleasurable surprise that such a disparate group of people can avoid chaos or collapse to produce a sustained performance which gives them personal satisfaction, both as a participatory and listening experience. Citation reference for this article MLA Style Toop, David. "Jammed in an Unknown Device." M/C Journal 9.6 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0612/01-toop.php>. APA Style Toop, D. (Dec. 2006) "Jammed in an Unknown Device," M/C Journal, 9(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0612/01-toop.php>.

APA, Harvard, Vancouver, ISO, and other styles

12

Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail." M/C Journal 10, no.4 (August1, 2007). http://dx.doi.org/10.5204/mcj.2696.

Full text

Abstract:

Introduction It has frequently been noted that ICTs and social networking applications have blurred the once-clear boundary between work, leisure and entertainment, just as they have collapsed the distinction between public and private space. While each individual has a sense of what “home” means, both in terms of personal experience and more conceptually, the following three examples of online interaction (based on participants’ interest, or involvement, in activities traditionally associated with the home: pet care, craft and cooking) suggest that the utilisation of online communication technologies can lead to refined and extended definitions of what “home” is. These examples show how online communication can assist in meeting the basic human needs for love, companionship, shelter and food – needs traditionally supplied by the home environment. They also provide individuals with a considerably expanded range of opportunities for personal expression and emotional connection, as well as creative and commercial production, than that provided by the purely physical (and, no doubt, sometimes isolated and isolating) domestic environment. In this way, these case studies demonstrate the interplay and melding of physical and virtual “home” as domestic practices leach from the most private spaces of the physical home into the public space of the Internet (for discussion, see Gorman-Murray, Moss, and Rose). At the same time, online interaction can assert an influence on activity within the physical space of the home, through the sharing of advice about, and modeling of, domestic practices and processes. A Dog’s (Virtual) Life The first case study primarily explores the role of online communities in the formation and expression of affective values and personal identity – as traditionally happens in the domestic environment. Garber described the 1990s as “the decade of the dog” (20), citing a spate of “new anthropomorphic” (22) dog books, Internet “dog chat” sites, remakes of popular classics such as Lassie Come Home, dog friendly urban amenities, and the meteoric rise of services for pampered pets (28-9). Loving pets has become a lifestyle and culture, witnessed and commodified in Pet Superstores as well as in dog collectables and antiques boutiques, and in publications like The Bark (“the New Yorker of Dog Magazines”) and Clean Run, the international agility magazine, Website, online book store and information gateway for agility products and services. Available online resources for dog lovers have similarly increased rapidly during the decade since Garber’s book was published, with the virtual world now catering for serious hobby trainers, exhibitors and professionals as well as the home-based pet lover. At a recent survey, Yahoo Groups – a personal communication portal that facilitates social networking, in this case enabling users to set up electronic mailing lists and Internet forums – boasted just over 9,600 groups servicing dog fanciers and enthusiasts. The list Dogtalk is now an announcement only mailing list, but was a vigorous discussion forum until mid-2006. Members of Dogtalk were Australian-based “clicker-trainers”, serious hobbyist dog trainers, many of whom operated micro-businesses providing dog training or other pet-related services. They shared an online community, but could also engage in “flesh-meets” at seminars, conferences and competitive dog sport meets. An author of this paper (Rutherford) joined this group two years ago because of her interest in clicker training. Clicker training is based on an application of animal learning theory, particularly psychologist E. F. Skinner’s operant conditioning, so called because of the trademark use of a distinctive “click” sound to mark a desired behaviour that is then rewarded. Clicker trainers tend to dismiss anthropomorphic pack theory that positions the human animal as fundamentally opposed to non-human animals and, thus, foster a partnership (rather than a dominator) mode of social and learning relationships. Partnership and nurturance are common themes within the clicker community (as well as in more traditional “home” locations); as is recognising and valuing the specific otherness of other species. Typically, members regard their pets as affective equals or near-equals to the human animals that are recognised members of their kinship networks. A significant function of the episodic biographical narratives and responses posted to this list was thus to affirm and legitimate this intra-specific kinship as part of normative social relationship – a perspective that is not usually validated in the general population. One of the more interesting nexus that evolved within Dogtalk links the narrativisation of the pet in the domestic sphere with the pictorial genre of the family album. Emergent technologies, such as digital cameras together with Web-based image manipulation software and hosting (as provided by portals like Photobucket and Flickr ) democratise high quality image creation and facilitate the sharing of these images. Increasingly, the Dogtalk list linked to images uploaded to free online galleries, discussed digital image composition and aesthetics, and shared technical information about cameras and online image distribution. Much of this cultural production and circulation was concerned with digitally inscribing particular relationships with individual animals into cultural memory: a form of family group biography (for a discussion of the family photograph as a display of extended domestic space, see Rose). The other major non-training thread of the community involves the sharing and witnessing of the trauma suffered due to the illness and loss of pets. While mourning for human family members is supported in the off-line world – with social infrastructure, such as compassionate leave and/or bereavement counselling, part of professional entitlements – public mourning for pets is not similarly supported. Yet, both cultural studies (in its emphasis on cultural memory) and trauma theory have highlighted the importance of social witnessing, whereby traumatic memories must be narratively integrated into memory and legitimised by the presence of a witness in order to loosen their debilitating hold (Felman and Laub 57). Postings on the progress of a beloved animal’s illness or other misfortune and death were thus witnessed and affirmed by other Dogtalk list members – the sick or deceased pet becoming, in the process, a feature of community memory, not simply an individual loss. In terms of such biographical narratives, memory and history are not identical: “Any memories capable of being formed, retained or articulated by an individual are always a function of socially constituted forms, narratives and relations … Memory is always subject to active social manipulation and revision” (Halbwachs qtd. in Crewe 75). In this way, emergent technologies and social software provide sites, akin to that of physical homes, for family members to process individual memories into cultural memory. Dogzonline, the Australian Gateway site for purebred dog enthusiasts, has a forum entitled “Rainbow Bridge” devoted to textual and pictorial memorialisation of deceased pet dogs. Dogster hosts the For the Love of Dogs Weblog, in which images and tributes can be posted, and also provides links to other dog oriented Weblogs and Websites. An interesting combination of both therapeutic narrative and the commodification of affect is found in Lightning Strike Pet Loss Support which, while a memorial and support site, also provides links to the emerging profession of pet bereavement counselling and to suppliers of monuments and tributary urns for home or other use. loobylu and Narratives of Everyday Life The second case study focuses on online interactions between craft enthusiasts who are committed to the production of distinctive objects to decorate and provide comfort in the home, often using traditional methods. In the case of some popular craft Weblogs, online conversations about craft are interspersed with, or become secondary to, the narration of details of family life, the exploration of important life events or the recording of personal histories. As in the previous examples, the offering of advice and encouragement, and expressions of empathy and support, often characterise these interactions. The loobylu Weblog was launched in 2001 by illustrator and domestic crafts enthusiast Claire Robertson. Robertson is a toy maker and illustrator based in Melbourne, Australia, whose clients have included prominent publishing houses, magazines and the New York Public Library (Robertson “Recent Client List” online). She has achieved a measure of public recognition: her loobylu Weblog has won awards and been favourably commented upon in the Australian press (see Robertson “Press for loobylu” online). In 2005, an article in The Age placed Robertson in the context of a contemporary “craft revolution”, reporting her view that this “revolution” is in “reaction to mass consumerism” (Atkinson online). The hand-made craft objects featured in Robertson’s Weblogs certainly do suggest engagement with labour-intensive pursuits and the construction of unique objects that reject processes of mass production and consumption. In this context, loobylu is a vehicle for the display and promotion of Robertson’s work as an illustrator and as a craft practitioner. While skills-based, it also, however, promotes a family-centred lifestyle; it advocates the construction by hand of objects designed to enhance the appearance of the family home and the comfort of its inhabitants. Its specific subject matter extends to related aspects of home and family as, in addition to instructions, ideas and patterns for craft, the Weblog features information on commercially available products for home and family, recipes, child rearing advice and links to 27 other craft and other sites (including Nigella Lawson’s, discussed below). The primary member of its target community is clearly the traditional homemaker – the mother – as well as those who may aspire to this role. Robertson does not have the “celebrity” status of Lawson and Jamie Oliver (discussed below), nor has she achieved their market saturation. Indeed, Robertson’s online presence suggests a modest level of engagement that is placed firmly behind other commitments: in February 2007, she announced an indefinite suspension of her blog postings so that she could spend more time with her family (Robertson loobylu 17 February 2007). Yet, like Lawson and Oliver, Robertson has exploited forms of domestic competence traditionally associated with women and the home, and the non-traditional medium of the Internet has been central to her endeavours. The content of the loobylu blog is, unsurprisingly, embedded in, or an accessory to, a unifying running commentary on Robertson’s domestic life as a parent. Miles, who has described Weblogs as “distributed documentaries of the everyday” (66) sums this up neatly: “the weblogs’ governing discursive quality is the manner in which it is embodied within the life world of its author” (67). Landmark family events are narrated on loobylu and some attract deluges of responses: the 19 June 2006 posting announcing the birth of Robertson’s daughter Lily, for example, drew 478 responses; five days later, one describing the difficult circ*mstances of her birth drew 232 comments. All of these comments are pithy, with many being simple empathetic expressions or brief autobiographically based commentaries on these events. Robertson’s news of her temporary retirement from her blog elicited 176 comments that both supported her decision and also expressed a sense of loss. Frequent exclamation marks attest visually to the emotional intensity of the responses. By narrating aspects of major life events to which the target audience can relate, the postings represent a form of affective mass production and consumption: they are triggers for a collective outpouring of largely hom*ogeneous emotional reaction (joy, in the case of Lily’s birth). As collections of texts, they can be read as auto/biographic records, arranged thematically, that operate at both the individual and the community levels. Readers of the family narratives and the affirming responses to them engage in a form of mass affirmation and consumerism of domestic experience that is easy, immediate, attractive and free of charge. These personal discourses blend fluidly with those of a commercial nature. Some three weeks after loobylu announced the birth of her daughter, Robertson shared on her Weblog news of her mastitis, Lily’s first smile and the family’s favourite television programs at the time, information that many of us would consider to be quite private details of family life. Three days later, she posted a photograph of a sleeping baby with a caption that skilfully (and negatively) links it to her daughter: “Firstly – I should mention that this is not a photo of Lily”. The accompanying text points out that it is a photo of a baby with the “Zaky Infant Sleeping Pillow” and provides a link to the online pregnancystore.com, from which it can be purchased. A quotation from the manufacturer describing the merits of the pillow follows. Robertson then makes a light-hearted comment on her experiences of baby-induced sleep-deprivation, and the possible consequences of possessing the pillow. Comments from readers also similarly alternate between the personal (sharing of experiences) to the commercial (comments on the product itself). One offshoot of loobylu suggests that the original community grew to an extent that it could support specialised groups within its boundaries. A Month of Softies began in November 2004, describing itself as “a group craft project which takes place every month” and an activity that “might give you a sense of community and kinship with other similar minded crafty types across the Internet and around the world” (Robertson A Month of Softies online). Robertson gave each month a particular theme, and readers were invited to upload a photograph of a craft object they had made that fitted the theme, with a caption. These were then included in the site’s gallery, in the order in which they were received. Added to the majority of captions was also a link to the site (often a business) of the creator of the object; another linking of the personal and the commercial in the home-based “cottage industry” sense. From July 2005, A Month of Softies operated through a Flickr site. Participants continued to submit photos of their craft objects (with captions), but also had access to a group photograph pool and public discussion board. This extension simulates (albeit in an entirely visual way) the often home-based physical meetings of craft enthusiasts that in contemporary Australia take the form of knitting, quilting, weaving or other groups. Chatting with, and about, Celebrity Chefs The previous studies have shown how the Internet has broken down many barriers between what could be understood as the separate spheres of emotional (that is, home-based private) and commercial (public) life. The online environment similarly enables the formation and development of fan communities by facilitating communication between those fans and, sometimes, between fans and the objects of their admiration. The term “fan” is used here in the broadest sense, referring to “a person with enduring involvement with some subject or object, often a celebrity, a sport, TV show, etc.” (Thorne and Bruner 52) rather than focusing on the more obsessive and, indeed, more “fanatical” aspects of such involvement, behaviour which is, increasingly understood as a subculture of more variously constituted fandoms (Jenson 9-29). Our specific interest in fandom in relation to this discussion is how, while marketers and consumer behaviourists study online fan communities for clues on how to more successfully market consumer goods and services to these groups (see, for example, Kozinets, “I Want to Believe” 470-5; “Utopian Enterprise” 67-88; Algesheimer et al. 19-34), fans regularly subvert the efforts of those urging consumer consumption to utilise even the most profit-driven Websites for non-commercial home-based and personal activities. While it is obvious that celebrities use the media to promote themselves, a number of contemporary celebrity chefs employ the media to construct and market widely recognisable personas based on their own, often domestically based, life stories. As examples, Jamie Oliver and Nigella Lawson’s printed books and mass periodical articles, television series and other performances across a range of media continuously draw on, elaborate upon, and ultimately construct their own lives as the major theme of these works. In this, these – as many other – celebrity chefs draw upon this revelation of their private lives to lend authenticity to their cooking, to the point where their work (whether cookbook, television show, advertisem*nt or live chat room session with their fans) could be described as “memoir-illustrated-with-recipes” (Brien and Williamson). This generic tendency influences these celebrities’ communities, to the point where a number of Websites devoted to marketing celebrity chefs as product brands also enable their fans to share their own life stories with large readerships. Oliver and Lawson’s official Websites confirm the privileging of autobiographical and biographical information, but vary in tone and approach. Each is, for instance, deliberately gendered (see Hollows’ articles for a rich exploration of gender, Oliver and Lawson). Oliver’s hip, boyish, friendly, almost frantic site includes the what are purported-to-be self-revelatory “Diary” and “About me” sections, a selection of captioned photographs of the chef, his family, friends, co-workers and sponsors, and his Weblog as well as footage streamed “live from Jamie’s phone”. This self-revelation – which includes significant details about Oliver’s childhood and his domestic life with his “lovely girls, Jools [wife Juliette Norton], Poppy and Daisy” – completely blurs the line between private life and the “Jamie Oliver” brand. While such revelation has been normalised in contemporary culture, this practice stands in great contrast to that of renowned chefs and food writers such as Elizabeth David, Julia Child, James Beard and Margaret Fulton, whose work across various media has largely concentrated on food, cooking and writing about cooking. The difference here is because Oliver’s (supposedly private) life is the brand, used to sell “Jamie Oliver restaurant owner and chef”, “Jamie Oliver cookbook author and TV star”, “Jamie Oliver advertising spokesperson for Sainsbury’s supermarket” (from which he earns an estimated £1.2 million annually) (Meller online) and “Jamie Oliver social activist” (made MBE in 2003 after his first Fifteen restaurant initiative, Oliver was named “Most inspiring political figure” in the 2006 Channel 4 Political Awards for his intervention into the provision of nutritious British school lunches) (see biographies by Hildred and Ewbank, and Smith). Lawson’s site has a more refined, feminine appearance and layout and is more mature in presentation and tone, featuring updates on her (private and public) “News” and forthcoming public appearances, a glamorous selection of photographs of herself from the past 20 years, and a series of print and audio interviews. Although Lawson’s children have featured in some of her television programs and her personal misfortunes are well known and regularly commented upon by both herself and journalists (her mother, sister and husband died of cancer) discussions of these tragedies, and other widely known aspects of her private life such as her second marriage to advertising mogul Charles Saatchi, is not as overt as on Oliver’s site, and the user must delve to find it. The use of Lawson’s personal memoir, as sales tool, is thus both present and controlled. This is in keeping with Lawson’s professional experience prior to becoming the “domestic goddess” (Lawson 2000) as an Oxford graduated journalist on the Spectator and deputy literary editor of the Sunday Times. Both Lawson’s and Oliver’s Websites offer readers various ways to interact with them “personally”. Visitors to Oliver’s site can ask him questions and can access a frequently asked question area, while Lawson holds (once monthly, now irregularly) a question and answer forum. In contrast to this information about, and access to, Oliver and Lawson’s lives, neither of their Websites includes many recipes or other food and cooking focussed information – although there is detailed information profiling their significant number of bestselling cookbooks (Oliver has published 8 cookbooks since 1998, Lawson 5 since 1999), DVDs and videos of their television series and one-off programs, and their name branded product lines of domestic kitchenware (Oliver and Lawson) and foodstuffs (Oliver). Instruction on how to purchase these items is also featured. Both these sites, like Robertson’s, provide various online discussion fora, allowing members to comment upon these chefs’ lives and work, and also to connect with each other through posted texts and images. Oliver’s discussion forum section notes “this is the place for you all to chat to each other, exchange recipe ideas and maybe even help each other out with any problems you might have in the kitchen area”. Lawson’s front page listing states: “You will also find a moderated discussion forum, called Your Page, where our registered members can swap ideas and interact with each other”. The community participants around these celebrity chefs can be, as is the case with loobylu, divided into two groups. The first is “foodie (in Robertson’s case, craft) fans” who appear to largely engage with these Websites to gain, and to share, food, cooking and craft-related information. Such fans on Oliver and Lawson’s discussion lists most frequently discuss these chefs’ television programs and books and the recipes presented therein. They test recipes at home and discuss the results achieved, any problems encountered and possible changes. They also post queries and share information about other recipes, ingredients, utensils, techniques, menus and a wide range of food and cookery-related matters. The second group consists of “celebrity fans” who are attracted to the chefs (as to Robertson as craft maker) as personalities. These fans seek and share biographical information about Oliver and Lawson, their activities and their families. These two areas of fan interest (food/cooking/craft and the personal) are not necessarily or always separated, and individuals can be active members of both types of fandoms. Less foodie-orientated users, however (like users of Dogtalk and loobylu), also frequently post their own auto/biographical narratives to these lists. These narratives, albeit often fragmented, may begin with recipes and cooking queries or issues, but veer off into personal stories that possess only minimal or no relationship to culinary matters. These members also return to the boards to discuss their own revealed life stories with others who have commented on these narratives. Although research into this aspect is in its early stages, it appears that the amount of public personal revelation either encouraged, or allowed, is in direct proportion to the “open” friendliness of these sites. More thus are located in Oliver’s and less in Lawson’s, and – as a kind of “control” in this case study, but not otherwise discussed – none in that of Australian chef Neil Perry, whose coolly sophisticated Website perfectly complements Perry’s professional persona as the epitome of the refined, sophisticated and, importantly in this case, unapproachable, high-end restaurant chef. Moreover, non-cuisine related postings are made despite clear directions to the contrary – Lawson’s site stating: “We ask that postings are restricted to topics relating to food, cooking, the kitchen and, of course, Nigella!” and Oliver making the plea, noted above, for participants to keep their discussions “in the kitchen area”. Of course, all such contemporary celebrity chefs are supported by teams of media specialists who selectively construct the lives that these celebrities share with the public and the postings about others’ lives that are allowed to remain on their discussion lists. The intersection of the findings reported above with the earlier case studies suggests, however, that even these most commercially-oriented sites can provide a fruitful data regarding their function as home-like spaces where domestic practices and processes can be refined, and emotional relationships formed and fostered. In Summary As convergence results in what Turow and Kavanaugh call “the wired homestead”, our case studies show that physically home-based domestic interests and practices – what could be called “home truths” – are also contributing to a refiguration of the private/public interplay of domestic activities through online dialogue. In the case of Dogtalk, domestic space is reconstituted through virtual spaces to include new definitions of family and memory. In the case of loobylu, the virtual interaction facilitates a development of craft-based domestic practices within the physical space of the home, thus transforming domestic routines. Jamie Oliver’s and Nigella Lawson’s sites facilitate development of both skills and gendered identities by means of a bi-directional nexus between domestic practices, sites of home labour/identity production and public media spaces. As participants modify and redefine these online communities to best suit their own needs and desires, even if this is contrary to the stated purposes for which the community was instituted, online communities can be seen to be domesticated, but, equally, these modifications demonstrate that the activities and relationships that have traditionally defined the home are not limited to the physical space of the house. While virtual communities are “passage points for collections of common beliefs and practices that united people who were physically separated” (Stone qtd in Jones 19), these interactions can lead to shared beliefs, for example, through advice about pet-keeping, craft and cooking, that can significantly modify practices and routines in the physical home. Acknowledgments An earlier version of this paper was presented at the Association of Internet Researchers’ International Conference, Brisbane, 27-30 September 2006. The authors would like to thank the referees of this article for their comments and input. Any errors are, of course, our own. References Algesheimer, R., U. Dholake, and A. Herrmann. “The Social Influence of Brand Community: Evidence from European Car Clubs”. Journal of Marketing 69 (2005): 19-34. Atkinson, Frances. “A New World of Craft”. The Age (11 July 2005). 28 May 2007 http://www.theage.com.au/articles/2005/07/10/1120934123262.html>. Brien, Donna Lee, and Rosemary Williamson. “‘Angels of the Home’ in Cyberspace: New Technologies and Biographies of Domestic Production”. Paper. Biography and New Technologies conference. Humanities Research Centre, Australian National University, Canberra, ACT. 12-14 Sep. 2006. Crewe, Jonathan. “Recalling Adamastor: Literature as Cultural Memory in ‘White’ South Africa”. In Acts of Memory: Cultural Recall in the Present, eds. Mieke Bal, Jonathan Crewe, and Leo Spitzer. Hanover, NH: Dartmouth College, 1999. 75-86. Felman, Shoshana, and Dori Laub. Testimony: Crises of Witnessing in Literature, Psychoanalysis, and History. New York: Routledge, 1992. Garber, Marjorie. Dog Love. New York: Touchstone/Simon and Schuster, 1996. Gorman-Murray, Andrew. “Homeboys: Uses of Home by Gay Australian Men”. Social and Cultural Geography 7.1 (2006): 53-69. Halbwachs, Maurice. On Collective Memory. Trans. Lewis A. Closer. Chicago: U of Chicago P, 1992. Hildred, Stafford, and Tim Ewbank. Jamie Oliver: The Biography. London: Blake, 2001. Hollows, Joanne. “Feeling like a Domestic Goddess: Post-Feminism and Cooking.” European Journal of Cultural Studies 6.2 (2003): 179-202. ———. “Oliver’s Twist: Leisure, Labour and Domestic Masculinity in The Naked Chef.” International Journal of Cultural Studies 6.2 (2003): 229-248. Jenson, J. “Fandom as Pathology: The Consequences of Characterization”. The Adoring Audience; Fan Culture and Popular Media. Ed. L. A. Lewis. New York, NY: Routledge, 1992. 9-29. Jones, Steven G., ed. Cybersociety, Computer-Mediated Communication and Community. Thousand Oaks, CA: Sage, 1995. Kozinets, R.V. “‘I Want to Believe’: A Netnography of the X’Philes’ Subculture of Consumption”. Advances in Consumer Research 34 (1997): 470-5. ———. “Utopian Enterprise: Articulating the Meanings of Star Trek’s Culture of Consumption.” Journal of Consumer Research 28 (2001): 67-88. Lawson, Nigella. How to Be a Domestic Goddess: Baking and the Art of Comfort Cooking. London: Chatto and Windus, 2000. Meller, Henry. “Jamie’s Tips Spark Asparagus Shortages”. Daily Mail (17 June 2005). 21 Aug. 2007 http://www.dailymail.co.uk/pages/live/articles/health/dietfitness.html? in_article_id=352584&in_page_id=1798>. Miles, Adrian. “Weblogs: Distributed Documentaries of the Everyday.” Metro 143: 66-70. Moss, Pamela. “Negotiating Space in Home Environments: Older Women Living with Arthritis.” Social Science and Medicine 45.1 (1997): 23-33. Robertson, Claire. Claire Robertson Illustration. 2000-2004. 28 May 2007 . Robertson, Claire. loobylu. 16 Feb. 2007. 28 May 2007 http://www.loobylu.com>. Robertson, Claire. “Press for loobylu.” Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/press.html>. Robertson, Claire. A Month of Softies. 28 May 2007. 21 Aug. 2007 . Robertson, Claire. “Recent Client List”. Claire Robertson Illustration. 2000-2004. 28 May 2007 http://www.clairetown.com/clients.html>. Rose, Gillian. “Family Photographs and Domestic Spacings: A Case Study.” Transactions of the Institute of British Geographers NS 28.1 (2003): 5-18. Smith, Gilly. Jamie Oliver: Turning Up the Heat. Sydney: Macmillian, 2006. Thorne, Scott, and Gordon C. Bruner. “An Exploratory Investigation of the Characteristics of Consumer Fanaticism.” Qualitative Market Research: An International Journal 9.1 (2006): 51-72. Turow, Joseph, and Andrea Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, MA: MIT Press, 2003. Citation reference for this article MLA Style Brien, Donna Lee, Leonie Rutherford, and Rosemary Williamson. "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/10-brien.php>. APA Style Brien, D., L. Rutherford, and R. Williamson. (Aug. 2007) "Hearth and Hotmail: The Domestic Sphere as Commodity and Community in Cyberspace," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/10-brien.php>.

APA, Harvard, Vancouver, ISO, and other styles

13

Bruns, Axel. "Archiving the Ephemeral." M/C Journal 1, no.2 (August1, 1998). http://dx.doi.org/10.5204/mcj.1708.

Full text

Abstract:

They may have been obscured by the popular media's fascination with the World Wide Web, but for many Net users, Usenet newsgroups still constitute an equally important interactive tool. While Web pages present relatively static information that can be structured through hypertext links and searched using Yahoo! and similar services, newsgroups are fora for open, interactive discussion on virtually any conceivable subject, amongst participants from around the world -- more than any other part of the Net, they are instrumental in the formation of virtual communities by allowing like-minded individuals to get together, exchange their opinions, and organise themselves. Having emerged from email mailing-lists, newsgroups are among the oldest uses of computer networks for communication; based around a simple exchange of all new postings among the participants, they offer few of the comforts of more modern technologies, and so it is not surprising that a number of services have begun to provide powerful Web interfaces for newsgroup access. One of the oldest and most reknowned amongst these sites is Deja News. Since its launch in May 1995, Deja News has expanded to cover around 50,000 different newsgroups, which are contained in a memory archive that is several hundred gigabytes in size, according to some reports (Woods, n.pag.); the company itself boasts accesses by more than three million users each month to the hundreds of millions of articles it has archived ("Company Background", n. pag.). What makes Deja News attractive to so many users are the many search options the service has added to its newsgroups interface. Deja News visitors can search for any article subjects, keywords, newsgroups, or participants' names they are interested in: if you're looking for the absolutely latest on the White House sex scandal, search for "Clinton + Lewinski" and limit your search to articles posted in the last few days or hours; if you want to know what newsgroups your co-worker is writing to in her lunch break, simply ask Deja News to find all postings by "Annabel Smith". If you can't quite remember the address for the latest Internet camera site, Deja News will. To put such powerful research capabilities at the fingertips of any Web user raises any number of legal as well as ethical questions, however. To begin with, does Deja News even have the right to archive anyone's and everyone's postings to newsgroups? The simple fact that users' articles are posted openly, for all newsgroup participants to see, does not necessarily automatically imply that the article may be made available to a greater public elsewhere -- by analogy, if you have a casual conversation with a group of people, you aren't usually expecting to see your words in the history books the next day (but analogies between the Internet and 'real life' are always dangerous). Unless you spoke to someone with a photographic memory, you can usually rely on them gradually forgetting what you said, even if you made a fool out of yourself -- that's human. Appearing as the result of a Deja News search, articles lose their original context -- the newsgroup discussion they were part of -- and are given an entirely different one, a context in which by virtue of being so presented they may gain new and potentially questionable authority. As is so often the case for information on Websites, the information in articles which can thus be found through services like Deja News cannot easily be verified or disproven; due to the loss of context, researchers cannot even gain a feel for a writer's trustworthiness in the same way that seasoned newsgroup members can. Neither may they always detect intentional irony and humour: playful exaggeration may easily appear as deliberate misinformation, friendly oneupmanship as an angry attack. The results of author-based searches may be even more potentially damaging, however. Deja News offers various mechanisms that can include searches restricted to the articles written by a particular user, culminating in the 'author profile' that can be used to list all posts ever made by a particular user. One does not need to be paranoid to imagine ways in which such a powerful research tool may be abused -- perhaps even (and most easily) by the Deja News company itself: since, following general Web etiquette, access to the service is free for normal users, Deja News relies on other avenues of income, and doubtlessly it would be tempting to sell the rights to exploit the Deja News database to professional spammers (Internet junk mailers). These could then aim their advertising emails directly towards the most promising target audience -- those who have in their newsgroups postings shown the most interest in a particular product or service. Indeed, Deja News notes, somewhat vaguely, that it "can provide efficient and effective Internet-based marketing for various types of online marketing goals, such as testing messages, building brand awareness, increasing Website traffic or generating leads" ("Company Background", n. pag.). While such uninvited advertising may be annoying to unsuspecting Internet users, more damaging and mean-spirited uses of the 'author profile' can also be imagined easily. What if your prospective new employer finds the comments you made about the company in a newsgroup article last year? What if they check your author profile for your attitude to drugs (did you ever write an article in rec.drugs.cannabis) or your sexual orientation (any posts to alt.sex.hom*osexual)? What if some extremist group targets you over your support for multiculturalism? Thanks to Deja News and similar services, anything you've ever said may be used against you. The virtual walls of cyberspace have ears, come with a perfect memory, and are prepared to share their knowledge with anyone. A valid line of argument against such criticism notes that we are all responsible for our own actions: newsgroups are, after all, public discussion fora that are open to all participants -- if you make a controversial statement in such a place, you must be prepared to suffer the consequences. However, the threat of being taken out of context must once more be emphasised at this point: while the articles that can be found through Deja News appear to accurately reflect their writers' views, the background against which such views were expressed is much more difficult to extract. Furthermore, only very few newsgroup participants will be aware that their postings are continually being archived, since newsgroups generally appear as a fairly ephemeral medium: only the last few days or, at most, weeks of newsgroup traffic are usually stored on news servers. An awareness of being archived would help writers protect themselves -- it may also serve to impoverish newsgroup discussion, however. Even more importantly, the already-digital, computer-mediated nature of newsgroup discussions has far-reaching implications. Dealing with units of data that come in a handy, easily stored format, services like Deja News tend to archive Usenet newsgroups interminably -- your first flames as a 'clueless newbie', years ago, may therefore today still be used to embarass you. This is the most important new development: analogue, organic, human memory eventually fades; we tend to organise our memories, and remember those things we regard as most important, while others gradually vanish. Many modern legal systems reflect this process by gradually deleting minor and even major offences from a citizen's criminal records -- they forgive as they forget. Other than in cases of extreme Alzheimer's brought about by server crashes and hard disk defects, digital memory, on the other hand, is perfect for unlimited periods of time: once entered into a database, newsgroup articles may be stored forever; ephemeral discussions become matters of permanent record. The computer doesn't forget. While its many Internet accolades bear witness to the benefits users have found in Deja News, the ethical questions the service raises have hardly been addressed so far, least of all on the Deja News Website itself. While apparently the inclusion of a header line "X-noarchive: yes" may prevent articles from being archived by Deja News, this isn't advertised anywhere; neither are there any statements justifying the unauthorised archiving of newsgroups, or any easily accessible mechanisms for users to have their own articles deleted from the archives. As has often been the case on the Internet, a private organisation has therefore become a semi-official institution, simply by virtue of having thought of an idea first; ethics and laws are left behind by technological development, and find that they have some catching-up to do. Of course, none of this should be seen as condemning Deja News as a malevolent organisation out to spy on Internet participants -- in fact, the company so far appears to have shown admirable restraint in declining to exploit its database. Deja News is at the centre of this controversy only by virtue of having implemented the idea of a 'memory of Usenet' too perfectly: not Deja News is the problem, but those who would use, to their own and possibly sinister ends, information made available without charge by Deja News. Eventually, in any way, Deja News itself may be overwhelmed by its own creation: with the amount of Internet users still continually increasing, and with newsgroup articles accumulating, it is gradually getting harder to still find the few most important postings amongst a multitude of discussions (in a similar way, search engine users are beginning to have trouble locating the most relevant Websites on any specific topic amongst a large number of less useful 'vanity' homepages). In the end, then, this new 'perfect' digital memory may have to learn an important capability from its analogue human counterpart: Deja News and similar archives may have to learn how to forget articles of lesser significance. A very simple first step towards this process has already been made: since December 1997, junk mail postings ('spam') are being removed from the Deja News archives (Woods, n. pag.). While such articles, whose uselessness is almost universally agreed upon by the Internet community at large, constitute a clear case for removal, however, any further deletions will mean a significant step away from the original Deja News goal of providing a complete archive of Usenet newsgroups, and towards increasingly controversial value-judgments -- who, after all, is to decide which postings are worth archiving, and which are irrelevant? If memory is to be selective, who will do the selecting? Eventually (and even if new memory management technologies help prevent outright deletion by relegating less important information to some sort of second-rate, less accessed memory space), it seems, the problem returns to being an ethical one -- of what is archived where and for how long, of who has access to these data, and of how newsgroup writers can regain control of their articles to protect themselves and prevent abuse. Deja News and the Internet community as a whole would be well-advised to address the problems raised by this perfect memory of originally ephemeral conversations before any major and damaging abuse can occur. References "Company Background." Deja News. 1998. 11 Aug. 1998 <http://www.dejanews.com/emarket/about/background.shtml> "Deja News Invites Internet Users to Search the World's Largest On-Line Newsgroup Archive." Deja News. 30 May 1996. 11 Aug. 1998 <http://www.dejanews.com/emarket/about/pr/1996/dnpr_960530.shtml>. Woods, Bob. "Deja News Cuts, Increases Content." Newsbytes 8 Dec. 1997. Citation reference for this article MLA style: Axel Bruns. "Archiving the Ephemeral: Deja News and the Ethics of Perfect Memory." M/C: A Journal of Media and Culture 1.2 (1998). [your date of access] <http://www.uq.edu.au/mc/9808/deja.php>. Chicago style: Axel Bruns, "Archiving the Ephemeral: Deja News and the Ethics of Perfect Memory," M/C: A Journal of Media and Culture 1, no. 2 (1998), <http://www.uq.edu.au/mc/9808/deja.php> ([your date of access]). APA style: Axel Bruns. (1998) Archiving the ephemeral: Deja News and the ethics of perfect memory. M/C: A Journal of Media and Culture 1(2). <http://www.uq.edu.au/mc/9808/deja.php> ([your date of access]).

APA, Harvard, Vancouver, ISO, and other styles

14

Sumiala, Johanna. "Circulating Communities Online: The Case of the Kauhajoki School Shooting." M/C Journal 14, no.2 (May2, 2011). http://dx.doi.org/10.5204/mcj.321.

Full text

Abstract:

Mobilities We live in a world of mobilised social life, as John Urry describes it. This is a world made out of constant flows of items, ideas, and actors travelling materially and/or immaterially from one location to another, non-stop. The movement of things and people goes back and forth; it changes direction and passes around various locations, both physical and virtual. No discussion of mobility today can be complete without consideration of the role of communication in reshaping mobilised social life. In many respects, our social life and a sense of community may be thought of as displaced and imaginary (Taylor). This is to say that, in today’s world, “belonging” as a constitutive element of community is acted out, in many cases, at a distance, without physical contact (Delanty 119-49). Furthermore, our sense of belonging is shaped by cultural and social communication networks and the media logic of the latest communication technology (Castells 54-136). It is in these de-territorialised communities (Dayan 166) that we communicate from one to one, or from one to many, without physical restriction; and by doing this, we form, transmit, and modify our self-understanding (or mis/understanding!) of the world in which we live and in which our lives are formed, transmitted, and modified by others. To understand the deeper dynamics of our newly mobilised social life, we need to elaborate on yet another dimension of communication: that is, the idea of circulation (Latour 36). The simplest way of defining circulation is to say that it is about “going the round” and/or “passing on” something—whether it is material or immaterial items, goods, artefacts, ideas, or beliefs that are being distributed and disseminated (Sumiala 44-55). However, as Benjamin Lee and Edward LiPuma (192) argue, if circulation is to serve as a useful analytic construct for the analysis of contemporary social life, “it needs be conceived as more than simply the movement of people, ideas, and commodities from one culture to another.” It is necessary to analyse circulation as a cultural process with its “own forms of abstraction, evaluation, and constraint” (192). It is, indeed, the dynamic structures of circulation that we have to look for. In this article, I shall attempt to illuminate the workings of circulation by discussing how images of violence travel in different types of mobile media environments and how that movement contributes to the formation and reformation of various social imaginaries. Drawing on Charles Taylor’s, Arjun Appadurai’s and Dilip Gaonkar’s work, I define social imaginaries as a symbolic matrix within which people imagine their collective social life. As Gaonkar (1-19) argues, it is within the folds of a social imaginary that we see ourselves as agents who traverse a social space and inhabit a temporal horizon. In everyday life, social imaginaries are carried in stories, symbols and images and in today’s world they rely heavily on stranger sociability—that is, sociability based on media-related relations among strangers (Gaonkar 4-5, 10). Images In Kauhajoki, Finland, on 23 September 2008, a 22-year-old male student went on the rampage at the Seinäjoki University of Applied Science (located in Kauhajoki, the province of Western Finland: a town with a population of some 14,000 inhabitants). The killer shot a teacher, nine of his classmates and, finally, himself. This was a second school shooting tragedy in Finland in less than a year, the first major incident being in Jokela in 2007. Before committing his crimes, the killer had distributed several self-images on the Internet (namely on IRC-gallery and YouTube) in which he broadcast his fascination for guns and shooting. Altogether, he had posted some 15 images on the IRC-gallery site. Some of the images were video clips, but these were later converted into still images. The images that started to circulate in the media after the tragedy included ones of the shooter pointing at the camera with his gun or of him shooting in a shooting range, as well as a number of self-portraits. Following Bruno Latour (159-64), I shall attempt to track the circulation of the killer’s images across different media landscapes: social and mainstream media. This short media ethnography covers excerpts from the Finnish online papers, television news, social media, and newspapers from the day of the tragedy (23 September 2008). Only print newspapers are collected from the next day, 24 September. More specifically, I trace the killer’s images from the largest broadsheet Helsingin Sanomat (print and online versions), the two tabloids Ilta-Sanomat and Iltalehti (print and online versions), and the national public broadcasting company, YLE (TV1 and TV2), as well as the two largest national commercial TV channels, MTV3 and TV4 (I will look especially at the main broadcast newscasts from the channels for the first day). En Route The Kauhajoki rampage shooter launched the process of circulation only about 15 minutes before he left home and started shooting. He logged in, downloaded the images on the social media website, IRC-gallery, and made a link to a server called Rapidshare to accelerate dissemination of his visual material. But this was only the tip of the iceberg in the shooter’s case. In the past, he had been an active circulator of violent material on the Web. By tracing his online history, we can confirm that the killer was a competent user of the digital communication technology (Hakala 99-118). The shooter registered with IRC-gallery in December 2004 and with YouTube in mid-March 2008. He took, for example, the username Wumpscut86 as his online identification. In the course of 2008, the images of the young man smiling at the camera changed into profile photos taken at a shooting range and eventually into a video where the man shoots at the camera. The shooter posted the first photos, hinting at the impending massacre, in the IRC-gallery in August 2008. Ten days after the first posting, the shooter downloaded a picture of his weapon onto the IRC-gallery, titled “Pity for majority”. At the end of August, pictures appeared on the IRC-gallery featuring the man firing his weapon at a shooting range and posing for the camera with his weapon. On Wednesday, 17 September 2008, he again added two more gunman photos of himself to his gallery (Sumiala and Tikka 17-29). During September, the killer downloaded four shooting videos onto YouTube, the last ones on 18 September 2008 (the Thursday of the week before the shooting). The videos feature the man firing his weapon at a location that appears to be a shooting range. On the day of the shooting, Tuesday 23 September 2008, he included a link to his Massacre in Kauhajoki file package, which contained the videos “You will die next”, “Goodbye”, and “Me and my Walther,” as well as an aerial shot of the school centre and photos of him aiming the weapon at the camera (Sumiala and Tikka 17-29).It is therefore clear that the shooter had planned his media strategy carefully before he committed his crime: he left plenty of visual traces, easy to find and distribute, after the catastrophe. In this respect, he also followed the pattern of his predecessors in Virginia Tech and in Jokela: these shooters had also activated social media sites to circulate violent material before taking any action (Kellner 39-43; Sumiala and Tikka 17-29). The killer started shooting in the school centre at around 10:46. The emergency response centre was notified of a fire and of the shooting at 10:47. Altogether, he shot ten people: nine students and one teacher. Around noon, the killer shot himself, but didn’t die immediately. His death, from gunshot wounds, was reported at Tampere University Hospital at 17:40 that evening. The first pieces of information about the shooting appeared on the social media site MuroBBS (a chat room) about half an hour after the shooting had started. About five minutes later, people chatting on the MuroBBS site made a connection between the shooter and his YouTube videos and IRC-gallery material. The IRC-gallery server removed his videos at 11:29 and the YouTube server an hour later, but they had already been uploaded by other users of social media and thus could not be totally destroyed by the server (Hakala 100-18). The online tabloid Iltalehti, published the first of the shooter’s images about 45 minutes after he had shot himself but was still alive. At this point, his face was not recognisable in the images because it was obscured by a black box. The tabloid headline said (in English translation) “Is he the shooter?” Later in the afternoon, all three online papers, Helsingin Sanomat, Iltalehti, and Ilta-Sanomat, published online images of the killer shooting and pointing his gun at the camera, and of his face (as originally published in IRC-gallery). With regard to issues of mobility, the online images travelled much faster than people with cameras. Kauhajoki, the town where the massacre took place, is situated far away from Helsinki, the capital of Finland, and centre of the country’s largest media and news organisations. Only the most well-resourced news organisations were able to send journalists and photographers to the scene of the crime with helicopters and planes; other journalists and broadcasters had to sit in a car or in a train for hours to get to Kauhajoki. Consequently, the critical moment had passed by the time they finally arrived (Hakala 99-118). By contrast, the images posted by the killer himself were available on the Web as soon the shooting started. And it was the social media sites that were the first to make the connection between the shooter and his images. This early annexing of images by the social media users was thus crucial in putting the massacre into circulation in its virtual form (Sumiala and Tikka 17-29). As noted above, social media operators in IRC-gallery and YouTube started to remove the shooter’s material less than an hour after the tragedy started at Kauhajoki. But, when searching YouTube or googling “Kauhajoki” at around 14:00 on the same day, one could still find at least 15 (and probably many more) of his videos (or at least, clips) on YouTube. The titles of these videos included: “School Massacre in Finland (Kauhajoki) 9/23/2008”, “The Shooter at the Massacre in Kauhajoki”, “Kauhajoki Killer Shooting his Deadly Weapon”. One of the crucial aspects of circulation is the issue of which material gets into circulation and what value is attached to it. In the case of the Kauhajoki school shootings, one needs to ask which were the texts or images that started to circulate in the national media, as it is the national media (in particular, television) that play a crucial role in transforming a local news event it into a national media catastrophe (see e.g. Liebes 71-84). The newscasts analysed for this research included evening news from every national news channel: YLE: channel 1 (20:30); channel 2 (21:50); MTV3 (19:00); and TV4 (23.00). All of them showed the shooter’s own images as part of their broadcasts. YLE channels 1 and 2 were more cautious about showing visual material, whereas the commercial channels MTV3 and TV4 used more airtime (and a larger number of images, both still and moving) to profile the killer. By the end of the day, the “Kauhajoki Killer” had become “the star” of the shootings (both nationwide and internationally), largely on account of the visual material he had left behind on the Web and which was so easy to circulate from one medium to another (Hakala 48-98). Needless to day, the “victims” of the shooting (nine students and a teacher) all but faded from view. Events the next day only increased this emphasis. The two tabloids Iltalehti and Ilta-Sanomat brought out extra issues featuring the killer’s own visual material on several double-page spreads. Especially interesting was Iltalehti’s double page (24-25), covered with images from the international online papers: Spiegel Online, Mail Online, CNN.com, BBC news, El Pais.com, Expressen and Aftonbladet, all but one of which had chosen to display the killer’s face on the front page. Helsingin Sanomat also chose to give the killer’s face extraordinary visibility; in Finland, the front page of the daily is usually always sold for advertisem*nts and there are only very few instances in its history that have been an exception to this rule. The Kauhajoki massacre was one of these rare moments in history. Community Through this short media ethnography, I hope to have illustrated some of the ways in which circulation features in a contemporary media context through the example of the “Kauhajoki School Shooter”. The direction of this “circulation” was clearly from the social media to the mainstream media: from online to offline. As a media event, it was diachronic (i.e. “historical”—it evolved “across time”), but also synchronic inasmuch as the images multiplied on the Web in an instant (Sumiala and Tikka 17-29). In the circulation of the Kauhajoki shooter’s images, digital communication technology clearly played an absolutely central role. The images were easily accessible on social media sites and they were in a digital format that was simple to convert from one medium to another. This enabled instant and sensational “remediation”, to use Bolter and Grusin’s formulation. Not only were the images transformed from one medium to another; they became remediated, especially in commercial electronic and print media, as they all (MTV3, TV4, Helsingin Sanomat, Iltalehti, and Ilta-Sanomat) circulated images from the killer’s own online sites. Yet I do not wish to give the impression that the media circulation of the Kauhajoki killer images is an “innocent” or inconsequential cultural phenomenon in the context of mobilised social life. Circulation, as a means of communication, has the power to influence social imaginaries: how belonging is imagined and acted out in the age of mobility. In his book Fear of Small Numbers, Arjun Appadurai has argued that, in the contemporary era, communities are not only organised around communications that nurture positive imaginaries, but also circulate violence, fear, destruction, and uncertainty. By copying, repeating, and “recycling” violent material—by keeping circulation on the move, in other words—social imaginaries of violence are spread, not only on a national scale but globally. In this sense, it is arguable that they become distinctly glocal phenomena. Some of the circulation of the violent material is condensed on Web-based “hate groups”: this refers to those global communities that share a common hatred or anger regarding a given phenomenon or issue. The cause of hatred is often race, religion, ethnicity, sexual orientation, or gender, but it can also be misanthropy of a more general kind (Duffy 292). The attitudes towards the objects of hatred that are revealed may vary in both nature and degree, but the “national” exporting of violence from one country to another arguably follows a similar trajectory to the migrant flow of human subjects (Sumiala and Tikka 17-29) and therefore adds to the impression that circulatory “flows” have become the dominant trope of contemporary life the world over. Imaginary communities, as de-territorialised forms of belonging, can, in fact, be regarded as the communities of the era of mobility (see also Pikner in this issue). They cannot be physically perceived, but they do have social momentum. The shooter in Kauhajoki was a member of a large number of global virtual communities himself and arguably succeeded in exporting both himself, and “Finland”, to the rest of the world. He had, as we’ve seen, registered with YouTube, IRC-gallery, Suomi24 (Finland’s largest online community), and Battlefield 2 long before the massacre took place. It is also worth noting that, in these virtual communities, the killer took up his place as a resident rather than a visitor. Having established his online profile, he sought out contact with like-minded users, and engaged in social relationships in global online communities that were, quite literally, a world away from his home in Finland. In the virtual “hate communities” to which the Kauhajoki shooter belonged, dispersed people from around the world came together through a discourse of violence, hate, and destruction; I call these ephemeral encounters of stranger sociability networked communities of destruction. These are virtual global communities held together by a social imaginary constructed around the visualisation of texts of death and violence that emanate from a specific nation (in this case, Finland) but almost instantly transcend it. These communities cancel the distance between centre and periphery and cohere around the discourses of hate and destruction (Coman and Rothenbuhler 6). By remaking and circulating the Kauhajoki shooter’s photos and videos, these communities render a figure like the Kauhajoki killer immortal in an unprecedented way. The promise of post-mortem fame for a potential school shooter is thus kept vividly alive in today’s networked communities through the endless circulation of imaginaries of violence and destruction, raising issues of ethics and digital/media responsibility that have only just begun to be addressed. References Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalization. Minnesota: University of Minnesota Press, 1996. Appadurai, Arjun. Fear of Small Numbers: An Essay on the Geography of Anger. London: Duke University Press, 2006. Bolter, Jay David, and Richard Grusin. Remediation. Understanding New Media. Cambridge, MA: MIT Press, 1998. Castells, Manuel. Communication Power. New York: Oxford University Press, 2009. Coman, Mihai, and Eric Rothenbuhler. “The Promise of Media Anthropology.” Media Anthropology. Thousand Oaks: Sage, 2005. 1-11. Dayan, Daniel. “The Pope at Reunion: Hagiography, Casting, and Imagination.” Media Anthropology. Ed. Eric Rothenbuhler and Mihai Coman. Thousand Oaks and London: Sage, 2005. 165-75. Delanty, Gerard. Community. 2nd ed. London: Routledge, 2010. Duffy, Margaret. “Web of Hate: A Fantasy Theme Analysis of the Rhetorical Vision of Hate Groups Online.” Journal of Communication Inquiry 27 (2003): 291-312. Gaonkar, Dilip Parameshwar. “Toward New Imaginaries: An Introduction.” Public Culture 14 (2002): 1-19. Hakala, Salli. Koulusurmat verkostoyhteiskunnassa. Analyysi Jokelan ja Kauhajoen kriisien viestinnästä. Helsingin yliopisto: CRC/Viestinnän laitos, 2009. ‹http://www.valt.helsinki.fi/blogs/crc/koulusurmat.htm›. Kellner, Douglas. Guys and Guns Amok: Domestic Terrorism and School Shootings from the Oklahoma City Bombing to the Virginia Tech Massacre. Boulder: Paradigm Publishers, 2008. Latour, Bruno. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press, 2005. Lee, Benjamin, and Edward LiPuma. “Cultures of Circulation: The Imaginations of Modernity.” Public Culture 14 (2002): 191-214. Liebes, Tamar. “Television’s Disaster Marathons: A Danger for Democratic Processes?” Media, Ritual and Identity. Eds. Tamar Liebes and James Curran. London : Routledge, 1998. 71-84. Sumiala, Johanna. “Circulation.” Keywords in Religion, Media, and Culture. Ed. David Morgan. London: Routledge, 2008. 44-55. Sumiala, Johanna, and Minttu Tikka. “‘Web First’ to Death: The Media Logic of the School Shootings in the Era of Uncertainty. Nordicom Review 31 (2010): 17-29. ‹http://www.nordicom.gu.se/eng.php?portal=publ&main=info_publ2.php&ex=325&me=2%22%20%5Ct%20%22_blank›. Taylor, Charles. “Modern Social Imaginaries.” Public Culture 14 (2002): 91-124. Urry, John. Mobilities. Cambridge: Polity, 2008.

APA, Harvard, Vancouver, ISO, and other styles

15

Bowles, Kate. "Academia 1.0: Slow Food in a Fast Food Culture? (A Reply to John Hartley)." M/C Journal 12, no.3 (July15, 2009). http://dx.doi.org/10.5204/mcj.169.

Full text

Abstract:

"You could think of our kind of scholarship," he said, "as something like 'slow food' in a fast-food culture."— Ivan Kreilkamp, co-editor of Victorian Studies(Chronicle of Higher Education, March 2009) John Hartley’s entertaining and polemical defense of a disappearing art form (the print copy journal designed to be ripped eagerly from its envelope and read from cover to cover like a good book) came my way via the usual slightly disconcerting M/C Journal overture: I believe that your research interests and background make you a potential expert reviewer of the manuscript, "LAMENT FOR A LOST RUNNING ORDER? OBSOLESCENCE AND ACADEMIC JOURNALS," which has been submitted to the '' [sic] issue of M/C Journal. The submission's extract is inserted below, and I hope that you will consider undertaking this important task for us. Automated e-mails like these keep strange company, with reminders about overdue library items and passwords about to expire. Inevitably their tone calls to mind the generic flattery of the internet scam that announces foreign business opportunities or an unexpectedly large windfall from a deceased relative. At face value, this e-mail confirms John Hartley’s suspicions about the personalised craft of journal curation. Journal editing, he implies, is going the way of drywalling and smithying—by the time we realise these ancient and time-intensive skills have been lost, it’ll be too late. The usual culprit is to the fore—the internet—and the risk presented by obsolescence is very significant. At stake is the whole rich and messy infrastructure of academic professional identity: scholarly communication, goodwill, rank, trust, service to peers, collegiality, and knowledge itself. As a time-poor reader of journals both online and in print I warmed to this argument, and enjoyed reading about the particularities of journal editing: the cultivation and refinement of a specialised academic skill set involving typefaces, cover photographs and running order. Journal editors are our creative directors. Authors think selfishly and not always consistently about content, position and opportunity, but it’s the longer term commitment of editors to taking care of their particular shingle in the colourful and crowded bazaar of scholarly publishing, that keeps the market functioning in a way that also works for inspectors and administrators. Thinking of all the print journals I’ve opened and shut and put on shelves (sometimes still in their wrappers) and got down again, and photocopied, and forgotten about, I realised that I do retain a dim sense of their look and shape, and that in practical ways this often helps me remember what was in them. Nevertheless, even having been through the process he describes, whereby “you have to log on to some website and follow prompts in order to contribute both papers and the assessment of papers; interactions with editors are minimal,” I came to the conclusion that he had underestimated the human in the practice of refereeing. I wasn’t sure made me an expert reviewer for this piece, except perhaps that in undertaking the review itself I was practising a kind of expertise that entitled me to reflect on what I was doing. So as a way of wrestling with the self-referentiality of the process of providing an anonymous report on an article whose criticism of blind refereeing I shared, I commented on the corporeality and collegiality of the practice: I knew who I was writing about (and to), and I was conscious of both disagreeing and wondering how to avoid giving offence. I was also cold in my office, and wondering about a coffee. “I suspect the cyborg reviewer is (like most cyborgs) a slightly romantic, or at least rhetorical, fantasy,” I added, a bit defensively. “Indeed, the author admits to practising editorship via a form of human intersubjectivity that involves email, so the mere fact that the communication in some cases is via a website doesn’t seem to render the human obsolete.” The cyborg reviewer wasn’t the only thing bothering me about the underlying assumptions concerning electronic scholarly publishing, however. The idea that the electronic disaggregation of content threatens the obsolescence of the print journal and its editor is a little disingenuous. Keyword searches do grab articles independently of issues, it’s true, but it’s a stretch to claim that this functionality is what’s turning diligent front-to-back readers and library flaneurs into the kinds of online mercenaries we mean when we say “users”. Quite the opposite: journal searches are highly seductive invitations to linger and explore. Setting out from the starting point of a single article, readers can now follow a citation trail, or chase up other articles by the same author or on similar topics, all the while keeping in plain sight the running order that was designed by the editors as an apt framework for the piece when it first appeared. Journal publishers have the keenest investment in nurturing the distinctive brand of each of their titles, and as a result the journal name is never far from view. Even the cover photo and layout is now likely to be there somewhere, and to crop up often as readers retrace their steps and set out again in another direction. So to propose that online access makes the syntactical form of a journal issue irrelevant to readers is to underestimate both the erotics of syntax, and the capacity of online readers to cope with a whole new libidinous economy of searching characterised by multiple syntactical options. And if readers are no longer sequestered within the pages of an individual hard copy journal—there really is a temptation to mention serial monogamy here—their freedom to operate more playfully only draws attention to the structural horizontalities of the academic public sphere, which is surely the basis of our most durable claims to profess expertise. Precisely because we are hyperlinked together across institutions and disciplines, we can justly argue that we are perpetually peer-reviewing each other, in a fairly disinterested fashion, and no longer exclusively in the kinds of locally parochial clusters that have defined (and isolated) the Australian academy. So although disaggregation irritates journal editors, a more credible risk to their craft comes from the disintermediation of scholarly communication that is one of the web’s key affordances. The shift towards user generated content, collaboratively generated, openly accessible and instantly shareable across many platforms, does make traditional scholarly publishing, with its laborious insistence on double blind refereeing, look a bit retro. How can this kind of thing not become obsolete given how long it takes for new ideas to make their way into print, what with all that courtly call and response between referees, editors and authors, and the time consumed in arranging layout and running order and cover photos? Now that the hegemons who propped up the gold standard journals are blogging and podcasting their ideas, sharing their bookmarks, and letting us know what they’re doing by the hour on Twitter, with presumably no loss of quality to their intellectual presence, what kind of premium or scarcity value can we place on the content they used to submit to print and online journals? So it seems to me that the blogging hegemon is at least as much of a problem for the traditional editor as the time challenged browser hoping for a quick hit in a keyword search. But there are much more complicated reasons why the journal format itself is not at risk, even from www.henryjenkins.org. Indeed, new “traditional” journals are being proposed and launched all the time. The mere award of an A* for the International Journal of Cultural Studies in the Australian journal rankings (Australian Research Council) confirms that journals are persistently evaluated in their own right, that the brand of the aggregating instrument still outranks the bits and pieces of disaggregated content, and that the relative standing of different journals depends precisely on the quantification of difficulty in meeting the standards (or matching the celebrity status) of their editors, editorial boards and peer reviewing panels. There’s very little indication in this process that either editors or reviewers are facing obsolescence; too many careers still depend on their continued willingness to stand in the way of the internet’s capacity to let anyone have a go at presenting ideas and research in the public domain. As the many inputs to the ERA exercise endlessly, and perhaps a bit tediously, confirmed, it’s the reputation of editors and their editorial practices that signals the exclusivity of scholarly publishing: in the era of wikis and blogs, an A* journal is one club that’s not open to all. Academia 1.0 is resilient for all these straightforward reasons. Not only in Australia, tenure and promotion depend on it. As a result, since the mid 1990s, editors, publishers, librarians and other stakeholders in scholarly communication have been keeping a wary eye on the pace and direction of change to either its routines or its standards. Their consistent attention has been on the proposition the risk comes from something loosely defined as “digital”. But as King, Tenopir and Clark point out in their study of journal readership in the sciences, the relevance of journal content itself has been extensively disputed and investigated across the disciplines since the 1960s. Despite the predictions of many authors in the 1990s that electronic publishing and pre-publishing would challenge the professional supremacy of the print journal, it seems just as likely that the simple convenience of filesharing has made more vetted academic material available, more easily, to more readers. As they note in a waspish foonote, even the author of one of the most frequently cited predictions that scholarly journals were on the way out had to modify his views, “perhaps due to the fact that his famous 1996 [sic] article "Tragic Loss or Good Riddance? The Impending Demise of Traditional Scholarly Journals" has had thousands of hits or downloads on his server alone.” (King et al,; see also Odlyzko, " Tragic Loss" and "Rapid Evolution"). In other words, all sides now seem to agree that “digital” has proved to be both opportunity and threat to scholarly publication. Odlyzko’s prediction of the disappearance of the print journal and its complex apparatus of self-perpetuation was certainly premature in 1996. So is John Hartley right that it’s time to ask the question again? Earlier this year, the Chronicle of Higher Education’s article “Humanities Journals Confront Identity Crisis”, which covered much of the same ground, generated brisk online discussion among journal editors in the humanities (Howard; see also the EDITOR-L listserv archive). The article summarised the views of a number of editors of “traditional” journals, and offset these with the views of a group representing the Council of Editors of Learned Journals, canvassing the possibility that scholarly publishing could catch up to the opportunities that we tend to shorthand as “web 2.0”. The short-lived CELJ blog discussion led by Jo Guldi in February 2009 proposed four principles we might expect to shape the future of scholarly publishing in the humanities: technical interoperability, which is pretty uncontroversial; the expansion of scholarly curation to a role in managing and making sense of “the noise of the web”; diversification of content types and platforms; and a more inclusive approach to the contribution of non-academic experts. (Guldi et al.) Far from ceding the inexorability of their own obsolescence, the four authors of this blog (each of them journal editors) have re-imagined the craft of editing, and have drafted an amibitious but also quite achievable manifesto for the renovation of scholarly communication. This is focused on developing a new and more confident role for the academy in the next phase of the development of the knowledge-building capacity of the web. Rather than confining themselves to being accessed only by their professional peers (and students) via university libraries in hardcopy or via institutional electronic subscription, scholars should be at the forefront of the way knowledge is managed and developed in the online public sphere. This would mean developing metrics that worked as well for delicious and diigo as they do for journal rankings; and it would mean a more upfront contribution to quality assurance and benchmarking of information available on the web, including information generated from outside the academy. This resonates with John Hartley’s endorsem*nt of wiki-style open refereeing, which as an idea contains a substantial backwards nod to Ginsparg’s system of pre-publication of the early 1990s (see Ginsparg). It also suggests a more sophisticated understanding of scholarly collaboration than the current assumption that this consists exclusively of a shift to multiply-authored content, the benefit of which has tended to divide scholars in the humanities (Young). But it was not as a reviewer or an author that this article really engaged me in thinking about the question of human obsolescence. Recently I’ve been studying the fragmentation, outsourcing and automation of work processes in the fast food industry or, as it calls itself, the Quick Service Restaurant trade. I was drawn into this study by thinking about the complex reorganisation of time and communication brought about by the partial technologisation of the McDonalds drive-thru in Australia. Now that drive-thru orders are taken through a driveway speaker, the order window (and its operator) have been rendered obsolete, and this now permanently closed window is usually stacked high with cardboard boxes. Although the QSR industry in the US has experimented with outsourcing ordering to call centres at other locations (“May I take your order?”), in Australia the task itself has simply been added to the demands of customer engagement at the paying window, with the slightly odd result that the highest goal of customer service at this point is to be able to deal simultaneously with two customers at two different stages of the drive-thru process—the one who is ordering three Happy Meals and a coffee via your headset, and the one who is sitting in front of you holding out money—without offending or confusing either. This formal approval of a shift from undivided customer attention to the time-efficiency of multitasking is a small but important reorientation of everyday service culture, making one teenager redundant and doubling the demands placed on the other. The management of quick service restaurant workers and their productivity offers us a new perspective on the pressures we are experiencing in the academic labour market. Like many of my colleagues, I have been watching with a degree of ambivalence the way in which the national drive to quantify excellence in research in Australia has resulted in some shallow-end thinking about how to measure what it is that scholars do, and how to demonstrate that we are doing it competitively. Our productivity is shepherded by the constant recalibration of our workload, conceived as a bundle of discrete and measurable tasks, by anxious institutions trying to stay ahead in the national game of musical chairs, which only offers a limited number of seats at the research table—while still keeping half an eye on their enterprise bargaining obligations. Or, as the Quick Service Restaurant sector puts it: Operational margins are narrowing. While you need to increase the quality, speed and accuracy of service, the reality is that you also need to control labor costs. If you reduce unnecessary labor costs and improve workforce productivity, the likelihood of expanding your margins increases. Noncompliance can cost you. (Kronos) In their haste to increase quality, speed and accuracy of academic work, while lowering labor costs and fending off the economic risk of noncompliance, our institutions have systematically overlooked the need to develop meaningful ways to accommodate the significant scholarly work of reading, an activity that takes real time, and that in its nature is radically incompatible with the kinds of multitasking we are all increasingly using to manage the demands placed on us. Without a measure of reading, we fall back on the exceptionally inadequate proxy of citation. As King et al. point out, citation typically skews towards a small number of articles, and the effect of using this as a measure of reading is to suggest that the majority of articles are never read at all. Their long-term studies of what scientists read, and why, have been driven by the need to challenge this myth, and they have demonstrated that while journals might not be unwrapped and read with quite the Christmas-morning eagerness that John Hartley describes, their content is eventually read more than once, and often more than once by the same person. Both electronic scholarly publishing, and digital redistribution of material original published in print, have greatly assisted traditional journals in acquiring something like the pass-on value of popular magazines in dentists’ waiting rooms. But for all this to work, academics have to be given time to sit and read, and as it would be absurd to try to itemise and remunerate this labour specifically, then this time needs to be built into the normative workload for anyone who is expected to engage in any of the complex tasks involved in the collaborative production of knowledge. With that in mind, I concluded my review on what I hoped was a constructive note of solidarity. “What’s really under pressure here—forms of collegiality, altruism and imaginative contributions to a more outward-facing type of scholarship—is not at risk from search engines, it seems to me. What is being pressured into obsolescence, risking subscriptions to journals as much as purchases of books, is the craft and professional value placed on reading. This pressure is not coming from the internet, but from all the other bureaucratic rationalities described in this paper, that for the time being do still value journals selectively above other kinds of public contribution, but fail to appreciate the labour required to make them appear in any form, and completely overlook the labour required to absorb their contents and respond.” For obvious reasons, my warm thanks are due to John Hartley and to the two editors of this M/C Journal issue for their very unexpected invitation to expand on my original referee’s report.References Australian Research Council. “The Excellence in Research for Australia (ERA) Initiative: Journal Lists.” 2009. 3 July 2009 ‹http://www.arc.gov.au/era/era_journal_list.htm›. Ginsparg, Paul. “Can Peer Review be Better Focused?” 2003. 1 July 2009 ‹http://people.ccmr.cornell.edu/~ginsparg/blurb/pg02pr.html›. Guldi, Jo, Michael Widner, Bonnie Wheeler, and Jana Argersinger. The Council of Editors of Learned Journals Blog. 2009. 1 July 2009 ‹http://thecelj.blogspot.com›. Howard, Jennifer. “Humanities Journals Confront Identity Crisis.” The Chronicle of Higher Education 27 Mar. 2009. 1 July 2009 ‹http://chronicle.com/free/v55/i29/29a00102.htm›. King, Donald, Carol Tenopir, and Michael Clarke. "Measuring Total Reading of Journal Articles." D-Lib Magazine 12.10 (2006). 1 July 2009 ‹http://www.dlib.org/dlib/october06/king/10king.html›. Kronos Incorporated. “How Can You Reduce Your Labor Costs without Sacrificing Speed of Service?” (2009). 1 July 2009 ‹http://www.qsrweb.com/white_paper.php?id=1738&download=1›.“May I Take Your Order? Local McDonald's Outsources to a Call Center.” Billings Gazette, Montana, 5 July 2006. SharedXpertise Forum. 1 July 2009 ‹http://www.sharedxpertise.org/file/3433/mcdonalds-outsourcing-to-call-center.html›.Odlyzko, Andrew. “The Rapid Evolution of Scholarly Publishing.” Learned Publishing 15.1 (2002): 7-19. ———. “Tragic Loss or Good Riddance? The Impending Demise of Traditional Scholarly Journals.” International Journal of Human-Computer Studies 42 (1995): 71-122. Young, Jeffrey. “Digital Humanities Scholars Collaborate More on Journal Articles than 'Traditional' Researchers.” The Chronicle of Higher Education 27 April 2009. 1 July 2009 ‹http://chronicle.com/wiredcampus/article/3736/digital-humanities-scholars-collaborate-more-on-journal-articles-than-on-traditional-researchers›.

APA, Harvard, Vancouver, ISO, and other styles

16

Barker, Tim. "Error, the Unforeseen, and the Emergent." M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2705.

Full text

Abstract:

The condition that marks the post-digital age may be the condition for error. In the condition where machinic systems seek the unforeseen and the emergent, there is also a possibility for the unforeseen error to slip into existence. This condition can be seen in the emerging tradition of artists using error as a creative tool. In his paper “The Aesthetics of Failure: ‘Post-Digital’ Tendencies in Contemporary Music,” Kim Cascone points to the way in which composers, using digital means, exploit the inadequacies of a particular compositional or performative technology (Cascone 13). Cascone cites composers such as Ryoji Ikeda who create minimalist electronic compositions using media as both their form and theme. In these compositions, the errors, imperfections, and limitations of the particular compositional media are the central constituting elements of the piece. In addition to music, this glitch aesthetic is also exploited in the visual arts. Artists such as Tony Scott set up situations in which errors are able to emerge and be exploited in the art making process. In these types of work the artist’s role is to allow a glitch or an error to arise in a specific system, then to reconfigure and exploit the generative qualities of the unforeseen error. Tony Scott, Glitch No. 13, 2001-2005 The generative capabilities of error can be understood through Lev Manovich’s cultural communication model developed in his paper “Post-Media Aesthetics.” Traditionally, a pre-media cultural communication model represents the transmission of a signal as SENDER—MESSAGE—RECEIVER (Manovich, “Post-Media Aesthetics” 18). In this original model the sender encodes and transmits a message over a communication channel; as Manovich indicates, in the course of transmission the message is affected by any noise that exists along the communication channel. The receiver then decodes the message. Here the message is susceptible to error in two ways. First, the noise that originates from the communication channel may alter the message. Second, there may be discrepancies between the sender and receiver’s code (Manovich, “Post-Media Aesthetics” 18). Manovich, in order to propose a post-digital consideration of transmission, has developed this model by including the sender and receiver’s software. Post-digital cultural communication can now be considered as SENDER—SOFTWARE—MESSAGE—SOFTWARE—RECEIVER (Manovich, “Post-Media Aesthetics” 17-18). In this model the cultural significance of software is emphasised. The software, much more than the noise introduced by the communication channel, may change the message. Significantly, the software may introduce an error into the message. Following Gilles Deleuze, we may say that the software may articulate a link to the field of potential in order to generate unforeseen, and perhaps unwanted, information. The cultural role that Manovich ascribes to software becomes elucidated in Dimitre Lima, Iman Morandi, and Ant Scott’s Glitchbrowser. Glitchbrowser is an alternative to the traditional model of a web browser. This browser, rather than attempting to assist user navigation of the internet, creates errors when displaying the pages that it accesses. The images of any page accessed by Glitchbrowser are distorted or glitched through colour saturation and abstraction from their original composition. In this work, following Manovich’s cultural communication model, the software that intervenes between sender and receiver alters the content of the message. Thus in Glitchbrowser, the artists remind us that the information we receive is largely reconstituted by the system it travels through. In a sense the machine reveals itself, rather than creating the illusion of a transparent interface to information. In the application of Glitchbrowser the user witnesses the way that messages are transmitted and altered by the interface. Here, the machine reminds the user of its existence (Manovich, The Language of New Media 206). Any system that seeks the actualisation of unforeseen potential is also a system that has the capacity to become errant. Rather than thinking of the error as something to fear or avoid, we can think of an error as something that brings with it the capacity for the new and the unforeseen (perhaps it is this link to the unforeseen that is precisely the reason that we fear the errant). We can think of any system that is open to the unforeseen as surrounded by a cloud of potential errors, or, as Deleuze would put it, a cloud of the virtual (Deleuze and Parnet 148). At any point in its process, a system is traversing potential errors—and at any point, one may become actualised. We can picture a potential for error at every point that a system is opened to unformed information. As a system attempts to actualise this unformed information, to form the unformed from the cloud of the virtual, the system may also give form to an unformed error. Deleuze’s virtual can be understood as the field of pure potentiality. In this field there exists all those things that could potentially become actualised in the course of a system, but for some reason, do not. We can think of the virtual, from the present moment, as containing all the potential events that could take place in the future. Only one of these events will become actualised, becoming the actual present, and the other events will remain virtual. As Brian Massumi describes, the virtual that Deleuze theorises is a mode of reality that is articulated in the emergence of new potentials—the virtual is implicated in the reality of change. A system, in the event of change, moves through and connects to the virtual, actualising some information and leaving other information as un-actualised virtuality. This system is surrounded by a cloud of the virtual, surrounded by potential errors. At any moment, as the system moves into the virtual it may actualise an error. Rather than thinking of an event as the process by which preformed or preconceived possible information becomes realised, we can only think of an error as coming into being as the unformed and the unforeseen potential is actualised. This potential emerges from unique activities that occur in the process of a system. These unique activities open the system so that unforeseen information may emerge (DeLanda, Intensive Science and Virtual Philosophy 36-37). If a system runs through its process without the potential for error it is essentially closed. It does not allow the potentiality of the emergent or the unforeseen. It is only through allowing the capacity for potential errors that we may provide the opportunity to think the unthought, to become-other, and to hence initiate further unforeseen becomings in the virtual (Rodowick 201). In a sense, when there is potential for an error to emerge in a system, the system cannot be regarded as a pre-formed linear progress; rather, it can only be thought as a divergent process that actualises elements of the virtual. Images from Yann Le Guennec Le Catalogue Yann Le Guennec’s Le Catalogue is an example of artist designed software causing unforeseen errors. This online work allows public access to a catalogue of images and installations created between 1990 and 1996. Every time a page is accessed from the archive, an intended error is activated in the form of an intersecting horizontal and vertical line, generated at random points over the image. The more that the page is viewed, the greater its deterioration by the obscuring intersecting line and the closer the image comes to abstraction. As Eduardo Navas states, “the archive is similar to analogue vinyl records losing their fidelity and being slightly deteriorated every time the needle passes through the groove.” In Le Guennec’s catalogue the act of accessing and consulting an object of the archive, in essence, causes an internal error to the object. This is an error that is inbuilt; it is an error that we cause by the act of looking or accessing any of the images. As we access the image we allow a virtual error to become actual. Eventually the error will take over the original image, and the image will be more about error than it ever was about its referent. Images from Yann Le Guennec Le Catalogue Just as in Cascone’s glitch music, the form and the theme of Le Catalogue is error. In Le Catalogue we see the potential for error whenever information is mediated; the work becomes a reflection on the act of looking, but looking through a particular paradigm, looking through the interface. The work’s archive can only be preserved by allowing the images to exist, un-accessed, behind the interface. But this work is not about preservation. It is ultimately about the ephemeral and its uniqueness. Each error caused by the user, which becomes actual from the virtual, is unique—and each time the archive is accessed it is differentiated from its past. Every time an image is accessed, it becomes its own original; every time an error from the field of the virtual is actualised, the unforeseen emerges. In these types of works the error can be understood through a Deleuzian ontology as a generative and creative force. As mentioned above, in order to position the condition for error as the condition for the unforeseen, we can think of the errant system as involved in a process of making actual potential from the virtual. In contrast, the system that holds no potential for error is involved in the process of realising possibilities. The possible follows a line toward an already established attractor; in this instance the future is closed as it is already given in the present. If we could access information in Le Catalogue without causing the unforeseen error, the information is possible. If this were the case, any selection from the archive’s menu would return a preformed image. In opposition to this, the potential moves through processes of bifurcation and divergence toward chaotic attractors; in this case the future is open (DeLanda, “Deleuze and the Open-Ended Becoming of the World”). Actualisation is separate from realisation in that realisation suggests a passage from the possible to the static. Actualisation implies the production of something new and unforeseen, a becoming virtual that results in new possibilities and transformations (Lévy). The possible exists in a state of limbo as an already constituted thing; the only thing separating the real from the possible is existence. The possible is thus thought of as a latent phantom reality (Lévy 24). If we were only ever interested in realising the possible then errors would not be a concern. The system only becomes errant when we seek the unformed. This occurs whenever we actualise information from the field of the virtual. The virtual error is to be thought of as the potential that may or may not come into being through a process of actualisation. As Lévy states, “the virtual is that which has potential rather than actual existence … The tree is virtually present in the seed” (23). The seed does not know what shape the tree will take, as it would in a possible-real model. Rather the seed must actualise the tree as it enacts a process of negotiation between its internal limitations and the environmental circ*mstances that it encounters through this process. We can thus see potential errors as virtual in that the system does not know the errors that it may actualise. The system actualises these errors as it explores its degrees of freedom and the circ*mstances that may allow the emergence of error. As the potential for error marks the potential for the new and the unforeseen, we can see that an error in itself may be creative. An error may be utilised. It may be sought out and used to create the unforeseen within traditional systems, such as our routine computer use. In these instances, as the unique generative qualities of error are actualised, the artist can no longer be thought of as the sole creative force. Rather it is now the artist’s role to provide the circ*mstances for an error to emerge. The error fills the potentiality of a system with meaning, whether intended or unintended by the designer. It is the participant’s interrelationship with this error that may be thought to proliferate artistic meaning. The aesthetics of the digital encounter occur as an interactive event between participant and machine, with the artist, in a sense, hidden behind the machine. When an error occurs, unforeseen to the artist, the work is affected and possibilities are created for new meanings to emerge. Participant in Blast Theory’s Desert Rain Desert Rain, a complex mixed reality environment, by the group Blast Theory, actualises errors and exposes its software limitations in ways unintended by the artists. The work involves six participants that are asked to navigate a digitally generated landscape of the Gulf War in order to locate a target. This digitally generated space is projected upon a curtain of water spray. Once all the participants have found their targets they are lead through the rain curtain, over a sand dune and to a representation of a hotel room. In this room there is a television screen that displays one of the targets narrating their real life experience of the Gulf War. The digital target is now made actual as a physically real, yet still mediated, person. This work presents a space in which the real and the digital mutually affect one another; the participant’s experience in the digital landscape directs the meaning that they take from the target’s real life narrative, and the experience of this narrative affects the participant’s memories of the digital landscape. The overall experience of Desert Rain is constituted by the coming together of the material and the digital spaces so that they may produce a mixed reality space. However, the actual functioning of Desert Rain does not always provide the means for the theoretical tessellated space that Blast Theory seeks. This is due to certain errors and limitations in the machinic system. But these are not necessarily aesthetic bugs; in fact they may enhance the aesthetics of the form of the work. For instance, the digitally generated graphics are rather clumsy and hard edged, with a slow frame rate and low definition. Also, some participants found it difficult to use the footplate effectively (Benford et al. 54). For these reasons, the space of the digital and the space of the real remain separate, with the participant struggling to manipulate the interface in order to access the digital; the sometimes errant functionality of the interface acts as a barrier between the digital and the material. However, this technical bug may enable the participant to grapple with the machinic in ways which would not occur had the machine been perfect. As Blast Theory and the Communications Research Group point out, ethnographic research into interaction has found that this technical bug was generally only seen as a detriment to the work by those participants with a technical background (Benford et al. 53-55). Those participants, in contrast, with an artistic background tended to see the limitations of the form as a conscious aesthetic gesture. That is, the slowness and clumsiness of the media became directly connected to the larger purpose of the work, which is to criticise the media’s coverage of the Gulf War and the general place of media in our daily lives. Here, for the artistically inclined audience, form and content come inextricably linked. Thus the error in the form is inextricable from the meaning of the work. The imprecise navigation, due to the nature of the footplate, through the obvious and imprecise mediated imaging of the world, directly links to the experience of receiving information through television broadcasts. In a sense the limitations of the media and the interface device are embodied, quite unintentionally, in the content of the work. If the participant of interactive digital media is to be thought of as coupled to the machine, when the machine becomes errant, the participant shares in this condition. The interactive participant experiences limitations, glitches, or bugs first hand; they are, in some respects, party to the glitches and bugs and a part of the system’s limitations. New media theorists and artists such as Valie Export, have already pointed out that the subjective space of the viewer co-exists with the objective space of the machine. As a result the user is tied to the machine and thus connected to its glitches. This is because the work is not just constituted by the machine and its substrate but also by the way the human responds to the immersive environment. The work no longer takes place in a time and space that is separate from the spectator. Rather the time and space of the spectator and the time and space of the machine are both implicit in the realisation of the work. Thus, the spectator’s time and space has become filled with the potential for error. The participant and the machine are mutually engaged in a process of becoming virtual; they deliberate together, as one system that moves into the field of potential. References Benford, Steve, et al. Pushing Mixed Reality Boundaries. eRENA, 1999. Cascone, Kim. “The Aesthetics of Failure: ‘Post-Digital’ Tendencies in Contemporary Computer Music.” Computer Music Journal 24.4 (Winter 2000). DeLanda, Manuel. “Deleuze and the Open-Ended Becoming of the World”. New York, 1998. 23 Mar. 2006 http://www.diss.sense.uni-konstanz.de/virtualitaet/delanda.htm>. ———. Intensive Science and Virtual Philosophy. Transversals: New Directions in Philosophy. Ed. Keith Pearson. London: Continuum, 2002. Deleuze, Gilles, and Claire Parnet. “The Actual and the Virtual.” Dialogues 2. Ed. Eliot Ross Albert. London and New York: Continuum, 1987. Export, Valie. “Expanded Cinema as Expanded Reality”. 2003. 17 Mar. 2006 http://www.sensesofcinema.com/contents/03/28/expanded_cinema.html>. Lévy, Pierre. Becoming Virtual: Reality in the Digital Age. New York: Plenum Trade, 1998. Manovich, Lev. The Language of New Media. Cambridge: The MIT Press, 2001. ———. “Post-Media Aesthetics.” Locations. Ed. Astrid Sommer. Karlsruhe: ZKM: Centre for Art and Media, 2001. Massumi, Brian. “Sensing the Virtual, Building the Insensible.” Architectural Design 68.5/6 (1998): 16-24. Navas, Eduardo. “Net Art Review November 30 – December 6, 2003”. 2003. 20 Jul. 2007 http://www.netartreview.net/featarchv/11_30_03.html>. Rodowick, D. N. Gilles Deleuze’s Time Machine. Post-Contemporary Interventions. Eds. Stanley Fish and Fredric Jameson. Durham and London: Duke University Press, 1997. Citation reference for this article MLA Style Barker, Tim. "Error, the Unforeseen, and the Emergent: The Error and Interactive Media Art." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/03-barker.php>. APA Style Barker, T. (Oct. 2007) "Error, the Unforeseen, and the Emergent: The Error and Interactive Media Art," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/03-barker.php>.

APA, Harvard, Vancouver, ISO, and other styles

17

Denisova, Anastasia. "How Vladimir Putin’s Divorce Story Was Constructed and Received, or When the President Divorced His Wife and Married the Country Instead." M/C Journal 17, no.3 (June7, 2014). http://dx.doi.org/10.5204/mcj.813.

Full text

Abstract:

A politician’s political and personal selves have been in the spotlight of academic scholarship for hundreds of years, but only in recent years has a political ‘persona’ obtained new modes of mediation via networked media. New advancements in politics, technology, and media brought challenges to the traditional politics and personal self-representation of major leaders. Vladimir Putin’s divorce announcement in June 2013, posed a new challenge for his political self-mediation. A rather reserved leader (Loshak), he nonetheless broadcast his personal news to the large audience and made it in a very peculiar way, causing the media professionals and public to draw parallels with Soviet-era mediated politics and thereby evoke collective memories. This paper studies how Vladimir Putin’s divorce announcement was constructed and presented and also what response and opinion threads—satirical and humorous, ignorant and informed feedback—it achieved via media professionals and the general Twitter audience. Finally, this study aims to evaluate how Vladimir Putin’s political ‘persona’ was represented and perceived via these mixed channels of communication.According to classic studies of mediated political persona (Braudy; Meyrowitz; Corner), any public activity of a political persona is considered a part of their political performance. The history of political marketing can be traced back to ancient times, but it developed through the works of Renaissance and Medieval thinkers. Of particular prominence is Machiavelli’s The Prince with its famous “It is unnecessary for the prince to have all the good qualities I have enumerated, but it is very necessary to appear to have them” (cited in Corner 68). All those centuries-built developments and patterns of political self-representation have now taken on new forms as a result of the development of media industry and technology. Russian mediated politics has seen various examples of new ways of self-representation exercised by major politicians in the 2010s. For instance, former president Dmitry Medvedev was known as the “president with an iPad” (Pronina), as he was advocating technology and using social networks in order to seem more approachable and appear to be responsive to collecting feedback from the nation. Traditional media constantly highlighted Medvedev’s keen interest in Facebook and Twitter, which resulted in a growing public assumption that this new modern approach to self-representation may signify a new approach to governance (see Asmolov).Goffman’s classic study of the distinction between public and private life helps in linking political persona to celebrity persona. In his view the political presentation of self differs from the one in popular culture because politicians as opposed to entertainers have to conform to a set of ideals, projections, social stereotypes and cultural/national archetypes for their audience of voters (Goffman; Corner). A politician’s public persona has to be constantly reaffirming and proving the values he or she is promoting through their campaigns. Mediations of a political personhood can be projected in three main modes: visual, vocal, and kinetic (Ong; Mayhew; Corner). Visual representation follows the iconic paintings and photography in displaying the position, attitude, and associative contexts related to that. Vocal representation covers both content and format of a political speech, it is not only the articulated message, but also more important the persona speaking. Ong describes this close relation of the political and personal along with the interrelation of the message and the medium as “secondary orality”—voice, tone and volume make the difference. The third mode is kinetic representation and means the political persona in action and interaction. Overlapping of different strategies and structures of political self-representation fortifies the notion of performativity (Corner and Pels) in politics that becomes a core feature of the multidimensional representation of a mediated political self.The advancement of electronic media and interactive platforms has influenced political communication and set the new standard for the convergence of the political and personal life of a politician. On its own, the President Clinton/Monica Lewinsky affair raised the level of public awareness of the politician’s private life. It also allowed for widely distributed, contested, and mediated judgments of a politician’s personal actions. Lawrence and Bennett in their study of Lewinsky case’s academic and public response state that although the majority of American citizens did not expect the president to be the moral leader, they expressed ambivalence in their rendition of the importance of “moral leadership” by big politicians (438). The President Clinton/Lewinsky case adds a new dimension to Goffman and Corner’s respective discussions on the significance of values in the political persona self-representation. This case proves that values can not only be reinforced by one’s public persona, but those values can be (re)constructed by the press or public opinion. Values are becoming a contested trait in the contemporary mediated political persona. This view can be supported by Dmitry Medvedev’s case: although modern technology was known as his personal passion, it was publicised only with reference to his role as a public politician and specifically when Medvedev appeared with an iPad talking about modernisation at major meetings (Pronina). However, one can argue that one’s charisma can affect the impact of values in public self-representation of the politician. In addition, social networks add a new dimension to personified publicity. From Barack Obama’s ‘Yes We Can’ networked campaign in 2008 and through many more recent examples, we are witnessing the continuing process of the personalisation of politics (Corner and Pels). From one point of view, audiences tend to have more interest and sympathy in political individuals and their lifestyles rather than political parties and their programmes (Lawrence and Bennett; Corner and Pels). It should be noted that the interest towards political individuals does not fall apart from the historical logics of politics; it is only mediated in a new way. Max Weber’s notion of “leadership democracy” proves that political strategy is best distributed through the charismatic leadership imposing his will on the audience. This view can be strengthened by Le Bon’s concept of emotive connection of the leader and his crowd, and Adorno’s writings on the authoritarian personality also highlight the significance of the leader’s own natural and mediated persona in politics. What is new is the channels of mediation—modern audiences’ access to a politician’s private life is facilitated by new forms of media interactivity (Corner and Pels). This recent development calls for the new understanding of “persona” in politics. On one hand, the borderline between private and public becomes blurred and we are more exposed to the private self of a leader, but on the other hand, those politicians aware of new media literacy can create new structures of proximity and distance and construct a separate “persona” online, using digital media for their benefit (Corner and Pels). Russian official politics has developed a cautious attitude towards social networks in the post-Medvedev era - currently, President Vladimir Putin is not known for using social networks personally and transmits his views via his spokesperson. However, his personal charisma makes him overly present in digital media - through the images and texts shared both by his supporters and rivals. As opposed to Medvedev’s widely publicised “modernisation president” representation, Putin’s persona breaks the boundaries of limited traditional publicity and makes him recognised not only for his political activity, but looks, controversial expression, attitude to employees, and even personal life. That brings us back to Goffman, Corner and Lawrence and Bennett’s discussions on the interrelation of political values and personal traits in one’s political self-representation, making it evident that one’s strong personality can dominate over his political image and programme. Moreover, an assumption can be made that a politician’s persona may be more powerful than the narrative suggested by the constructed self-representation and new connotations may arise on the crossroads of this interaction.Russian President Divorce Announcement and Collective MemoryVladimir Putin’s divorce announcement was broadcast via traditional media on 6 June 2013 as a simple news story. The state broadcasting company Vesti-24 sent a journalist Polina Yermolayeva from their news bulletin to cover Vladimir Putin and Lyudmila Putin’s visit to a ballet production, Esmeralda, at the state Kremlin theatre. The news anchor’s introduction to the interview was ordinarily written and had no hints of the upcoming sensation. After the first couple and the journalist had discussed their opinion of the ballet (“beautiful music,” “flawless and light moves”), the reporter Yermolayeva suddenly asked: “You and Lyudmila are rarely seen together in public. Rumour has it that you do not live together. It is true?” Vladimir Putin and his wife exchanged a number of rather pre-scripted speeches stating that the first couple was getting a divorce as the children had grown old enough, and they would still stay friends and wished each other the best of luck. The whole interview lasted 3:25 minutes and became a big surprise for the country (Loshak; Sobchak).When applying the classification of three modes of political personhood (Corner; Ong) to Vladimir Putin’s divorce announcement, it becomes evident that all three modes—visual, vocal, and kinetic—were used. Television audiences watched their president speak freely to the unknown reporter, explain details of his life in his own words so that body language also was visible and conveyed additional information. The visual self-representation harkens back to classic, Soviet-style announcements: Vladimir Putin and Lyudmila Putina are dressed in classic monochrome suit and costume with a skirt respectively. They pose in front of the rather dull yet somewhat golden decorations of the Kremlin Theatre Hall, the walls themselves reflecting the glory and fanfare of the Soviet leadership and architecture. Vladimir Putin and his wife both talk calmly while Lyudmila appears even more relaxed than her husband (Sobchak). Although the speech looks prepared in advance (Loshak), it uses colloquial expressions and is delivered with emotional pauses and voice changes.However, close examination of not only the message but the medium of the divorce announcement reveals a vast number of intriguing symbols and parallels. First, although living in the era of digital media, Vladimir Putin chose to broadcast his personal news through a traditional television channel. Second, it was broadcast in a news programme making the breaking news of the president’s divorce, paradoxically, quite a mundane news event. Third, the semiotic construction of the divorce announcement bore a lot of connotations and synergies to the conservative, Soviet-style information distribution patterns. There are a few key symbols here that evoke collective memories: ballet, conservative political report on the government, and the stereotype of a patriarchal couple with a submissive wife (see Loshak; Rostovskiy). For example, since the perestroika of the 1990s, ballet has been widely perceived as a symbol of big political change and cause of public anxiety (Kachkaeva): this connotation was born in the 1990s when all channels were broadcasting Swan Lake round the clock while the White House was under attack. Holden reminds us that this practice was applied many times during major crises in Soviet history, thus creating a short link in the public subconscious of a ballet broadcast being symbolic of a political crisis or turmoil.Vladimir Putin Divorce: Traditional and Social Media ReceptionIn the first day after the divorce announcement Russian Twitter generated 180,000 tweets about Vladimir Putin’s divorce, and the hashtag #развод (“divorce”) became very popular. For the analysis that follows, Putin divorce tweets were collected by two methods: retrieved from traditional media coverage of Twitter talk on Putin’s divorce and from Twitter directly, using Topsy engine. Tweets were collected for one week, from the divorce announcement on 6 June to 13 June when the discussion declined and became repetitive. Data was collected using Snob.ru, Kommersant.ru, Forbes.ru, other media outlets and Topsy. The results were then combined and evaluated.Some of those tweets provided a satirical commentary to the divorce news and can be classified as “memes.” An “Internet meme” is a contagious message, a symbolic pattern of information spread online (Lankshear and Knobel; Shifman). Memes are viral texts that are shared online after being adjusted/altered or developed on the way. Starting from 1976 when Richard Dawkins coined the term, memes have been under media scholarship scrutiny and the term has been widely contested in various sciences. In Internet research studies, memes are defined as “condensed images that stimulate visual, verbal, musical, or behavioral associations that people can easily imitate and transmit to others” (Pickerel, Jorgensen, and Bennett). The open character of memes makes them valuable tools for political discourse in a modern highly mediated environment.Qualitative analysis of the most popular and widely shared tweets reveals several strong threads and themes round Putin’s divorce discussion. According to Burzhskaya, many users created memes with jokes about the relationship between Vladimir Putin and Prime Minister Dmitry Medvedev. For instance, “He should have tied up his relationship with Dmitry Anatolyevich long ago” or “So actually Medvedev is the case?” were among popular memes generated. Another collection of memework contained a comment that, according to the Russian legislation, Putin’s ex-wife should get half of their wealth, in this case—half of the country. This thread was followed by the discussion whether the separation/border of her share of Russia should use the Ural Mountains as the borderline. Another group of Twitter users applied the Russian president’s divorce announcement to other countries’ politics. Thus one user wrote “Take Yanukovich to the ballet” implying that Ukrainian president Viktor Yanukovich (who was still a legitimate president in June 2013) should also be taken to the ballet to trigger changes in the political life in Ukraine. Twitter celebrity and well-known Russian actress and comedian Tatiana Lazareva wrote “In my opinion, it is a scam”, punning on the slang meaning of the word “razvod” (“divorce”) in Russian that can also mean “fraud” or “con”. Famous Russian journalist Dmitry Olshansky used his Twitter account to draw a historical parallel between Putin and other Russian and Soviet political leaders’ marital life. He noted that such Russian leaders as Tsar Nikolay the Second and Mikhail Gorbachev who loved their wives and were known to be good husbands were not successful managers of the state. In contrast, lone rulers of Russia such as Joseph Stalin proved to be leaders who loved their country first and gained a lot of support from their electorate because of that lonely love. Popular print and online journalist Oleg Kashin picked up on that specific idea: he quoted Vladimir Putin’s press secretary who explained that the president had declared that he would now spend more time working for the prosperity of the country.Twitter users were exchanging not only 140 symbol texts but also satirical images and other visual memes based on the divorce announcement. Those who suggested that Vladimir Putin should have divorced the country instead portrayed Lyudmila Putina and Vladimir holding candles and wearing funereal black with various taglines discussing how the country would now be split. Other users contributed visual memes jamming the television show Bachelor imagery and font with Vladimir Putin’s face and an announcement that the most desirable bachelor in the country is now its president. A similar idea was put into jammed images of the Let’s Get Married television show using Vladimir Putin’s face or name linked with a humorous comment that he could try those shows to find a new wife. One more thread of Twitter memes on Putin’s divorce used the name of Alina Kabaeva, Olympic gymnast who is rumoured by the press to be in relationship with the leader (Daily Mail Reporter). She was mentioned in plenty of visual and textual memes. Probably, the most popular visual meme (Burzhskaya; Topsy) used the one-liner from a famous Soviet comedy Ivan Vasylievich Menyaet Professiyu: it uses a joyful exclamation of an actress who learns that her love interest, a movie director, is leaving his wife so that the lovers can now fly to a resort together. Alina Kabaeva, the purported love interest of Putin, was jammed to be that actress as she announced the “triumphal” resort vacation plan to a girlfriend over the phone.Vladimir Putin’s 2013 divorce announcement presented new challenges for his personal and political self-representation and revealed new traits of the Russian president’s interaction with the nation. As the news of Vladimir and Lyudmila Putin’s divorce was broadcast via traditional media in a non-interactive television format, commentary on the event advanced only through the following week’s media coverage and the massive activity on social networks. It has still to be examined whether Vladimir Putin’s political advisors intentionally included many symbols of collective memory in the original and staid broadcast announcement. However, the response from traditional and social media shows that both Russian journalists and regular Twitter users were inclined to use humour and satire when discussing the personal life of a major political leader. Despite this appearance of an active counter-political sphere via social networks, the majority of tweets retrieved also revealed a certain level of respect towards Vladimir Putin’s privacy as few popular jokes or memes were aggressive, offensive or humiliating. Most popular memes on Vladimir Putin’s divorce linked this announcement to the political life of Russia, the political situation in other countries, and television shows and popular culture. Some of the memes, though, advanced the idea that Vladimir Putin should have divorced the country instead. The analysis also shows how a charismatic leader can affect or reconstruct the “values” he represents. In Vladimir Putin’s divorce event, his personality is the main focus of discussion both by traditional and new media. However, he is not judged for his personal choices as the online social media users provide rather mild commentary and jokes about them. The event and the subsequent online discourse, images and texts not only identify how Putin’s politics have become personified, the research also uncovers how the audience/citizenry online often see the country as a “persona” as well. Some Internet users suggested Putin’s marriage to the country; this mystified, if not mythologised view reinforces Vladimir Putin’s personal and political charisma.Conclusively, Vladimir Putin’s divorce case study shows how political and private persona are being mediated and merged via mixed channels of communication. The ever-changing nature of the political leader portrayal in the mediated environment of the 2010s opens new challenges for further research on the modes and ways for political persona representation in modern Russia.References Adorno, Theodor W. The Authoritarian Personality. New York, 1969 (1950).Ankersmit, Franklin R. Aesthetic Politics: Political Philosophy beyond Fact and Value. Stanford University Press, 1996.Asmolov, Gregory. “The Kremlin’s Cameras and Virtual Potemkin Villages: ICT and the Construction of Statehood.” Bits and Atoms: Information and Communication Technology in Areas of Limited Statehood (2014): 30.Bakhtin, Mikhail Mikhailovich. The Dialogic Imagination: Four Essays. University of Texas Press, 1981.Braudy, Leo. The Frenzy of Renown: Fame & Its History. New York: Oxford University Press, 1986.Burzhskaya, Kseniya. “Galochka, Ti Seichas Umryosh!” [“Galochka, You Are Going to Die!”]. Snob.ru 7 June 2013. April 2014 ‹http://www.snob.ru/profile/9947/blog/61372›.Corner, John, and Dick Pels. “Introduction: The Re-Styling of Politics.” Media and the Restyling of Politics. Ed. John Corner and Dick Pels. London: Sage, 2003: 1-19.Corner, John. “Mediated Persona and Political Culture.” Media and the Restyling of Politics. Ed. John Corner and Dick Pels. London: Sage, 2003: 67-85.Daily Mail Reporter. “Has President Putin Married Former Olympic Gymnast? Alina Kabayeva Flashes ‘Wedding Ring’ at TV Cameras.” DailyMail.co.uk 15 Feb. 2014. April 2014 ‹http://www.dailymail.co.uk/news/article-2560278/Has-President-Putin-married-former-Olympic-gymnast-Alina-Kabayeva-flashes-wedding-ring-TV-cameras.html›.Dawkins, Richard. The Selfish Gene. Oxford University Press, 2006.Goffman, Erving. The Presentation of Self in Everyday Life. New York: Anchor Books, 1995.Holden, Stephen. “Through the Looking Glass of History.” New York Times 22 Mar. 2011. April 2014 ‹http://www.nytimes.com/2011/03/23/movies/my-perestroika-about-growing-up-in-russia-review.html?_r=0›. Kavanagh, Dennis. Election Campaigning: The New Marketing of Politics. Oxford: Blackwell, 1995.Kotova, Yulia. “‘Otstoyala Vakhtu’: Vladimir I Lyudmila Putiny Ob’yavili o Razvode” [“‘Fulfilled the Duty’: Vladimir and Lyudmila Putin Announced a Divorce”]. Forbes.ru. April 2014 ‹http://www.forbes.ru/news/240295-vladimir-putin-razvelsya-s-zhenoi-lyudmiloi›.Lankshear, Colin, and Michele Knobel. “Sampling ‘the New’ in New Literacies.” A New Literacies Sampler. New York: Peter Lang, 2007. 1-24.Lawrence, Regina G., and W. Lance Bennett. “Rethinking Media Politics and Public Opinion: Reactions to the Clinton-Lewinsky Scandal.” Political Science Quarterly 116.3 (2001): 425-446.Le Bon, Gustave. The Crowd. New York: Viking, 1960 (1895).Loshak, Viktor. “Vyvody Nuzhno Delat’ Iz Togo, Kak Zhivet Strana, a Ne Semya, Pust’ Dazhe Samaya Pervaya” [“You need to make conclusions on the life of the country, not of the family even though of the highest range”]. Kommersant.ru 7 June 2013. April 2014 ‹http://www.kommersant.ru/doc/2206093›.Mayhew, Leon H. The New Public: Professional Communication and the Means of Social Influence. Cambridge University Press, 1997.Medvedev, Dmitry. “Interview to The Times [Russian transcript].” Government of the Russian Federation 30 July 2012. May 2014 ‹http://government.ru/docs/19842›.Meywrowitz, Joshua. No Sense of Place. New York: Oxford University Press, 1985.Ong, Walter J. Orality and Literacy. London: Methuen, 1982.Pickerel, Wendi, Helena Jorgensen, and Lance Bennett. "Culture Jams and Meme Warfare: Kalle Lasn, Adbusters, and Media Activism." Center for Communication and Civic Engagement, 2002.Pronina, Lyubov. “Dreams of an iPad Economy for Russia.” BloombergBusinessWeek 3 Feb. 2011. May 2014 ‹http://www.businessweek.com/magazine/content/11_07/b4215011283273.htm›.Rostovskiy, Mikhail. “Razvod Po-Prezidentski” [“Divorce President-Style”]. Mk.ru 7 June 2013. April 2014 ‹http://www.mk.ru/politics/russia/article/2013/06/07/865979-razvod-poprezidentski.html›.Shifman, Limor. “Memes in a Digital World: Reconciling with a Conceptual Troublemaker.” Journal of Computer-Mediated Communication 18.3 (2013): 362-77.Sobchak, Kseniya. “Razvod Pod Lupoj” [“Divorce under Magnifyin Glass”]. Snob.ru 7 June 2013. April 2013 http://www.snob.ru/profile/24691/blog/61395›.Sokolov, Mikhail. “Russkiy Facebook o Razvode Chety Putinykh” [“Russian Facebook on Putin Divorce”]. Radio Svoboda 7 June 2013. May 2014 ‹http://www.svoboda.org/content/article/25009616.html›.Swanson, David L., and Paolo Mancini, eds. Politics, Media, and Modern Democracy: An International Study of Innovations in Electoral Campaigning and Their Consequences. Greenwood Publishing Group, 1996.Thompson, John B. Political Scandal. Cambridge: Polity, 2000.Vesti.ru. “Vladimir I Lyudmila Putiny: Razvod Byl Nashim Obschim Resheniem” [“Vladimir and Lyudmila Putin: Divorce Was Our Joint Decision”]. 6 June 2013. April 2014 ‹http://www.vesti.ru/doc.html?id=1092091›. Weber, Max. From Max Weber: Essays in Sociology. Routledge, 2009.

APA, Harvard, Vancouver, ISO, and other styles

18

Allen, Rob. "Lost and Now Found: The Search for the Hidden and Forgotten." M/C Journal 20, no.5 (October13, 2017). http://dx.doi.org/10.5204/mcj.1290.

Full text

Abstract:

The Digital TurnMuch of the 19th century disappeared from public view during the 20th century. Historians recovered what they could from archives and libraries, with the easy pickings-the famous and the fortunate-coming first. Latterly, social and political historians of different hues determinedly sought out the more hidden, forgotten, and marginalised. However, there were always limitations to resources-time, money, location, as well as purpose, opportunity, and permission. 'History' was principally a professionalised and privileged activity dominated by academics who had preferential access to, and significant control over, the resources, technologies and skills required, as well as the social, economic and cultural framework within which history was recovered, interpreted, approved and disseminated.Digitisation and the broader development of new communication technologies has, however, transformed historical research processes and practice dramatically, removing many constraints, opening up many opportunities, and allowing many others than the professional historian to trace and track what would have remained hidden, forgotten, or difficult to find, as well as verify (or otherwise), what has already been claimed and concluded. In the 21st century, the SEARCH button has become a dominant tool of research. This, along with other technological and media developments, has altered the practice of historians-professional or 'public'-who can now range deep and wide in the collection, portrayal and dissemination of historical information, in and out of the confines of the traditional institutional walls of retained information, academia, location, and national boundaries.This incorporation of digital technologies into academic historical practice generally, has raised, as Cohen and Rosenzweig, in their book Digital History, identified a decade ago, not just promises, but perils. For the historian, there has been the move, through digitisation, from the relative scarcity and inaccessibility of historical material to its (over) abundance, but also the emerging acceptance that, out of both necessity and preference, a hybridity of sources will be the foreseeable way forward. There has also been a significant shift, as De Groot notes in his book Consuming History, in the often conflicted relationship between popular/public history and academic history, and the professional and the 'amateur' historian. This has brought a potentially beneficial democratization of historical practice but also an associated set of concerns around the loss of control of both practice and product of the professional historian. Additionally, the development of digital tools for the collection and dissemination of 'history' has raised fears around the commercialised development of the subject's brand, products and commodities. This article considers the significance and implications of some of these changes through one protracted act of recovery and reclamation in which the digital made the difference: the life of a notorious 19th century professional agitator on both sides of the Atlantic, John De Morgan. A man thought lost, but now found."Who Is John De Morgan?" The search began in 1981, linked to the study of contemporary "race riots" in South East London. The initial purpose was to determine whether there was a history of rioting in the area. In the Local History Library, a calm and dusty backwater, an early find was a fading, but evocative and puzzling, photograph of "The Plumstead Common Riots" of 1876. It showed a group of men and women, posing for the photographer on a hillside-the technology required stillness, even in the middle of a riot-spades in hand, filling in a Mr. Jacob's sandpits, illegally dug from what was supposed to be common land. The leader of this, and other similar riots around England, was John De Morgan. A local journalist who covered the riots commented: "Of Mr. De Morgan little is known before or since the period in which he flashed meteorlike through our section of the atmosphere, but he was indisputably a remarkable man" (Vincent 588). Thus began a trek, much interrupted, sometimes unmapped and haphazard, to discover more about this 'remarkable man'. "Who is John De Morgan" was a question frequently asked by his many contemporary antagonists, and by subsequent historians, and one to which De Morgan deliberately gave few answers. The obvious place to start the search was the British Museum Reading Room, resplendent in its Victorian grandeur, the huge card catalogue still in the 1980s the dominating technology. Together with the Library's newspaper branch at Colindale, this was likely to be the repository of all that might then easily be known about De Morgan.From 1869, at the age of 21, it appeared that De Morgan had embarked on a life of radical politics that took him through the UK, made him notorious, lead to accusations of treasonable activities, sent him to jail twice, before he departed unexpectedly to the USA in 1880. During that period, he was involved with virtually every imaginable radical cause, at various times a temperance advocate, a spiritualist, a First Internationalist, a Republican, a Tichbornite, a Commoner, an anti-vaccinator, an advanced Liberal, a parliamentary candidate, a Home Ruler. As a radical, he, like many radicals of the period, "zigzagged nomadically through the mayhem of nineteenth century politics fighting various foes in the press, the clubs, the halls, the pulpit and on the street" (Kazin 202). He promoted himself as the "People's Advocate, Champion and Friend" (Allen). Never a joiner or follower, he established a variety of organizations, became a professional agitator and orator, and supported himself and his politics through lecturing and journalism. Able to attract huge crowds to "monster meetings", he achieved fame, or more correctly notoriety. And then, in 1880, broke and in despair, he disappeared from public view by emigrating to the USA.LostThe view of De Morgan as a "flashing meteor" was held by many in the 1870s. Historians of the 20th century took a similar position and, while considering him intriguing and culturally interesting, normally dispatched him to the footnotes. By the latter part of the 20th century, he was described as "one of the most notorious radicals of the 1870s yet remains a shadowy figure" and was generally dismissed as "a swashbuckling demagogue," a "democratic messiah," and" if not a bandit … at least an adventurer" (Allen 684). His politics were deemed to be reactionary, peripheral, and, worst of all, populist. He was certainly not of sufficient interest to pursue across the Atlantic. In this dismissal, he fell foul of the highly politicised professional culture of mid-to-late 20th-century academic historians. In particular, the lack of any significant direct linkage to the story of the rise of a working class, and specifically the British Labour party, left individuals like De Morgan in the margins and footnotes. However, in terms of historical practice, it was also the case that his mysterious entry into public life, his rapid rise to brief notability and notoriety, and his sudden disappearance, made the investigation of his career too technically difficult to be worthwhile.The footprints of the forgotten may occasionally turn up in the archived papers of the important, or in distant public archives and records, but the primary sources are the newspapers of the time. De Morgan was a regular, almost daily, visitor to the pages of the multitude of newspapers, local and national, that were published in Victorian Britain and Gilded Age USA. He also published his own, usually short-lived and sometimes eponymous, newspapers: De Morgan's Monthly and De Morgan's Weekly as well as the splendidly titled People's Advocate and National Vindicator of Right versus Wrong and the deceptively titled, highly radical, House and Home. He was highly mobile: he noted, without too much hyperbole, that in the 404 days between his English prison sentences in the mid-1870s, he had 465 meetings, travelled 32,000 miles, and addressed 500,000 people. Thus the newspapers of the time are littered with often detailed and vibrant accounts of his speeches, demonstrations, and riots.Nonetheless, the 20th-century technologies of access and retrieval continued to limit discovery. The white gloves, cradles, pencils and paper of the library or archive, sometimes supplemented by the century-old 'new' technology of the microfilm, all enveloped in a culture of hallowed (and pleasurable) silence, restricted the researcher looking to move into the lesser known and certainly the unknown. The fact that most of De Morgan's life was spent, it was thought, outside of England, and outside the purview of the British Library, only exacerbated the problem. At a time when a historian had to travel to the sources and then work directly on them, pencil in hand, it needed more than curiosity to keep searching. Even as many historians in the late part of the century shifted their centre of gravity from the known to the unknown and from the great to the ordinary, in any form of intellectual or resource cost-benefit analysis, De Morgan was a non-starter.UnknownOn the subject of his early life, De Morgan was tantalisingly and deliberately vague. In his speeches and newspapers, he often leaked his personal and emotional struggles as well as his political battles. However, when it came to his biographical story, he veered between the untruthful, the denial, and the obscure. To the twentieth century observer, his life began in 1869 at the age of 21 and ended at the age of 32. His various political campaign "biographies" gave some hints, but what little he did give away was often vague, coy and/or unlikely. His name was actually John Francis Morgan, but he never formally acknowledged it. He claimed, and was very proud, to be Irish and to have been educated in London and at Cambridge University (possible but untrue), and also to have been "for the first twenty years of his life directly or indirectly a railway servant," and to have been a "boy orator" from the age of ten (unlikely but true). He promised that "Some day-nay any day-that the public desire it, I am ready to tell the story of my strange life from earliest recollection to the present time" (St. Clair 4). He never did and the 20th century could unearth little evidence in relation to any of his claims.The blend of the vague, the unlikely and the unverifiable-combined with an inclination to self-glorification and hyperbole-surrounded De Morgan with an aura, for historians as well as contemporaries, of the self-seeking, untrustworthy charlatan with something to hide and little to say. Therefore, as the 20th century moved to closure, the search for John De Morgan did so as well. Though interesting, he gave most value in contextualising the lives of Victorian radicals more generally. He headed back to the footnotes.Now FoundMeanwhile, the technologies underpinning academic practice generally, and history specifically, had changed. The photocopier, personal computer, Internet, and mobile device, had arrived. They formed the basis for both resistance and revolution in academic practices. For a while, the analytical skills of the academic community were concentrated on the perils as much as the promises of a "digital history" (Cohen and Rosenzweig Digital).But as the Millennium turned, and the academic community itself spawned, inter alia, Google, the practical advantages of digitisation for history forced themselves on people. Google enabled the confident searching from a neutral place for things known and unknown; information moved to the user more easily in both time and space. The culture and technologies of gathering, retrieval, analysis, presentation and preservation altered dramatically and, as a result, the traditional powers of gatekeepers, institutions and professional historians was redistributed (De Groot). Access and abundance, arguably over-abundance, became the platform for the management of historical information. For the search for De Morgan, the door reopened. The increased global electronic access to extensive databases, catalogues, archives, and public records, as well as people who knew, or wanted to know, something, opened up opportunities that have been rapidly utilised and expanded over the last decade. Both professional and "amateur" historians moved into a space that made the previously difficult to know or unknowable now accessible.Inevitably, the development of digital newspaper archives was particularly crucial to seeking and finding John De Morgan. After some faulty starts in the early 2000s, characterised as a "wild west" and a "gold rush" (Fyfe 566), comprehensive digitised newspaper archives became available. While still not perfect, in terms of coverage and quality, it is a transforming technology. In the UK, the British Newspaper Archive (BNA)-in pursuit of the goal of the digitising of all UK newspapers-now has over 20 million pages. Each month presents some more of De Morgan. Similarly, in the US, Fulton History, a free newspaper archive run by retired computer engineer Tom Tryniski, now has nearly 40 million pages of New York newspapers. The almost daily footprints of De Morgan's radical life can now be seen, and the lives of the social networks within which he worked on both sides of the Atlantic, come easily into view even from a desk in New Zealand.The Internet also allows connections between researchers, both academic and 'public', bringing into reach resources not otherwise knowable: a Scottish genealogist with a mass of data on De Morgan's family; a Californian with the historian's pot of gold, a collection of over 200 letters received by De Morgan over a 50 year period; a Leeds Public Library blogger uncovering spectacular, but rarely seen, Victorian electoral cartoons which explain De Morgan's precipitate departure to the USA. These discoveries would not have happened without the infrastructure of the Internet, web site, blog, and e-mail. Just how different searching is can be seen in the following recent scenario, one of many now occurring. An addition in 2017 to the BNA shows a Master J.F. Morgan, aged 13, giving lectures on temperance in Ledbury in 1861, luckily a census year. A check of the census through Ancestry shows that Master Morgan was born in Lincolnshire in England, and a quick look at the 1851 census shows him living on an isolated blustery hill in Yorkshire in a railway encampment, along with 250 navvies, as his father, James, works on the construction of a tunnel. Suddenly, literally within the hour, the 20-year search for the childhood of John De Morgan, the supposedly Irish-born "gentleman who repudiated his class," has taken a significant turn.At the end of the 20th century, despite many efforts, John De Morgan was therefore a partial character bounded by what he said and didn't say, what others believed, and the intellectual and historiographical priorities, technologies, tools and processes of that century. In effect, he "lived" historically for a less than a quarter of his life. Without digitisation, much would have remained hidden; with it there has been, and will still be, much to find. De Morgan hid himself and the 20th century forgot him. But as the technologies have changed, and with it the structures of historical practice, the question that even De Morgan himself posed – "Who is John De Morgan?" – can now be addressed.SearchingDigitisation brings undoubted benefits, but its impact goes a long way beyond the improved search and detection capabilities, into a range of technological developments of communication and media that impact on practice, practitioners, institutions, and 'history' itself. A dominant issue for the academic community is the control of "history." De Groot, in his book Consuming History, considers how history now works in contemporary popular culture and, in particular, examines the development of the sometimes conflicted relationship between popular/public history and academic history, and the professional and the 'amateur' historian.The traditional legitimacy of professional historians has, many argue, been eroded by shifts in technology and access with the power of traditional cultural gatekeepers being undermined, bypassing the established control of institutions and professional historian. While most academics now embrace the primary tools of so-called "digital history," they remain, De Groot argues, worried that "history" is in danger of becoming part of a discourse of leisure, not a professionalized arena (18). An additional concern is the role of the global capitalist market, which is developing, or even taking over, 'history' as a brand, product and commodity with overt fiscal value. Here the huge impact of newspaper archives and genealogical software (sometimes owned in tandem) is of particular concern.There is also the new challenge of "navigating the chaos of abundance in online resources" (De Groot 68). By 2005, it had become clear that:the digital era seems likely to confront historians-who were more likely in the past to worry about the scarcity of surviving evidence from the past-with a new 'problem' of abundance. A much deeper and denser historical record, especially one in digital form seems like an incredible opportunity and a gift. But its overwhelming size means that we will have to spend a lot of time looking at this particular gift horse in mouth. (Cohen and Rosenzweig, Web).This easily accessible abundance imposes much higher standards of evidence on the historian. The acceptance within the traditional model that much could simply not be done or known with the resources available meant that there was a greater allowance for not knowing. But with a search button and public access, democratizing the process, the consumer as well as the producer can see, and find, for themselves.Taking on some of these challenges, Zaagsma, having reminded us that the history of digital humanities goes back at least 60 years, notes the need to get rid of the "myth that historical practice can be uncoupled from technological, and thus methodological developments, and that going digital is a choice, which, I cannot emphasis strongly enough, it is not" (14). There is no longer a digital history which is separate from history, and with digital technologies that are now ubiquitous and pervasive, historians have accepted or must quickly face a fundamental break with past practices. However, also noting that the great majority of archival material is not digitised and is unlikely to be so, Zaagsma concludes that hybridity will be the "new normal," combining "traditional/analogue and new/digital practices at least in information gathering" (17).ConclusionA decade on from Cohen and Rozenzweig's "Perils and Promises," the digital is a given. Both historical practice and historians have changed, though it is a work in progress. An early pioneer of the use of computers in the humanities, Robert Busa wrote in 1980 that "the principal aim is the enhancement of the quality, depth and extension of research and not merely the lessening of human effort and time" (89). Twenty years later, as Google was launched, Jordanov, taking on those who would dismiss public history as "mere" popularization, entertainment or propaganda, argued for the "need to develop coherent positions on the relationships between academic history, the media, institutions…and popular culture" (149). As the digital turn continues, and the SEARCH button is just one part of that, all historians-professional or "amateur"-will take advantage of opportunities that technologies have opened up. Looking across the whole range of transformations in recent decades, De Groot concludes: "Increasingly users of history are accessing the past through complex and innovative media and this is reconfiguring their sense of themselves, the world they live in and what history itself might be about" (310). ReferencesAllen, Rob. "'The People's Advocate, Champion and Friend': The Transatlantic Career of Citizen John De Morgan (1848-1926)." Historical Research 86.234 (2013): 684-711.Busa, Roberto. "The Annals of Humanities Computing: The Index Thomisticus." Computers and the Humanities 14.2 (1980): 83-90.Cohen, Daniel J., and Roy Rosenzweig. Digital History: A Guide to Gathering, Preserving, and Presenting the Past on the Web. Philadelphia, PA: U Pennsylvania P, 2005.———. "Web of Lies? Historical Knowledge on the Internet." First Monday 10.12 (2005).De Groot, Jerome. Consuming History: Historians and Heritage in Contemporary Popular Culture. 2nd ed. Abingdon: Routledge, 2016.De Morgan, John. Who Is John De Morgan? A Few Words of Explanation, with Portrait. By a Free and Independent Elector of Leicester. London, 1877.Fyfe, Paul. "An Archaeology of Victorian Newspapers." Victorian Periodicals Review 49.4 (2016): 546-77."Interchange: The Promise of Digital History." Journal of American History 95.2 (2008): 452-91.Johnston, Leslie. "Before You Were Born, We Were Digitizing Texts." The Signal 9 Dec. 2012, Library of Congress. <https://blogs.loc.gov/thesignal/292/12/before-you-were-born-we-were-digitizing-texts>.Jordanova, Ludmilla. History in Practice. 2nd ed. London: Arnold, 2000.Kazin, Michael. A Godly Hero: The Life of William Jennings Bryan. New York: Anchor Books, 2006.Saint-Clair, Sylvester. Sketch of the Life and Labours of J. De Morgan, Elocutionist, and Tribune of the People. Leeds: De Morgan & Co., 1880.Vincent, William T. The Records of the Woolwich District, Vol. II. Woolwich: J.P. Jackson, 1890.Zaagsma, Gerban. "On Digital History." BMGN-Low Countries Historical Review 128.4 (2013): 3-29.

APA, Harvard, Vancouver, ISO, and other styles

19

Dominey-Howes, Dale. "Tsunami Waves of Destruction: The Creation of the “New Australian Catastrophe”." M/C Journal 16, no.1 (March18, 2013). http://dx.doi.org/10.5204/mcj.594.

Full text

Abstract:

Introduction The aim of this paper is to examine whether recent catastrophic tsunamis have driven a cultural shift in the awareness of Australians to the danger associated with this natural hazard and whether the media have contributed to the emergence of “tsunami” as a new Australian catastrophe. Prior to the devastating 2004 Indian Ocean Tsunami disaster (2004 IOT), tsunamis as a type of hazard capable of generating widespread catastrophe were not well known by the general public and had barely registered within the wider scientific community. As a university based lecturer who specialises in natural disasters, I always started my public talks or student lectures with an attempt at a detailed description of what a tsunami is. With little high quality visual and media imagery to use, this was not easy. The Australian geologist Ted Bryant was right when he named his 2001 book Tsunami: The Underrated Hazard. That changed on 26 December 2004 when the third largest earthquake ever recorded occurred northwest of Sumatra, Indonesia, triggering the most catastrophic tsunami ever experienced. The 2004 IOT claimed at least 220,000 lives—probably more—injured tens of thousands, destroyed widespread coastal infrastructure and left millions homeless. Beyond the catastrophic impacts, this tsunami was conspicuous because, for the first time, such a devastating tsunami was widely captured on video and other forms of moving and still imagery. This occurred for two reasons. Firstly, the tsunami took place during daylight hours in good weather conditions—factors conducive to capturing high quality visual images. Secondly, many people—both local residents and westerners who were on beachside holidays and at the coast at multiple locations impacted by the tsunami—were able to capture images of the tsunami on their cameras, videos, and smart phones. The extensive media coverage—including horrifying television, video, and still imagery that raced around the globe in the hours and days after the tsunami, filling our television screens, homes, and lives regardless of where we lived—had a dramatic effect. This single event drove a quantum shift in the wider cultural awareness of this type of catastrophe and acted as a catalyst for improved individual and societal understanding of the nature and effects of disaster landscapes. Since this event, there have been several notable tsunamis, including the March 2011 Japan catastrophe. Once again, this event occurred during daylight hours and was widely captured by multiple forms of media. These events have resulted in a cascade of media coverage across television, radio, movie, and documentary channels, in the print media, online, and in the popular press and on social media—very little of which was available prior to 2004. Much of this has been documentary and informative in style, but there have also been numerous television dramas and movies. For example, an episode of the popular American television series CSI Miami entitled Crime Wave (Season 3, Episode 7) featured a tsunami, triggered by a volcanic eruption in the Atlantic and impacting Miami, as the backdrop to a standard crime-filled episode ("CSI," IMDb; Wikipedia). In 2010, Warner Bros Studios released the supernatural drama fantasy film Hereafter directed by Clint Eastwood. In the movie, a television journalist survives a near-death experience during the 2004 IOT in what might be the most dramatic, and probably accurate, cinematic portrayal of a tsunami ("Hereafter," IMDb; Wikipedia). Thus, these creative and entertaining forms of media, influenced by the catastrophic nature of tsunamis, are impetuses for creativity that also contribute to a transformation of cultural knowledge of catastrophe. The transformative potential of creative media, together with national and intergovernmental disaster risk reduction activity such as community education, awareness campaigns, community evacuation planning and drills, may be indirectly inferred from rapid and positive community behavioural responses. By this I mean many people in coastal communities who experience strong earthquakes are starting a process of self-evacuation, even if regional tsunami warning centres have not issued an alert or warning. For example, when people in coastal locations in Samoa felt a large earthquake on 29 September 2009, many self-evacuated to higher ground or sought information and instruction from relevant authorities because they expected a tsunami to occur. When interviewed, survivors stated that the memory of television and media coverage of the 2004 IOT acted as a catalyst for their affirmative behavioural response (Dominey-Howes and Thaman 1). Thus, individual and community cultural understandings of the nature and effects of tsunami catastrophes are incredibly important for shaping resilience and reducing vulnerability. However, this cultural shift is not playing out evenly.Are Australia and Its People at Risk from Tsunamis?Prior to the 2004 IOT, there was little discussion about, research in to, or awareness about tsunamis and Australia. Ted Bryant from the University of Wollongong had controversially proposed that Australia had been affected by tsunamis much bigger than the 2004 IOT six to eight times during the last 10,000 years and that it was only a matter of when, not if, such an event repeated itself (Bryant, "Second Edition"). Whilst his claims had received some media attention, his ideas did not achieve widespread scientific, cultural, or community acceptance. Not-with-standing this, Australia has been affected by more than 60 small tsunamis since European colonisation (Dominey-Howes 239). Indeed, the 2004 IOT and 2006 Java tsunami caused significant flooding of parts of the Northern Territory and Western Australia (Prendergast and Brown 69). However, the affected areas were sparsely populated and experienced very little in the way of damage or loss. Thus they did not cross any sort of critical threshold of “catastrophe” and failed to achieve meaningful community consciousness—they were not agents of cultural transformation.Regardless of the risk faced by Australia’s coastline, Australians travel to, and holiday in, places that experience tsunamis. In fact, 26 Australians were killed during the 2004 IOT (DFAT) and five were killed by the September 2009 South Pacific tsunami (Caldwell et al. 26). What Role Do the Media Play in Preparing for and Responding to Catastrophe?Regardless of the type of hazard/disaster/catastrophe, the key functions the media play include (but are not limited to): pre-event community education, awareness raising, and planning and preparations; during-event preparation and action, including status updates, evacuation warnings and notices, and recommendations for affirmative behaviours; and post-event responses and recovery actions to follow, including where to gain aid and support. Further, the media also play a role in providing a forum for debate and post-event analysis and reflection, as a mechanism to hold decision makers to account. From time to time, the media also provide a platform for examining who, if anyone, might be to blame for losses sustained during catastrophes and can act as a powerful conduit for driving socio-cultural, behavioural, and policy change. Many of these functions are elegantly described and a series of best practices outlined by The Caribbean Disaster Emergency Management Agency in a tsunami specific publication freely available online (CDEMA 1). What Has Been the Media Coverage in Australia about Tsunamis and Their Effects on Australians?A manifest contents analysis of media material covering tsunamis over the last decade using the framework of Cox et al. reveals that coverage falls into distinctive and repetitive forms or themes. After tsunamis, I have collected articles (more than 130 to date) published in key Australian national broadsheets (e.g., The Australian and Sydney Morning Herald) and tabloid (e.g., The Telegraph) newspapers and have watched on television and monitored on social media, such as YouTube and Facebook, the types of coverage given to tsunamis either affecting Australia, or Australians domestically and overseas. In all cases, I continued to monitor and collect these stories and accounts for a fixed period of four weeks after each event, commencing on the day of the tsunami. The themes raised in the coverage include: the nature of the event. For example, where, when, why did it occur, how big was it, and what were the effects; what emergency response and recovery actions are being undertaken by the emergency services and how these are being provided; exploration of how the event was made worse or better by poor/good planning and prior knowledge, action or inaction, confusion and misunderstanding; the attribution of blame and responsibility; the good news story—often the discovery and rescue of an “iconic victim/survivor”—usually a child days to weeks later; and follow-up reporting weeks to months later and on anniversaries. This coverage generally focuses on how things are improving and is often juxtaposed with the ongoing suffering of victims. I select the word “victims” purposefully for the media frequently prefer this over the more affirmative “survivor.”The media seldom carry reports of “behind the scenes” disaster preparatory work such as community education programs, the development and installation of warning and monitoring systems, and ongoing training and policy work by response agencies and governments since such stories tend to be less glamorous in terms of the disaster gore factor and less newsworthy (Cox et al. 469; Miles and Morse 365; Ploughman 308).With regard to Australians specifically, the manifest contents analysis reveals that coverage can be described as follows. First, it focuses on those Australians killed and injured. Such coverage provides elements of a biography of the victims, telling their stories, personalising these individuals so we build empathy for their suffering and the suffering of their families. The Australian victims are not unknown strangers—they are named and pictures of their smiling faces are printed or broadcast. Second, the media describe and catalogue the loss and ongoing suffering of the victims (survivors). Third, the media use phrases to describe Australians such as “innocent victims in the wrong place at the wrong time.” This narrative establishes the sense that these “innocents” have been somehow wronged and transgressed and that suffering should not be experienced by them. The fourth theme addresses the difficulties Australians have in accessing Consular support and in acquiring replacement passports in order to return home. It usually goes on to describe how they have difficulty in gaining access to accommodation, clothing, food, and water and any necessary medicines and the challenges associated with booking travel home and the complexities of communicating with family and friends. The last theme focuses on how Australians were often (usually?) not given relevant safety information by “responsible people” or “those in the know” in the place where they were at the time of the tsunami. This establishes a sense that Australians were left out and not considered by the relevant authorities. This narrative pays little attention to the wide scale impact upon and suffering of resident local populations who lack the capacity to escape the landscape of catastrophe.How Does Australian Media Coverage of (Tsunami) Catastrophe Compare with Elsewhere?A review of the available literature suggests media coverage of catastrophes involving domestic citizens is similar globally. For example, Olofsson (557) in an analysis of newspaper articles in Sweden about the 2004 IOT showed that the tsunami was framed as a Swedish disaster heavily focused on Sweden, Swedish victims, and Thailand, and that there was a division between “us” (Swedes) and “them” (others or non-Swedes). Olofsson (557) described two types of “us” and “them.” At the international level Sweden, i.e. “us,” was glorified and contrasted with “inferior” countries such as Thailand, “them.” Olofsson (557) concluded that mediated frames of catastrophe are influenced by stereotypes and nationalistic values.Such nationalistic approaches preface one type of suffering in catastrophe over others and delegitimises the experiences of some survivors. Thus, catastrophes are not evenly experienced. Importantly, Olofsson although not explicitly using the term, explains that the underlying reason for this construction of “them” and “us” is a form of imperialism and colonialism. Sharp refers to “historically rooted power hierarchies between countries and regions of the world” (304)—this is especially so of western news media reporting on catastrophes within and affecting “other” (non-western) countries. Sharp goes much further in relation to western representations and imaginations of the “war on terror” (arguably a global catastrophe) by explicitly noting the near universal western-centric dominance of this representation and the construction of the “west” as good and all “non-west” as not (299). Like it or not, the western media, including elements of the mainstream Australian media, adhere to this imperialistic representation. Studies of tsunami and other catastrophes drawing upon different types of media (still images, video, film, camera, and social media such as Facebook, Twitter, and the like) and from different national settings have explored the multiple functions of media. These functions include: providing information, questioning the authorities, and offering a chance for transformative learning. Further, they alleviate pain and suffering, providing new virtual communities of shared experience and hearing that facilitate resilience and recovery from catastrophe. Lastly, they contribute to a cultural transformation of catastrophe—both positive and negative (Hjorth and Kyoung-hwa "The Mourning"; "Good Grief"; McCargo and Hyon-Suk 236; Brown and Minty 9; Lau et al. 675; Morgan and de Goyet 33; Piotrowski and Armstrong 341; Sood et al. 27).Has Extensive Media Coverage Resulted in an Improved Awareness of the Catastrophic Potential of Tsunami for Australians?In playing devil’s advocate, my simple response is NO! This because I have been interviewing Australians about their perceptions and knowledge of tsunamis as a catastrophe, after events have occurred. These events have triggered alerts and warnings by the Australian Tsunami Warning System (ATWS) for selected coastal regions of Australia. Consequently, I have visited coastal suburbs and interviewed people about tsunamis generally and those events specifically. Formal interviews (surveys) and informal conversations have revolved around what people perceived about the hazard, the likely consequences, what they knew about the warning, where they got their information from, how they behaved and why, and so forth. I have undertaken this work after the 2007 Solomon Islands, 2009 New Zealand, 2009 South Pacific, the February 2010 Chile, and March 2011 Japan tsunamis. I have now spoken to more than 800 people. Detailed research results will be presented elsewhere, but of relevance here, I have discovered that, to begin with, Australians have a reasonable and shared cultural knowledge of the potential catastrophic effects that tsunamis can have. They use terms such as “devastating; death; damage; loss; frightening; economic impact; societal loss; horrific; overwhelming and catastrophic.” Secondly, when I ask Australians about their sources of information about tsunamis, they describe the television (80%); Internet (85%); radio (25%); newspaper (35%); and social media including YouTube (65%). This tells me that the media are critical to underpinning knowledge of catastrophe and are a powerful transformative medium for the acquisition of knowledge. Thirdly, when asked about where people get information about live warning messages and alerts, Australians stated the “television (95%); Internet (70%); family and friends (65%).” Fourthly and significantly, when individuals were asked what they thought being caught in a tsunami would be like, responses included “fun (50%); awesome (75%); like in a movie (40%).” Fifthly, when people were asked about what they would do (i.e., their “stated behaviour”) during a real tsunami arriving at the coast, responses included “go down to the beach to swim/surf the tsunami (40%); go to the sea to watch (85%); video the tsunami and sell to the news media people (40%).”An independent and powerful representation of the disjunct between Australians’ knowledge of the catastrophic potential of tsunamis and their “negative” behavioral response can be found in viewing live television news coverage broadcast from Sydney beaches on the morning of Sunday 28 February 2010. The Chilean tsunami had taken more than 14 hours to travel from Chile to the eastern seaboard of Australia and the ATWS had issued an accurate warning and had correctly forecast the arrival time of the tsunami (approximately 08.30 am). The television and radio media had dutifully broadcast the warning issued by the State Emergency Services. The message was simple: “Stay out of the water, evacuate the beaches and move to higher ground.” As the tsunami arrived, those news broadcasts showed volunteer State Emergency Service personnel and Surf Life Saving Australia lifeguards “begging” with literally hundreds (probably thousands up and down the eastern seaboard of Australia) of members of the public to stop swimming in the incoming tsunami and to evacuate the beaches. On that occasion, Australians were lucky and the tsunami was inconsequential. What do these responses mean? Clearly Australians recognise and can describe the consequences of a tsunami. However, they are not associating the catastrophic nature of tsunami with their own lives or experience. They are avoiding or disallowing the reality; they normalise and dramaticise the event. Thus in Australia, to date, a cultural transformation about the catastrophic nature of tsunami has not occurred for reasons that are not entirely clear but are the subject of ongoing study.The Emergence of Tsunami as a “New Australian Catastrophe”?As a natural disaster expert with nearly two decades experience, in my mind tsunami has emerged as a “new Australian catastrophe.” I believe this has occurred for a number of reasons. Firstly, the 2004 IOT was devastating and did impact northwestern Australia, raising the flag on this hitherto, unknown threat. Australia is now known to be vulnerable to the tsunami catastrophe. The media have played a critical role here. Secondly, in the 2004 IOT and other tsunamis since, Australians have died and their deaths have been widely reported in the Australian media. Thirdly, the emergence of various forms of social media has facilitated an explosion in information and material that can be consumed, digested, reimagined, and normalised by Australians hungry for the gore of catastrophe—it feeds our desire for catastrophic death and destruction. Fourthly, catastrophe has been creatively imagined and retold for a story-hungry viewing public. Whether through regular television shows easily consumed from a comfy chair at home, or whilst eating popcorn at a cinema, tsunami catastrophe is being fed to us in a way that reaffirms its naturalness. Juxtaposed against this idea though is that, despite all the graphic imagery of tsunami catastrophe, especially images of dead children in other countries, Australian media do not and culturally cannot, display images of dead Australian children. Such images are widely considered too gruesome but are well known to drive changes in cultural behaviour because of the iconic significance of the child within our society. As such, a cultural shift has not yet occurred and so the potential of catastrophe remains waiting to strike. Fifthly and significantly, given the fact that large numbers of Australians have not died during recent tsunamis means that again, the catastrophic potential of tsunamis is not yet realised and has not resulted in cultural changes to more affirmative behaviour. Lastly, Australians are probably more aware of “regular or common” catastrophes such as floods and bush fires that are normal to the Australian climate system and which are endlessly experienced individually and culturally and covered by the media in all forms. The Australian summer of 2012–13 has again been dominated by floods and fires. If this idea is accepted, the media construct a uniquely Australian imaginary of catastrophe and cultural discourse of disaster. The familiarity with these common climate catastrophes makes us “culturally blind” to the catastrophe that is tsunami.The consequences of a major tsunami affecting Australia some point in the future are likely to be of a scale not yet comprehensible. References Australian Broadcasting Corporation (ABC). "ABC Net Splash." 20 Mar. 2013 ‹http://splash.abc.net.au/media?id=31077›. Brown, Philip, and Jessica Minty. “Media Coverage and Charitable Giving after the 2004 Tsunami.” Southern Economic Journal 75 (2008): 9–25. Bryant, Edward. Tsunami: The Underrated Hazard. First Edition, Cambridge: Cambridge UP, 2001. ———. Tsunami: The Underrated Hazard. Second Edition, Sydney: Springer-Praxis, 2008. Caldwell, Anna, Natalie Gregg, Fiona Hudson, Patrick Lion, Janelle Miles, Bart Sinclair, and John Wright. “Samoa Tsunami Claims Five Aussies as Death Toll Rises.” The Courier Mail 1 Oct. 2009. 20 Mar. 2013 ‹http://www.couriermail.com.au/news/samoa-tsunami-claims-five-aussies-as-death-toll-rises/story-e6freon6-1225781357413›. CDEMA. "The Caribbean Disaster Emergency Management Agency. Tsunami SMART Media Web Site." 18 Dec. 2012. 20 Mar. 2013 ‹http://weready.org/tsunami/index.php?Itemid=40&id=40&option=com_content&view=article›. Cox, Robin, Bonita Long, and Megan Jones. “Sequestering of Suffering – Critical Discourse Analysis of Natural Disaster Media Coverage.” Journal of Health Psychology 13 (2008): 469–80. “CSI: Miami (Season 3, Episode 7).” International Movie Database (IMDb). ‹http://www.imdb.com/title/tt0534784/›. 9 Jan. 2013. "CSI: Miami (Season 3)." Wikipedia. ‹http://en.wikipedia.org/wiki/CSI:_Miami_(season_3)#Episodes›. 21 Mar. 2013. DFAT. "Department of Foreign Affairs and Trade Annual Report 2004–2005." 8 Jan. 2013 ‹http://www.dfat.gov.au/dept/annual_reports/04_05/downloads/2_Outcome2.pdf›. Dominey-Howes, Dale. “Geological and Historical Records of Australian Tsunami.” Marine Geology 239 (2007): 99–123. Dominey-Howes, Dale, and Randy Thaman. “UNESCO-IOC International Tsunami Survey Team Samoa Interim Report of Field Survey 14–21 October 2009.” No. 2. Australian Tsunami Research Centre. University of New South Wales, Sydney. "Hereafter." International Movie Database (IMDb). ‹http://www.imdb.com/title/tt1212419/›. 9 Jan. 2013."Hereafter." Wikipedia. ‹http://en.wikipedia.org/wiki/Hereafter (film)›. 21 Mar. 2013. Hjorth, Larissa, and Yonnie Kyoung-hwa. “The Mourning After: A Case Study of Social Media in the 3.11 Earthquake Disaster in Japan.” Television and News Media 12 (2011): 552–59. ———, and Yonnie Kyoung-hwa. “Good Grief: The Role of Mobile Social Media in the 3.11 Earthquake Disaster in Japan.” Digital Creativity 22 (2011): 187–99. Lau, Joseph, Mason Lau, and Jean Kim. “Impacts of Media Coverage on the Community Stress Level in Hong Kong after the Tsunami on 26 December 2004.” Journal of Epidemiology and Community Health 60 (2006): 675–82. McCargo, Duncan, and Lee Hyon-Suk. “Japan’s Political Tsunami: What’s Media Got to Do with It?” International Journal of Press-Politics 15 (2010): 236–45. Miles, Brian, and Stephanie Morse. “The Role of News Media in Natural Disaster Risk and Recovery.” Ecological Economics 63 (2007): 365–73. Morgan, Olive, and Charles de Goyet. “Dispelling Disaster Myths about Dead Bodies and Disease: The Role of Scientific Evidence and the Media.” Revista Panamericana de Salud Publica-Pan American Journal of Public Health 18 (2005): 33–6. Olofsson, Anna. “The Indian Ocean Tsunami in Swedish Newspapers: Nationalism after Catastrophe.” Disaster Prevention and Management 20 (2011): 557–69. Piotrowski, Chris, and Terry Armstrong. “Mass Media Preferences in Disaster: A Study of Hurricane Danny.” Social Behavior and Personality 26 (1998): 341–45. Ploughman, Penelope. “The American Print News Media Construction of Five Natural Disasters.” Disasters 19 (1995): 308–26. Prendergast, Amy, and Nick Brown. “Far Field Impact and Coastal Sedimentation Associated with the 2006 Java Tsunami in West Australia: Post-Tsunami Survey at Steep Point, West Australia.” Natural Hazards 60 (2012): 69–79. Sharp, Joanne. “A Subaltern Critical Geopolitics of The War on Terror: Postcolonial Security in Tanzania.” Geoforum 42 (2011): 297–305. Sood, Rahul, Stockdale, Geoffrey, and Everett Rogers. “How the News Media Operate in Natural Disasters.” Journal of Communication 37 (1987): 27–41.

APA, Harvard, Vancouver, ISO, and other styles

20

Pedersen, Isabel, and Kirsten Ellison. "Startling Starts: Smart Contact Lenses and Technogenesis." M/C Journal 18, no.5 (October14, 2015). http://dx.doi.org/10.5204/mcj.1018.

Full text

Abstract:

On 17 January 2013, Wired chose the smart contact lens as one of “7 Massive Ideas That Could Change the World” describing a Google-led research project. Wired explains that the inventor, Dr. Babak Parviz, wants to build a microsystem on a contact lens: “Using radios no wider than a few human hairs, he thinks these lenses can augment reality and incidentally eliminate the need for displays on phones, PCs, and widescreen TVs”. Explained further in other sources, the technology entails an antenna, circuits embedded into a contact lens, GPS, and an LED to project images on the eye, creating a virtual display (Solve for X). Wi-Fi would stream content through a transparent screen over the eye. One patent describes a camera embedded in the lens (Etherington). Another mentions medical sensing, such as glucose monitoring of tears (Goldman). In other words, Google proposes an imagined future when we use contact lenses to search the Internet (and be searched by it), shop online, communicate with friends, work, navigate maps, swipe through Tinder, monitor our health, watch television, and, by that time, probably engage in a host of activities not yet invented. Often referred to as a bionic contact, the smart contact lens would signal a weighty shift in the way we work, socialize, and frame our online identities. However, speculative discussion over this radical shift in personal computing, rarely if ever, includes consideration of how the body, acting as a host to digital information, will manage to assimilate not only significant affordances, but also significant constraints and vulnerabilities. At this point, for most people, the smart contact lens is just an idea. Is a new medium of communication started when it is launched in an advertising campaign? When we Like it on Facebook? If we chat about it during a party amongst friends? Or, do a critical mass of people actually have to be using it to say it has started? One might say that Apple’s Macintosh computer started as a media platform when the world heard about the famous 1984 television advertisem*nt aired during the American NFL Super Bowl of that year. Directed by Ridley Scott, the ad entails an athlete running down a passageway and hurling a hammer at a massive screen depicting cold war style rulers expounding state propaganda. The screen explodes freeing those imprisoned from their concentration camp existence. The direct reference to Orwell’s 1984 serves as a metaphor for IBM in 1984. PC users were made analogous to political prisoners and IBM served to represent the totalitarian government. The Mac became a something that, at the time, challenged IBM, and suggested an alternative use for the desktop computer that had previously been relegated for work rather than life. Not everyone bought a Mac, but the polemical ad fostered the idea that Mac was certainly the start of new expectations, civic identities, value-systems, and personal uses for computers. The smart contact lens is another startling start. News of it shocks us, initiates social media clicks and forwards, and instigates dialogue. But, it also indicates the start of a new media paradigm that is already undergoing popular adoption as it is announced in mainstream news and circulated algorithmically across media channels. Since 2008, news outlets like CNN, The New York Times, The Globe and Mail, Asian International News, United News of India, The Times of London and The Washington Post have carried it, feeding the buzz in circulation that Google intends. Attached to the wave of current popular interest generated around any technology claiming to be “wearable,” a smart contact lens also seems surreptitious. We would no longer hold smartphones, but hide all of that digital functionality beneath our eyelids. Its emergence reveals the way commercial models have dramatically changed. The smart contact lens is a futuristic invention imagined for us and about us, but also a sensationalized idea socializing us to a future that includes it. It is also a real device that Parviz (with Google) has been inventing, promoting, and patenting for commercial applications. All of these workings speak to a broader digital culture phenomenon. We argue that the smart contact lens discloses a process of nascent posthuman adaptation, launched in an era that celebrates wearable media as simultaneously astonishing and banal. More specifically, we adopt technology based on our adaptation to it within our personal, political, medial, social, and biological contexts, which also function in a state of flux. N. Katherine Hayles writes that “Contemporary technogenesis, like evolution in general, is not about progress ... rather, contemporary technogenesis is about adaptation, the fit between organisms and their environments, recognizing that both sides of the engagement (human and technologies) are undergoing coordinated transformations” (81). This article attends to the idea that in these early stages, symbolic acts of adaptation signal an emergent medium through rhetorical processes that society both draws from and contributes to. In terms of project scope, this article contributes a focused analysis to a much larger ongoing digital rhetoric project. For the larger project, we conducted a discourse analysis on a collection of international publications concerning Babak Parviz and the invention. We searched for and collected newspaper stories, news broadcasts, YouTube videos from various sources, academic journal publications, inventors’ conference presentations, and advertising, all published between January 2008 and May 2014, generating a corpus of more than 600 relevant artifacts. Shortly after this time, Dr. Parviz, a Professor at the University of Washington, left the secretive GoogleX lab and joined Amazon.com (Mac). For this article we focus specifically on the idea of beginnings or genesis and how digital spaces increasingly serve as the grounds for emergent digital cultural phenomena that are rarely recognized as starting points. We searched through the corpus to identify a few exemplary international mainstream news stories to foreground predominant tropes in support of the claim we make that smart contacts lenses are a startling idea. Content producers deliberately use astonishment as a persuasive device. We characterize the idea of a smart contact lens cast in rhetorical terms in order to reveal how its allure works as a process of adaptation. Rhetorician and philosopher, Kenneth Burke writes that “rhetorical language is inducement to action (or to attitude)” (42). A rhetorical approach is instrumental because it offers a model to explain how we deploy, often times, manipulative meaning as senders and receivers while negotiating highly complex constellations of resources and contexts. Burke’s rhetorical theory can show how messages influence and become influenced by powerful hierarchies in discourse that seem transparent or neutral, ones that seem to fade into the background of our consciousness. For this article, we also concentrate on rhetorical devices such as ethos and the inventor’s own appeals through different modes of communication. Ethos was originally proposed by Aristotle to identify speaker credibility as a persuasive tactic. Addressed by scholars of rhetoric for centuries, ethos has been reconfigured by many critical theorists (Burke; Baumlin Ethos; Hyde). Baumlin and Baumlin suggest that “ethos describes an audience’s projection of authority and trustworthiness onto the speaker ... ethos suggests that the ethical appeal to be a radically psychological event situated in the mental processes of the audience – as belonging as much to the audience as to the actual character of a speaker” (Psychology 99). Discussed in the next section, our impression of Parviz and his position as inventor plays a dramatic role in the surfacing of the smart contact lens. Digital Rhetoric is an “emerging scholarly discipline concerned with the interpretation of computer-generated media as objects of study” (Losh 48). In an era when machine-learning algorithms become the messengers for our messages, which have become commodity items operating across globalized, capitalist networks, digital rhetoric provides a stable model for our approach. It leads us to demonstrate how this emergent medium and invention, the smart contact lens, is born amid new digital genres of speculative communication circulated in the everyday forums we engage on a daily basis. Smart Contact Lenses, Sensationalism, and Identity One relevant site for exploration into how an invention gains ethos is through writing or video penned or produced by the inventor. An article authored by Parviz in 2009 discusses his invention and the technical advancements that need to be made before the smart contact lens could work. He opens the article using a fictional and sensationalized analogy to encourage the adoption of his invention: The human eye is a perceptual powerhouse. It can see millions of colors, adjust easily to shifting light conditions, and transmit information to the brain at a rate exceeding that of a high-speed Internet connection.But why stop there?In the Terminator movies, Arnold Schwarzenegger’s character sees the world with data superimposed on his visual field—virtual captions that enhance the cyborg’s scan of a scene. In stories by the science fiction author Vernor Vinge, characters rely on electronic contact lenses, rather than smartphones or brain implants, for seamless access to information that appears right before their eyes. Identity building is made to correlate with smart contact lenses in a manner that frames them as exciting. Coming to terms with them often involves casting us as superhumans, wielding abilities that we do not currently possess. One reason for embellishment is because we do not need digital displays on the eyes, so the motive to use them must always be geared to transcending our assumed present condition as humans and society members. Consequently, imagination is used to justify a shift in human identity along a future trajectory.This passage above also instantiates a transformation from humanist to posthumanist posturing (i.e. “the cyborg”) in order to incent the adoption of smart contact lenses. It begins with the bold declarative statement, “The human eye is a perceptual powerhouse,” which is a comforting claim about our seemingly human superiority. Indexing abstract humanist values, Parviz emphasizes skills we already possess, including seeing a plethora of colours, adjusting to light on the fly, and thinking fast, indeed faster than “a high-speed Internet connection”. However, the text goes on to summon the Terminator character and his optic feats from the franchise of films. Filmic cyborg characters fulfill the excitement that posthuman rhetoric often seems to demand, but there is more here than sensationalism. Parviz raises the issue of augmenting human vision using science fiction as his contextualizing vehicle because he lacks another way to imbricate the idea. Most interesting in this passage is the inventor’s query “But why stop there?” to yoke the two claims, one biological (i.e., “The human eye is a perceptual powerhouse”) and one fictional (i.e. Terminator, Vernor Vinge characters). The query suggests, Why stop with human superiority, we may as well progress to the next level and embrace a smart contact lens just as fictional cyborgs do. The non-threatening use of fiction makes the concept seem simultaneously exciting and banal, especially because the inventor follows with a clear description of the necessary scientific engineering in the rest of the article. This rhetorical act signifies the voice of a technoelite, a heavily-funded cohort responding to global capitalist imperatives armed with a team of technologists who can access technological advancements and imbue comments with an authority that may extend beyond their fields of expertise, such as communication studies, sociology, psychology, or medicine. The result is a powerful ethos. The idea behind the smart contact lens maintains a degree of respectability long before a public is invited to use it.Parviz exhumes much cultural baggage when he brings to life the Terminator character to pitch smart contact lenses. The Terminator series of films has established the “Arnold Schwarzenegger” character a cultural mainstay. Each new film reinvented him, but ultimately promoted him within a convincing dystopian future across the whole series: The Terminator (Cameron), Terminator 2: Judgment Day (Cameron), Terminator 3: Rise of the Machines (Mostow), Terminator Salvation (McG) and Terminator Genisys (Taylor) (which appeared in 2015 after Parviz’s article). Recently, several writers have addressed how cyborg characters figure significantly in our cultural psyche (Haraway, Bukatman; Leaver). Tama Leaver’s Artificial Culture explores the way popular, contemporary, cinematic, science fiction depictions of embodied Artificial Intelligence, such as the Terminator cyborgs, “can act as a matrix which, rather than separating or demarcating minds and bodies or humanity and the digital, reinforce the symbiotic connection between people, bodies, and technologies” (31). Pointing out the violent and ultimately technophobic motive of The Terminator films, Leaver reads across them to conclude nevertheless that science fiction “proves an extremely fertile context in which to address the significance of representations of Artificial Intelligence” (63).Posthumanism and TechnogenesisOne reason this invention enters the public’s consciousness is its announcement alongside a host of other technologies, which seem like parts of a whole. We argue that this constant grouping of technologies in the news is one process indicative of technogenesis. For example, City A.M., London’s largest free commuter daily newspaper, reports on the future of business technology as a hodgepodge of what ifs: As Facebook turns ten, and with Bill Gates stepping down as Microsoft chairman, it feels like something is drawing to an end. But if so, it is only the end of the technological revolution’s beginning ... Try to look ahead ten years from now and the future is dark. Not because it is bleak, but because the sheer profusion of potential is blinding. Smartphones are set to outnumber PCs within months. After just a few more years, there are likely to be 3bn in use across the planet. In ten years, who knows – wearables? smart contact lenses? implants? And that’s just the start. The Internet of Things is projected to be a $300bn (£183bn) industry by 2020. (Sidwell) This reporting is a common means to frame the commodification of technology in globalized business news that seeks circulation as much as it does readership. But as a text, it also posits how individuals frame the future and their participation with it (Pedersen). Smart contacts appear to move along this exciting, unstoppable trajectory where the “potential is blinding”. The motive is to excite and scare. However, simultaneously, the effect is predictable. We are quite accustomed to this march of innovations that appears everyday in the morning paper. We are asked to adapt rather than question, consequently, we never separate the parts from the whole (e.g., “wearables? smart contact lenses? Implants”) in order to look at them critically.In coming to terms with Cary Wolf’s definition of posthumanism, Greg Pollock writes that posthumanism is the questioning that goes on “when we can no longer rely on ‘the human’ as an autonomous, rational being who provides an Archimedean point for knowing about the world (in contrast to “humanism,” which uses such a figure to ground further claims)” (208). With similar intent, N. Katherine Hayles formulating the term technogenesis suggests that we are not really progressing to another level of autonomous human existence when we adopt media, we are in effect, adapting to media and media are also in a process of adapting to us. She writes: As digital media, including networked and programmable desktop stations, mobile devices, and other computational media embedded in the environment, become more pervasive, they push us in the direction of faster communication, more intense and varied information streams, more integration of humans and intelligent machines, and more interactions of language with code. These environmental changes have significant neurological consequences, many of which are now becoming evident in young people and to a lesser degree in almost everyone who interacts with digital media on a regular basis. (11) Following Hayles, three actions or traits characterize adaptation in a manner germane to the technogenesis of media like smart contact lenses. The first is “media embedded in the environment”. The trait of embedding technology in the form of sensors and chips into external spaces evokes the onset of The Internet of Things (IoT) foundations. Extensive data-gathering sensors, wireless technologies, mobile and wearable components integrated with the Internet, all contribute to the IoT. Emerging from cloud computing infrastructures and data models, The IoT, in its most extreme, involves a scenario whereby people, places, animals, and objects are given unique “embedded” identifiers so that they can embark on constant data transfer over a network. In a sense, the lenses are adapted artifacts responding to a world that expects ubiquitous networked access for both humans and machines. Smart contact lenses will essentially be attached to the user who must adapt to these dynamic and heavily mediated contexts.Following closely on the first, the second point Hayles makes is “integration of humans and intelligent machines”. The camera embedded in the smart contact lens, really an adapted smartphone camera, turns the eye itself into an image capture device. By incorporating them under the eyelids, smart contact lenses signify integration in complex ways. Human-machine amalgamation follows biological, cognitive, and social contexts. Third, Hayles points to “more interactions of language with code.” We assert that with smart contact lenses, code will eventually govern interaction between countless agents in accordance with other smart devices, such as: (1) exchanges of code between people and external nonhuman networks of actors through machine algorithms and massive amalgamations of big data distributed on the Internet;(2) exchanges of code amongst people, human social actors in direct communication with each other over social media; and (3) exchanges of coding and decoding between people and their own biological processes (e.g. monitoring breathing, consuming nutrients, translating brainwaves) and phenomenological (but no less material) practices (e.g., remembering, grieving, or celebrating). The allure of the smart contact lens is the quietly pressing proposition that communication models such as these will be radically transformed because they will have to be adapted to use with the human eye, as the method of input and output of information. Focusing on genetic engineering, Eugene Thacker fittingly defines biomedia as “entail[ing] the informatic recontextualization of biological components and processes, for ends that may be medical or nonmedical (economic, technical) and with effects that are as much cultural, social, and political as they are scientific” (123). He specifies, “biomedia are not computers that simply work on or manipulate biological compounds. Rather, the aim is to provide the right conditions, such that biological life is able to demonstrate or express itself in a particular way” (123). Smart contact lenses sit on the cusp of emergence as a biomedia device that will enable us to decode bodily processes in significant new ways. The bold, technical discourse that announces it however, has not yet begun to attend to the seemingly dramatic “cultural, social, and political” effects percolating under the surface. Through technogenesis, media acclimatizes rapidly to change without establishing a logic of the consequences, nor a design plan for emergence. Following from this, we should mention issues such as the intrusion of surveillance algorithms deployed by corporations, governments, and other hegemonic entities that this invention risks. If smart contact lenses are biomedia devices inspiring us to decode bodily processes and communicate that data for analysis, for ourselves, and others in our trust (e.g., doctors, family, friends), we also need to be wary of them. David Lyon warns: Surveillance has spilled out of its old nation-state containers to become a feature of everyday life, at work, at home, at play, on the move. So far from the single all-seeing eye of Big Brother, myriad agencies now trace and track mundane activities for a plethora of purposes. Abstract data, now including video, biometric, and genetic as well as computerized administrative files, are manipulated to produce profiles and risk categories in a liquid, networked system. The point is to plan, predict, and prevent by classifying and assessing those profiles and risks. (13) In simple terms, the smart contact lens might disclose the most intimate information we possess and leave us vulnerable to profiling, tracking, and theft. Irma van der Ploeg presupposed this predicament when she wrote: “The capacity of certain technologies to change the boundary, not just between what is public and private information but, on top of that, between what is inside and outside the human body, appears to leave our normative concepts wanting” (71). The smart contact lens, with its implied motive to encode and disclose internal bodily information, needs considerations on many levels. Conclusion The smart contact lens has made a digital beginning. We accept it through the mass consumption of the idea, which acts as a rhetorical motivator for media adoption, taking place long before the device materializes in the marketplace. This occurrence may also be a sign of our “posthuman predicament” (Braidotti). We have argued that the smart contact lens concept reveals our posthuman adaptation to media rather than our reasoned acceptance or agreement with it as a logical proposition. By the time we actually squabble over the price, express fears for our privacy, and buy them, smart contact lenses will long be part of our everyday culture. References Baumlin, James S., and Tita F. Baumlin. “On the Psychology of the Pisteis: Mapping the Terrains of Mind and Rhetoric.” Ethos: New Essays in Rhetorical and Critical Theory. Eds. James S. Baumlin and Tita F. Baumlin. Dallas: Southern Methodist University Press, 1994. 91-112. Baumlin, James S., and Tita F. Baumlin, eds. Ethos: New Essays in Rhetorical and Critical Theory. Dallas: Southern Methodist University Press, 1994. Bilton, Nick. “A Rose-Colored View May Come Standard.” The New York Times, 4 Apr. 2012. Braidotti, Rosi. The Posthuman. Cambridge: Polity, 2013. Bukatman, Scott. Terminal Identity: The Virtual Subject in Postmodern Science Fiction. Durham: Duke University Press, 1993. Burke, Kenneth. A Rhetoric of Motives. Berkeley: University of California Press, 1950. Cameron, James, dir. The Terminator. Orion Pictures, 1984. DVD. Cameron, James, dir. Terminator 2: Judgment Day. Artisan Home Entertainment, 2003. DVD. Etherington, Darrell. “Google Patents Tiny Cameras Embedded in Contact Lenses.” TechCrunch, 14 Apr. 2014. Goldman, David. “Google to Make Smart Contact Lenses.” CNN Money 17 Jan. 2014. Haraway, Donna. Simians, Cyborgs and Women: The Reinvention of Nature. London: Free Association Books, 1991. Hayles, N. Katherine. How We Think: Digital Media and Contemporary Technogenesis. Chicago: University of Chicago, 2012. Hyde, Michael. The Ethos of Rhetoric. Columbia: University of South Carolina Press, 2004. Leaver, Tama. Artificial Culture: Identity, Technology, and Bodies. New York: Routledge, 2012. Losh, Elizabeth. Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes. Boston: MIT Press. 2009. Lyon, David, ed. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. New York: Routledge, 2003. Mac, Ryan. “Amazon Lures Google Glass Creator Following Phone Launch.” Forbes.com, 14 July 2014. McG, dir. Terminator Salvation. Warner Brothers, 2009. DVD. Mostow, Jonathan, dir. Terminator 3: Rise of the Machines. Warner Brothers, 2003. DVD. Parviz, Babak A. “Augmented Reality in a Contact Lens.” IEEE Spectrum, 1 Sep. 2009. Pedersen, Isabel. Ready to Wear: A Rhetoric of Wearable Computers and Reality-Shifting Media. Anderson, South Carolina: Parlor Press, 2013. Pollock, Greg. “What Is Posthumanism by Cary Wolfe (2009).” Rev. of What is Posthumanism?, by Cary Wolfe. Journal for Critical Animal Studies 9.1/2 (2011): 235-241. Sidwell, Marc. “The Long View: Bill Gates Is Gone and the Dot-com Era Is Over: It's Only the End of the Beginning.” City A.M., 7 Feb. 2014. “Solve for X: Babak Parviz on Building Microsystems on the Eye.” YouTube, 7 Feb. 2012. Taylor, Alan, dir. Terminator: Genisys. Paramount Pictures, 2015. DVD. Thacker, Eugene “Biomedia.” Critical Terms for Media Studies. Eds. W.J.T Mitchell and Mark Hansen, Chicago: Chicago Press, 2010. 117-130. Van der Ploeg, Irma. “Biometrics and the Body as Information.” Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Ed. David Lyon. New York: Routledge, 2003. 57-73. Wired Staff. “7 Massive Ideas That Could Change the World.” Wired.com, 17 Jan. 2013.

APA, Harvard, Vancouver, ISO, and other styles

21

Conti, Olivia. "Disciplining the Vernacular: Fair Use, YouTube, and Remixer Agency." M/C Journal 16, no.4 (August11, 2013). http://dx.doi.org/10.5204/mcj.685.

Full text

Abstract:

Introduction The research from which this piece derives explores political remix video (PRV), a genre in which remixers critique dominant discourses and power structures through guerrilla remixing of copyrighted footage (“What Is Political Remix Video?”). Specifically, I examined the works of political video remixer Elisa Kreisinger, whose queer remixes of shows such as Sex and the City and Mad Men received considerable attention between 2010 and the present. As a rhetoric scholar, I am attracted not only to the ways that remix functions discursively but also the ways in which remixers are constrained in their ability to argue, and what recourse they have in these situations of legal and technological constraint. Ultimately, many of these struggles play out on YouTube. This is unsurprising: many studies of YouTube and other user-generated content (UGC) platforms focus on the fact that commercial sites cannot constitute utopian, democratic, or free environments (Hilderbrand; Hess; Van Dijck). However, I find that, contrary to popular belief, YouTube’s commercial interests are not the primary factor limiting remixer agency. Rather, United States copyright law as enacted on YouTube has the most potential to inhibit remixers. This has led to many remixers becoming advocates for fair use, the provision in the Copyright Act of 1976 that allows for limited use of copyrighted content. With this in mind, I decided to delve more deeply into the framing of fair use by remixers and other advocates such as the Electronic Frontier Foundation (EFF) and the Center for Social Media. In studying discourses of fair use as they play out in the remix community, I find that the framing of fair use bears a striking similarity to what rhetoric scholars have termed vernacular discourse—a discourse emanating from a small segment of the larger civic community (Ono and Sloop 23). The vernacular is often framed as that which integrates the institutional or mainstream while simultaneously asserting its difference through appropriation and subversion. A video qualifies as fair use if it juxtaposes source material in a new way for the purposes of critique. In turn, a vernacular text asserts its “vernacularity” by taking up parts of pre-existing dominant institutional discourses in a way that resonates with a smaller community. My argument is that this tension between institutional and vernacular gives political remix video a multivalent argument—one that presents itself both in the text of the video itself as well as in the video’s status as a fair use of copyrighted material. Just as fair use represents the assertion of creator agency against unfair copyright law, vernacular discourse represents the assertion of a localised community within a world dominated by institutional discourses. In this way, remixers engage rights holders and other institutions in a pleasurable game of cat and mouse, a struggle to expose the boundaries of draconian copyright law. YouTube’s Commercial InterestsYouTube’s commercial interests operate at a level potentially invisible to the casual user. While users provide YouTube with content, they also provide the site with data—both metadata culled from their navigations of the site (page views, IP addresses) as well as member-provided data (such as real name and e-mail address). YouTube mines this data for a number of purposes—anything from interface optimisation to targeted advertising via Google’s AdSense. Users also perform a certain degree of labour to keep the site running smoothly, such as reporting videos that violate the Terms of Service, giving videos the thumbs up or thumbs down, and reporting spam comments. As such, users involved in YouTube’s participatory culture are also necessarily involved in the site’s commercial interests. While there are legitimate concerns regarding the privacy of personal information, especially after Google introduced policies in 2012 to facilitate a greater flow of information across all of their subsidiaries, it does not seem that this has diminished YouTube’s popularity (“Google: Privacy Policy”).Despite this, some make the argument that users provide the true benefit of UGC platforms like YouTube, yet reap few rewards, creating an exploitative dynamic (Van Dijck, 46). Two assumptions seem to underpin this argument: the first is that users do not desire to help these platforms prosper, the second is that users expect to profit from their efforts on the website. In response to these arguments, it’s worth calling attention to scholars who have used alternative economic models to account for user-platform coexistence. This is something that Henry Jenkins addresses in his recent book Spreadable Media, largely by focusing on assigning alternate sorts of value to user and fan labour—either the cultural worth of the gift, or the satisfaction of a job well done common to pre-industrial craftsmanship (61). However, there are still questions of how to account for participatory spaces in which labours of love coexist with massively profitable products. In service of this point, Jenkins calls up Lessig, who posits that many online networks operate as hybrid economies, which combine commercial and sharing economies. In a commercial economy, profit is the primary consideration, while a sharing economy is composed of participants who are there because they enjoy doing the work without any expectation of compensation (176). The strict separation between the two economies is, in Lessig’s estimation, essential to the hybrid economy’s success. While it would be difficult to incorporate these two economies together once each had been established, platforms like YouTube have always operated under the hybrid principle. YouTube’s users provide the site with its true value (through their uploading of content, provision of metadata, and use of the site), yet users do not come to YouTube with these tasks in mind—they come to YouTube because it provides an easy-to-use platform by which to share amateur creativity, and a community with whom to interact. Additionally, YouTube serves as the primary venue where remixers can achieve visibility and viral status—something Elisa Kreisinger acknowledged in our interviews (2012). However, users who are not concerned with broad visibility as much as with speaking to particular viewers may leave YouTube if they feel that the venue does not suit their content. Some feminist fan vidders, for instance, have withdrawn from YouTube due to what they perceived as a community who didn’t understand their work (Kreisinger, 2012). Additionally, Kreisinger ended up garnering many more views of her Queer Men remix on Vimeo due simply to the fact that the remix’s initial upload was blocked via YouTube’s Content ID feature. By the time Kreisinger had argued her case with YouTube, the Vimeo link had become the first stop for those viewing and sharing the remix, which received 72,000 views to date (“Queer Men”). Fair Use, Copyright, and Content IDThis instance points to the challenge that remixers face when dealing with copyright on YouTube, a site whose processes are not designed to accommodate fair use. Specifically, Title II, Section 512 of the DMCA (the Digital Millennium Copyright Act, passed in 1998) states that certain websites may qualify as “safe harbours” for copyright infringement if users upload the majority of the content to the site, or if the site is an information location service. These sites are insulated from copyright liability as long as they cooperate to some extent with rights holders. A common objection to Section 512 is that it requires media rights holders to police safe harbours in search of infringing content, rather than placing the onus on the platform provider (Meyers 939). In order to cooperate with Section 512 and rights holders, YouTube initiated the Content ID system in 2007. This system offers rights holders the ability to find and manage their content on the site by creating archives of footage against which user uploads are checked, allowing rights holders to automatically block, track, or monetise uses of their content (it is also worth noting that rights holders can make these responses country-specific) (“How Content ID Works”). At the current time, YouTube has over 15 million reference files against which it checks uploads (“Statistics - YouTube”). Thus, it’s fairly common for uploaded work to get flagged as a violation, especially when that work is a remix of popular institutional footage. If an upload is flagged by the Content ID system, the user can dispute the match, at which point the rights holder has the opportunity to either allow the video through, or to issue a DMCA takedown notice. They can also sue at any point during this process (“A Guide to YouTube Removals”). Content ID matches are relatively easy to dispute and do not generally require legal intervention. However, disputing these automatic takedowns requires users to be aware of their rights to fair use, and requires rights holders to acknowledge a fair use (“YouTube Removals”). This is only compounded by the fact that fair use is not a clearly defined right, but rather a vague provision relying on a balance between four factors: the purpose of the use, character of the work, the amount used, and the effect on the market value of the original (“US Copyright Office–Fair Use”). As Aufderheide and Jaszi observed in 2008, the rejection of videos for Content ID matches combined with the vagaries of fair use has a chilling effect on user-generated content. Rights Holders versus RemixersRights holders’ objections to Section 512 illustrate the ruling power dynamic in current intellectual property disputes: power rests with institutional rights-holding bodies (the RIAA, the MPAA) who assert their dominance over DMCA safe harbours such as YouTube (who must cooperate to stay in business) who, in turn, exert power over remixers (the lowest on the food chain, so to speak). Beyond the observed chilling effect of Content ID, remix on YouTube is shot through with discursive struggle between these rights-holding bodies and remixers attempting to express themselves and reach new communities. However, this has led political video remixers to become especially vocal when arguing for their uses of content. For instance, in the spring of 2009, Elisa Kreisinger curated a show entitled “REMOVED: The Politics of Remix Culture” in which blocked remixes screened alongside the remixers’ correspondence with YouTube. Kreisinger writes that each of these exchanges illustrate the dynamic between rights holders and remixers: “Your video is no longer available because FOX [or another rights-holding body] has chosen to block it (“Remixed/Removed”). Additionally, as Jenkins notes, even Content ID on YouTube is only made available to the largest rights holders—smaller companies must still go through an official DMCA takedown process to report infringement (Spreadable 51). In sum, though recent technological developments may give the appearance of democratising access to content, when it comes to policing UGC, technology has made it easier for the largest rights holders to stifle the creation of content.Additionally, it has been established that rights holders do occasionally use takedowns abusively, and recent court cases—specifically Lenz v. Universal Music Corp.—have established the need for rights holders to assess fair use in order to make a “good faith” assertion that users intend to infringe copyright prior to issuing a takedown notice. However, as Joseph M. Miller notes, the ruling fails to rebalance the burdens and incentives between rights holders and users (1723). This means that while rights holders are supposed to take fair use into account prior to issuing takedowns, there is no process in place that either effectively punishes rights holders who abuse copyright, or allows users to defend themselves without the possibility of massive financial loss (1726). As such, the system currently in place does not disallow or discourage features like Content ID, though cases like Lenz v. Universal indicate a push towards rebalancing the burden of determining fair use. In an effort to turn the tables, many have begun arguing for users’ rights and attempting to parse fair use for the layperson. The Electronic Frontier Foundation (EFF), for instance, has espoused an “environmental rhetoric” of fair use, casting intellectual property as a resource for users (Postigo 1020). Additionally, they have created practical guidelines for UGC creators dealing with DMCA takedowns and Content ID matches on YouTube. The Center for Social Media has also produced a number of fair use guides tailored to different use cases, one of which targeted online video producers. All of these efforts have a common goal: to educate content creators about the fair use of copyrighted content, and then to assert their use as fair in opposition to large rights-holding institutions (though they caution users against unfair uses of content or making risky legal moves that could lead to lawsuits). In relation to remix specifically, this means that remixers must differentiate themselves from institutional, commercial content producers, standing up both for the argument contained in their remix as well as their fair use of copyrighted content.In their “Code of Best Practices for Fair Use in Online Video,” the Center for Social Media note that an online video qualifies as a fair use if (among other things) it critiques copyrighted material and if it “recombines elements to make a new work that depends for its meaning on (often unlikely) relationships between the elements” (8). These two qualities are also two of the defining qualities of political remix video. For instance, they write that work meets the second criteria if it creates “new meaning by juxtaposition,” noting that in these cases “the recombinant new work has a cultural identity of its own and addresses an audience different from those for which its components were intended” (9). Remixes that use elements of familiar sources in unlikely combinations, such as those made by Elisa Kreisinger, generally seek to reach an audience who are familiar with the source content, but also object to it. Sex and the City, for instance, while it initially seemed willing to take on previously “taboo” topics in its exploration of dating in Manhattan, ended with each of the heterosexual characters paired with an opposite sex partner, and forays from this heteronormative narrative were contained either within in one-off episodes or tokenised gay characters. For this reason, Kreisinger noted that the intended audience for Queer Carrie were the queer and feminist viewers of Sex and the City who felt that the show was overly normative and exclusionary (Kreisinger, Art:21). As a result, the target audience of these remixes is different from the target audience of the source material—though the full nuance of the argument is best understood by those familiar with the source. Thus, the remix affirms the segment of the viewing community who saw only tokenised representations of their identity in the source text, and in so doing offers a critique of the original’s heteronormative focus.Fair Use and the VernacularVernacular discourse, as broadly defined by Kent A. Ono and John M. Sloop, refers to discourses that “emerge from discussions between members of self-identified smaller communities within the larger civic community.” It operates partially through appropriating dominant discourses in ways better suited to the vernacular community, through practices of pastiche and cultural syncretism (23). In an effort to better describe the intricacies of this type of discourse, Robert Glenn Howard theorised a hybrid “dialectical vernacular” that oscillates between institutional and vernacular discourse. This hybridity arises from the fact that the institutional and the vernacular are fundamentally inseparable, the vernacular establishing its meaning by asserting itself against the institutional (Howard, Toward 331). When put into use online, this notion of a “dialectical vernacular” is particularly interesting as it refers not only to the content of vernacular messages but also to their means of production. Howard notes that discourse embodying the dialectical vernacular is by nature secondary to institutional discourse, that the institutional must be clearly “structurally prior” (Howard, Vernacular 499). With this in mind it is unsurprising that political remix video—which asserts its secondary nature by calling upon pre-existing copyrighted content while simultaneously reaching out to smaller segments of the civic community—would qualify as a vernacular discourse.The notion of an institutional source’s structural prevalence also echoes throughout work on remix, both in practical guides such as the Center for Social Media’s “Best Practices” as well as in more theoretical takes on remix, like Eduardo Navas’ essay “Turbulence: Remixes + Bonus Beats,” in which he writes that:In brief, the remix when extended as a cultural practice is a second mix of something pre-existent; the material that is mixed for a second time must be recognized, otherwise it could be misunderstood as something new, and it would become plagiarism […] Without a history, the remix cannot be Remix. An elegant theoretical concept, this becomes muddier when considered in light of copyright law. If the history of remix is what gives it its meaning—the source text from which it is derived—then it is this same history that makes a fair use remix vulnerable to DMCA takedowns and other forms of discipline on YouTube. However, as per the criteria outlined by the Center for Social Media, it is also from this ironic juxtaposition of institutional sources that the remix object establishes its meaning, and thus its vernacularity. In this sense, the force of a political remix video’s argument is in many ways dependent on its status as an object in peril: vulnerable to the force of a law that has not yet swung in its favor, yet subversive nonetheless.With this in mind, YouTube and other UGC platforms represent a fraught layer of mediation between institutional and vernacular. As a site for the sharing of amateur video, YouTube has the potential to affirm small communities as users share similar videos, follow one particular channel together, or comment on videos posted by people in their networks. However, YouTube’s interface (rife with advertisem*nts, constantly reminding users of its affiliation with Google) and cooperation with rights holders establish it as an institutional space. As such, remixes on the site are already imbued with the characteristic hybridity of the dialectical vernacular. This is especially true when the remixers (as in the case of PRV) have made the conscious choice to advocate for fair use at the same time that they distribute remixes dealing with other themes and resonating with other communities. ConclusionPolitical remix video sits at a fruitful juncture with regard to copyright as well as vernacularity. Like almost all remix, it makes its meaning through juxtaposing sources in a unique way, calling upon viewers to think about familiar texts in a new light. This creation invokes a new audience—a quality that makes it both vernacular and also a fair use of content. Given that PRV is defined by the “guerrilla” use of copyrighted footage, it has the potential to stand as a political statement outside of the thematic content of the remix simply due to the nature of its composition. This gives PRV tremendous potential for multivalent argument, as a video can simultaneously represent a marginalised community while advocating for copyright reform. This is only reinforced by the fact that many political video remixers have become vocal in advocating for fair use, asserting the strength of their community and their common goal.In addition to this argumentative richness, PRV’s relation to fair use and vernacularity exposes the complexity of the remix form: it continually oscillates between institutional affiliations and smaller vernacular communities. However, the hybridity of these remixes produces tension, much of which manifests on YouTube, where videos are easily responded to and challenged by both institutuional and vernacular authorities. In addition, a tension exists in the remix text itself between the source and the new, remixed message. Further research should attend to these areas of tension, while also exploring the tenacity of the remix community and their ability to advocate for themselves while circumventing copyright law.References“About Political Remix Video.” Political Remix Video. 15 Feb. 2012. ‹http://www.politicalremixvideo.com/what-is-political-remix/›.Aufderheide, Patricia, and Peter Jaszi. Reclaiming Fair Use: How to Put Balance Back in Copyright. Chicago: U of Chicago P, 2008. Kindle.“Code of Best Practices for Fair Use in Online Video.” The Center For Social Media, 2008. Van Dijck, José. “Users like You? Theorizing Agency in User-Generated Content.” Media Culture Society 31 (2009): 41-58.“A Guide to YouTube Removals,” The Electronic Frontier Foundation, 15 June 2013 ‹https://www.eff.org/issues/intellectual-property/guide-to-YouTube-removals›.Hilderbrand, Lucas. “YouTube: Where Cultural Memory and Copyright Converge.” Film Quarterly 61.1 (2007): 48-57.Howard, Robert Glenn. “The Vernacular Web of Participatory Media.” Critical Studies in Media Communication 25.5 (2008): 490-513.Howard, Robert Glenn. “Toward a Theory of the World Wide Web Vernacular: The Case for Pet Cloning.” Journal of Folklore Research 42.3 (2005): 323-60.“How Content ID Works.” YouTube. 21 June 2013. ‹https://support.google.com/youtube/answer/2797370?hl=en›.Jenkins, Henry, Sam Ford, and Joshua Green. Spreadable Media: Creating Value and Meaning in a Networked Culture. New York: New York U P, 2013. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York U P, 2006. Kreisinger, Elisa. Interview with Nick Briz. Art:21. Art:21, 30 June 2011. 21 June 2013.Kreisinger, Elisa. “Queer Video Remix and LGBTQ Online Communities,” Transformative Works and Cultures 9 (2012). 19 June 2013 ‹http://journal.transformativeworks.org/index.php/twc/article/view/395/264›.Kreisinger, Elisa. Pop Culture Pirate. < http://www.popculturepirate.com/ >.Lessig, Lawrence. Remix: Making Art and Commerce Thrive in the Hybrid Economy. New York: Penguin Books, 2008. PDF.Meyers, B.G. “Filtering Systems or Fair Use? A Comparative Analysis of Proposed Regulations for User-Generated Content.” Cardozo Arts & Entertainment Law Journal 26.3: 935-56.Miller, Joseph M. “Fair Use through the Lenz of § 512(c) of the DMCA: A Preemptive Defense to a Premature Remedy?” Iowa Law Review 95 (2009-2010): 1697-1729.Navas, Eduardo. “Turbulence: Remixes + Bonus Beats.” New Media Fix 1 Feb. 2007. 10 June 2013 ‹http://newmediafix.net/Turbulence07/Navas_EN.html›.Ono, Kent A., and John M. Sloop. Shifting Borders: Rhetoric, Immigration and California’s Proposition 187. Philadelphia: Temple U P, 2002.“Privacy Policy – Policies & Principles.” Google. 19 June 2013 ‹http://www.google.com/policies/privacy/›.Postigo, Hector. “Capturing Fair Use for The YouTube Generation: The Digital Rights Movement, the Electronic Frontier Foundation, and the User-Centered Framing of Fair Use.” Information, Communication & Society 11.7 (2008): 1008-27.“Statistics – YouTube.” YouTube. 21 June 2013 ‹http://www.youtube.com/yt/press/statistics.html›.“US Copyright Office: Fair Use,” U.S. Copyright Office. 19 June 2013 ‹http://www.copyright.gov/fls/fl102.html›.“YouTube Help.” YouTube FAQ. 19 June 2013 ‹http://support.google.com/youtube/?hl=en&topic=2676339&rd=2›.

APA, Harvard, Vancouver, ISO, and other styles

22

Tofts, Darren, and Lisa Gye. "Cool Beats and Timely Accents." M/C Journal 16, no.4 (August11, 2013). http://dx.doi.org/10.5204/mcj.632.

Full text

Abstract:

Ever since I tripped over Tiddles while I was carrying a pile of discs into the studio, I’ve known it was possible to get a laugh out of gramophone records!Max Bygraves In 1978 the music critic Lester Bangs published a typically pugnacious essay with the fighting title, “The Ten Most Ridiculous Albums of the Seventies.” Before deliciously launching into his execution of Uri Geller’s self-titled album or Rick Dees’ The Original Disco Duck, Bangs asserts that because that decade was history’s silliest, it stands to reason “that ridiculous records should become the norm instead of anomalies,” that abominations should be the best of our time (Bangs, 1978). This absurd pretzel logic sounds uncannily like Jacques Derrida’s definition of the “post” condition, since for it to arrive it begins by not arriving (Derrida 1987, 29). Lester is thinking like a poststructuralist. The oddness of the most singularly odd album out in Bangs’ greatest misses of the seventies had nothing to do with how ridiculous it was, but the fact that it even existed at all. (Bangs 1978) The album was entitled The Best of Marcel Marceao. Produced by Michael Viner the album contained four tracks, with two identical on both sides: “Silence,” which is nineteen minutes long and “Applause,” one minute. To underline how extraordinary this gramophone record is, John Cage’s Lecture on Nothing (1959) is cacophonous by comparison. While Bangs agrees with popular opinion that The Best of Marcel Marceao the “ultimate concept album,” he concluded that this is “one of those rare records that never dates” (Bangs, 1978). This tacet album is a good way to start thinking about the Classical Gas project, and the ironic semiotics at work in it (Tofts & Gye 2011). It too is about records that are silent and that never date. First, the album’s cover art, featuring a theatrically posed Marceau, implies the invitation to speak in the absence of speech; or, in our terms, it is asking to be re-written. Secondly, the French mime’s surname is spelled incorrectly, with an “o” rather than “u” as the final letter. As well as the caprice of an actual album by Marcel Marceau, the implicit presence and absence of the letters o and u is appropriately in excess of expectations, weird and unexpected like an early title in the Classical Gas catalogue, Ernesto Laclau’s and Chantal Mouffe’s Hegemony and Socialist Strategy. (classical-gas.com) Like a zootrope animation, it is impossible not to see the o and u flickering at one at the same time on the cover. In this duplicity it performs the conventional and logical permutation of English grammar. Silence invites difference, variation within a finite lexical set and the opportunity to choose individual items from it. Here is album cover art that speaks of presence and absence, of that which is anticipated and unexpected: a gramophone recoding without sound. In this the Marceau cover is one of Roland Barthes’ mythologies, something larger than life, structured like a language and structured out of language (Barthes 1982). This ambiguity is the perfidious grammar that underwrites Classical Gas. Images, we learned from structuralism, are codified, or rather, are code. Visual remix is a rhetorical gesture of recoding that interferes with the semiotic DNA of an image. The juxtaposition of text and image is interchangeable and requires our imagination of what we are looking at and what it might sound like. This persistent interplay of metaphor and metonymy has enabled us to take more than forty easy listening albums and republish them as mild-mannered recordings from the maverick history of ideas, from Marxism and psychoanalysis, to reception theory, poststructuralism and the writings of critical auteurs. Foucault à gogo, for instance, takes a 1965 James Last dance album and recodes it as the second volume of The History of Sexuality. In saying this, we are mindful of the ambivalence of the very possibility of this connection, to how and when the eureka moment of remix recognition occurs, if at all. Mix and remix are, after Jean Baudrillard, both precession and procession of simulacra (Baudrillard, 1983). The nature of remix is that it is always already elusive and anachronistic. Not everyone can be guaranteed to see the shadow of one text in dialogue with another, like a hi-fi palimpsest. Or another way of saying this, such an epiphany of déjà vu, of having seen this before, may happen after the fact of encounter. This anachrony is central to remix practices, from the films of Quentin Tarrantino and the “séance fictions” of Soda_Jerk, to obscure Flintstones/Goodfellas mashups on YouTube. It is also implicit in critical understandings of an improbable familiarity with the superabundance of cultural archives, the dizzying excess of an infinite record library straight out of Jorge Luis Borges’ ever-expanding imagination. Drifting through the stacks of such a repository over an entire lifetime any title found, for librarian and reader alike, is either original and remix, sometime. Metalanguages that seek to counter this ambivalence are forms of bad faith, like film spoilers Brodie’s Notes. Accordingly, this essay sets out to explain some of the generic conventions of Classical Gas, as a remix project in which an image’s semiotic DNA is rewired and recontextualised. While a fake, it is also completely real (Faith in fakes, as it happens, may well be a forthcoming Umberto Eco title in the series). While these album covers are hyperreal, realistic in excess of being real, the project does take some inspiration from an actual, rather than imaginary archive of album covers. In 2005, Jewish artist Dani Gal happened upon a 1968 LP that documented the events surrounding the Six Day War in Israel in 1967. To his surprise, he found a considerable number of similar LPs to do with significant twentieth century historical events, speeches and political debates. In the artist’s own words, the LPs collected in his Historical Record Archive (2005-ongoing) are in fact silent, since it is only their covers that are exhibited in installations of this work, signifying a potential sound that visitors must try to audition. As Gal has observed, the interactive contract of the work is derived from the audience’s instinct to “try to imagine the sounds” even though they cannot listen to them (Gal 2011, 182). Classical Gas deliberately plays with this potential yearning that Gal astutely instils in his viewer and aspiring auditor. While they can never be listened to, they can entice, after Gilles Deleuze, a “virtual co-existence” of imaginary sound that manifests itself as a contract between viewer and LP (Deleuze 1991, 63). The writer Jeffrey Sconce condensed this embrace of the virtual as something plausibly real when he pithily observed of the Classical Gas project that it is “the thrift-bin in my fantasy world. I want to play S/Z at 78 rpm” (Sconce 2011). In terms of Sconce’s spectral media interests the LPs are haunted by the trace of potential “other” sounds that have taken possession of and appropriated the covers for another use (Sconce 2000).Mimetic While most albums are elusive and metaphoric (such as Freud’s Totem and Taboo, or Luce Irigaray’s Ethics of Sexual Difference), some titles do make a concession to a tantalizing, mimetic literalness (such as Das Institut fur Sozialforschung). They display a trace of the haunting subject in terms of a tantalizing echo of fact or suggestion of verifiable biography. The motivation here is the recognition of a potential similarity, since most Classical Gas titles work by contrast. As with Roland Barthes’ analysis of the erotics of the fashion system, so with Gilles Deleuze’s Coldness and Cruelty: it is “where the garment gapes” that the tease begins. (Barthes 1994, 9) Or, in this instance, where the cigarette smokes. (classical-gas.com) A casual Max Bygraves, paused in mid-thought, looks askance while lighting up. Despite the temptation to read even more into this, a smoking related illness did not contribute to Bygraves’ death in 2012. However, dying of Alzheimer’s disease, his dementia is suggestive of the album’s intrinsic capacity to be a palimpsest of the co-presence of different memories, of confused identities, obscure realities that are virtual and real. Beginning with the album cover itself, it has to become an LP (Deleuze 1991, 63). First, it is a cardboard, planar sleeve measuring 310mm squared, that can be imprinted with a myriad of different images. Secondly, it is conventionally identified in terms of a title, such as Organ Highlights or Classics Up to Date. Thirdly it is inscribed by genre, which may be song, drama, spoken word, or novelty albums of industrial or instrumental sounds, such as Memories of Steam and Accelerated Accordians. A case in point is John Woodhouse And His Magic Accordion from 1969. (classical-gas.com) All aspects of its generic attributes as benign and wholesome accordion tunes are warped and re-interpreted in Classical Gas. Springtime for Kittler appeared not long after the death of its eponymous philosopher in 2011. Directed by Richard D. James, also known as Aphex Twin, it is a homage album to Friedrich Kittler by the PostProducers, a fictitious remix collective inspired by Mel Brooks whose personnel include Mark Amerika and Darren Tofts. The single from this album, yet to be released, is a paean to Kittler’s last words, “Alle Apparate auschalten.” Foucault à gogo (vol. 2), the first album remixed for this series, is also typical of this archaeological approach to the found object. (classical-gas.com) The erasure and replacement of pre-existing text in a similar font re-writes an iconic image of wooing that is indicative of romantic album covers of this period. This album is reflective of the overall project in that the actual James Last album (1968) preceded the publication of the Foucault text (1976) that haunts it. This is suggestive of how coding and recoding are in the eye of the beholder and the specific time in which the remixed album is encountered. It doesn’t take James Last, Michel Foucault or Theodor Holm Nelson to tell you that there is no such thing as a collective memory with linear recall. As the record producer Milt Gabler observes in the liner notes to this album, “whatever the title with this artist, the tune remains the same, that distinct and unique Foucault à gogo.” “This artist” in this instance is Last or Foucault, as well as Last and Foucault. Similarly Milt Gabler is an actual author of liner notes (though not on the James Last album) whose words from another album, another context and another time, are appropriated and deftly re-written with Last’s Hammond à gogo volume 2 and The History of Sexuality in mind as a palimpsest (this approach to sampling liner notes and re-writing them as if they speak for the new album is a trope at work in all the titles in the series). And after all is said and done with the real or remixed title, both artists, after Umberto Eco, will have spoken once more of love (Eco 1985, 68). Ambivalence Foucault à gogo is suggestive of the semiotic rewiring that underwrites Classical Gas as a whole. What is at stake in this is something that poststructuralism learned from its predecessor. Taking the tenuous conventionality of Ferdinand de Saussure’s signifier and signified as a starting point, Lacan, Derrida and others embraced the freedom of this arbitrariness as the convention or social contract that brings together a thing and a word that denotes it. This insight of liberation, or what Hélène Cixous and others, after Jacques Lacan, called jouissance (Lacan 1992), meant that texts were bristling with ambiguity and ambivalence, free play, promiscuity and, with a nod to Mikhail Bakhtin, carnival (Bakhtin 1984). A picture of a pipe was, after Foucault after Magritte, not a pipe (Foucault 1983). This po-faced sophistry is expressed in René Magritte’s “Treachery of Images” of 1948, which screamed out that the word pipe could mean anything. Foucault’s reprise of Magritte in “This is Not a Pipe” also speaks of Classical Gas’ embrace of the elasticity of sign and signifier, his “plastic elements” an inadvertent suggestion of vinyl (Foucault 1983, 53). (classical-gas.com) This uncanny association of structuralism and remixed vinyl LPs is intimated in Ferdinand de Saussure’s Cours de linguistique générale. Its original cover art is straight out of a structuralist text-book, with its paired icons and words of love, rain, honey, rose, etc. But this text as performed by Guy Lombardo and his Royal Canadians in New York in 1956 is no less plausible than Saussure’s lectures in Geneva in 1906. Cultural memory and cultural amnesia are one and the same thing. Out of all of the Classical Gas catalogue, this album is arguably the most suggestive of what Jeffrey Sconce would call “haunting” (Sconce, 2000), an ambivalent mixing of the “memory and desire” that T.S. Eliot wrote of in the allusive pages of The Waste Land (Eliot 1975, 27). Here we encounter the memory of a bookish study of signs from the early twentieth century and the desire for its vinyl equivalent on World Record Club in the 1960s. Memory and desire, either or, or both. This ambivalence was deftly articulated by Roland Barthes in his last book, Camera Lucida, as a kind of spectral haunting, a vision or act of double seeing in the perception of the photographic image. This flickering of perception is never static, predictable or repeatable. It is a way of seeing contingent upon who is doing the looking and when. Barthes famously conceptualised this interplay in perception of an between the conventions that culture has mandated, its studium, and the unexpected, idiosyncratic double vision that is unique to the observer, its punctum (Barthes 1982, 26-27). Accordingly, the Cours de linguistique générale is a record by Saussure as well as the posthumous publication in Paris and Lausanne of notes from his lectures in 1916. (Barthes 1982, 51) With the caption “Idiot children in an institution, New Jersey, 1924,” American photographer Lewis Hine’s anthropological study declares that this is a clinical image of pathological notions of monstrosity and aberration at the time. Barthes though, writing in a post-1968 Paris, only sees an outrageous Danton collar and a banal finger bandage (Barthes 1982, 51). With the radical, protestant cries of the fallout of the Paris riots in mind, as well as a nod to music writer Greil Marcus (1989), it is tempting to see Hine’s image as the warped cover of a Dead Kennedys album, perhaps Plastic Surgery Disasters. In terms of the Classical Gas approach to recoding, though, this would be far too predictable; for a start there is neither a pipe, a tan cardigan nor a chenille scarf to be seen. A more heart-warming, suitable title might be Ray Conniff’s 1965 Christmas Album: Here We Come A-Caroling. Irony (secretprehistory.net) Like our Secret Gestural Prehistory of Mobile Devices project (Tofts & Gye), Classical Gas approaches the idea of recoding and remixing with a relentless irony. The kind of records we collect and the covers which we use for this project are what you would expect to find in the hutch of an old gramophone player, rather than “what’s hot” in iTunes. The process of recoding the album covers seeks to realign expectations of what is being looked at, such that it becomes difficult to see it in any other way. In this an album’s recoded signification implies the recognition of the already seen, of album covers like this, that signal something other than what we are seeing; colours, fonts etc., belonging to a historical period, to its genres and its demographic. One of the more bucolic and duplicitous forms of rhetoric, irony wants it both ways, to be totally lounge and theoretically too-cool-for school, as in Rencontre Terrestre by Hélène Cixous and Frédéric-Yves Jeannet. (classical-gas.com) This image persuades through the subtle alteration of typography that it belongs to a style, a period and a vibe that would seem to be at odds with the title and content of the album, but as a totality of image and text is entirely plausible. The same is true of Roland Barthes’ S/Z. The radical semiologist invites us into his comfortable sitting room for a cup of coffee. A traditional Times font reinforces the image of Barthes as an avuncular, Sunday afternoon story-teller or crooner, more Alistair Cooke/Perry Como than French Marxist. (classical-gas.com) In some instances, like Histoire de Tel Quel, there is no text at all on the cover and the image has to do its signifying work iconographically. (classical-gas.com) Here a sixties collage of French-ness on the original Victor Sylvester album from 1963 precedes and anticipates the re-written album it has been waiting for. That said, the original title In France is rather bland compared to Histoire de Tel Quel. A chic blond, the Eiffel Tower and intellectual obscurity vamp synaesthetically, conjuring the smell of Gauloises, espresso and agitated discussions of Communism on the Boulevard St. Germain. With Marcel Marceao with an “o” in mind, this example of a cover without text ironically demonstrates how Classical Gas, like The Secret Gestural Prehistory of Mobile Devices, is ostensibly a writing project. Just as the images are taken hostage from other contexts, text from the liner notes is sampled from other records and re-written in an act of ghost-writing to complete the remixed album. Without the liner notes, Classical Gas would make a capable Photoshop project, but lacks any force as critical remix. The redesigned and re-titled covers certainly re-code the album, transform it into something else; something else that obviously or obliquely reflects the theme, ideas or content of the title, whether it’s Louis Althusser’s Philosophy as a Revolutionary Weapon or Luce Irigaray’s An Ethics of Sexual Difference. If you don’t hear the ruggedness of Leslie Fiedler’s essays in No! In Thunder then the writing hasn’t worked. The liner notes are the albums’ conscience, the rubric that speaks the tunes, the words and elusive ideas that are implied but can never be heard. The Histoire de Tel Quel notes illustrate this suggestiveness: You may well think as is. Philippe Forest doesn’t, not in this Éditions du Seuil classic. The titles included on this recording have been chosen with a dual purpose: for those who wish to think and those who wish to listen. What Forest captures in this album is distinctive, fresh and daring. For what country has said it like it is, has produced more robustesse than France? Here is some of that country’s most famous talent swinging from silk stockings, the can-can, to amour, presented with the full spectrum of stereo sound. (classical-gas.com) The writing accurately imitates the inflection and rhythm of liner notes of the period, so on the one hand it sounds plausibly like a toe-tapping dance album. On the other, and at the same time, it gestures knowingly to the written texts upon which it is based, invoking its rigours as a philosophical text. The dithering suggestiveness of both – is it music or text – is like a scrambled moving image always coming into focus, never quite resolving into one or the other. But either is plausible. The Tel Quel theorists were interested in popular culture like the can-can, they were fascinated with the topic of love and if instead of books they produced albums, their thinking would be auditioned in full stereo sound. With irony in mind, then, it’s hardly surprising to know that the implicit title of the project, that is neither seen nor heard but always imminent, is Classical Gasbags. (classical-gas.com) Liner notes elaborate and complete an implicit narrative in the title and image, making something compellingly realistic that is a composite of reality and fabulation. Consider Adrian Martin’s Surrealism (A Quite Special Frivolity): France is the undeniable capital of today’s contemporary sound. For Adrian Martin, this is home ground. His French soul glows and expands in the lovely Mediterranean warmth of this old favourite, released for the first time on Project 3 Total Sound Stereo. But don’t be deceived by the tonal and melodic caprices that carry you along in flutter-free sound. As Martin hits his groove, there will be revolution by night. Watch out for new Adrian Martin releases soon, including La nuit expérimentale and, his first title in English in many years, One more Bullet in the Head (produced by Bucky Pizzarelli). (classical-gas.com) Referring to Martin’s famous essay of the same name, these notes allusively skirt around his actual biography (he regularly spends time in France), his professional writing on surrealism (“revolution by night” was the sub-title of a catalogue for the Surrealism exhibition at the National Gallery of Australia in Canberra and the Art Gallery of New South Wales in 1993 to which he contributed an essay) (Martin 1993), as well as “One more bullet in the head,” the rejected title of an essay that was published in World Art magazine in New York in the mid-1990s. While the cover evokes the cool vibe of nouvelle vague Paris, it is actually from a 1968 album, Roma Oggi by the American guitarist Tony Mottola (a real person who actually sounds like a fictional character from Sergio Leone’s Once Upon A Time in America, a film on which Martin has written a book for the British Film Institute). Plausibility, in terms of Martin’s Surrealism album, has to be as compellingly real as the sincerity of Sandy Scott’s Here’s Sandy. And it should be no surprise to see the cover art of Scott’s album return as Georges Bataille’s Erotism. Gramophone The history of the gramophone represents the technological desire to write sound. In this the gramophone record is a ligature of sound and text, a form of phonographic writing. With this history in mind it’s hardly surprising that theorists such as Derrida and Kittler included the gramophone under the conceptual framework of a general grammatology (Derrida 1992, 253 & Kittler 1997, 28). (classical-gas.com) Jacques Derrida’s Of Grammatology is the avatar of Classical Gas in its re-writing of a previous writing. Re-inscribing the picaresque Pal Joey soundtrack as a foundation text of post-structuralism is appropriate in terms of the gramme or literate principle of Western metaphysics as well as the echolalia of remix. As Derrida observes in Of Grammatology, history and knowledge “have always been determined (and not only etymologically or philosophically) as detours for the purpose of the reappropriation of presence” (Derrida 1976, 10). A gas way to finish, you might say. But in retrospect the ur-text that drives the poetics of Classical Gas is not Of Grammatology but the errant Marcel Marceau album described previously. Far from being an oddity, an aberration or a “novelty” album, it is a classic gramophone recording, the quintessential writing of an absent speech, offbeat and untimely. References Bahktin, Mikhail. Rabelais and His World. Trans. Hélène Iswolsky. Bloomington: Indiana University Press, 1985. Bangs, Lester. “The Ten Most Ridiculous Albums of the Seventies”. Phonograph Record Magazine, March, 1978. Reproduced at http://rateyourmusic.com/list/dacapo/the_ten_most_ridiculous_records_of_the_seventies__by_lester_bangs. Barthes, Roland. Camera Lucida: Reflections on Photography. Trans. Richard Howard. London: Flamingo, 1982. ---. Mythologies. Trans. Annette Lavers. London: Granada, 1982. ---. The Pleasure of the Text. Trans. Richard Miller. Oxford: Blackwell, 1994. Baudrillard, Jean. Simulations. Trans. Paul Foss, Paul Patton and Philip Beitchman. New York: Semiotext[e], 1983. Deleuze, Gilles. Bergsonism. Trans. Hugh Tomlinson and Barbara Habberjam. New York: Zone Books, 2000. Derrida, Jacques. Of Grammatology. Trans. Gayatri Chakravorty Spivak. Baltimore: Johns Hopkins University Press, 1976. ---. The Post Card: From Socrates to Freud and Beyond. Trans. Alan Bass. Chicago: Chicago University Press, 1987. ---. “Ulysses Gramophone: Hear Say Yes in Joyce,” in Acts of Literature. Ed. Derek Attridge. New York: Routledge, 1992. Eco, Umberto. Reflections on The Name of the Rose. Trans. William Weaver. London: Secker & Warburg, 1985. Eliot, T.S. The Waste Land and Other Poems. London: Faber & Faber, 1975. Foucault, Michel. This Is Not a Pipe. Trans. James Harkness. Berkeley: University of California Press, 1983. ---. The Use of Pleasure: The History of Sexuality Volume 2. Trans. Robert Hurley. New York: Random House, 1985. Gal, Dani. Interview with Jens Hoffmann, Istanbul Biennale Companion. Istanbul Foundation for Culture and the Arts, 2011. Kittler, Friedrich. “Gramophone, Film, Typewriter,” in Literature, Media, Information Systems. Ed. John Johnston. Amsterdam: Overseas Publishers Association, 1997. Lacan, Jacques. The Ethics of Psychoanalysis (1959–1960): The Seminar of Jacques Lacan. Trans. Dennis Porter. London: Routledge, 1992. Marcus, Greil. Lipstick Traces: A Secret History of the Twentieth Century. London: Secker & Warburg, 1989. Martin, Adrian. “The Artificial Night: Surrealism and Cinema,” in Surrealism: Revolution by Night. Canberra: National Gallery of Australia, 1993. Sconce, Jeffrey. Haunted Media: Electronic Presence from Telegraphy to Television. Durham: Duke University Press, 2000. ---. Online communication with authors, June 2011. Tofts, Darren and Lisa Gye. The Secret Gestural Prehistory of Mobile Devices. 2010-ongoing. http://www.secretprehistory.net/. ---. Classical Gas. 2011-ongoing. http://www.classical-gas.com/.

APA, Harvard, Vancouver, ISO, and other styles

23

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no.3 (June1, 2007). http://dx.doi.org/10.5204/mcj.2665.

Full text

Abstract:

Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circ*mscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circ*mscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. Citation reference for this article MLA Style Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>.

APA, Harvard, Vancouver, ISO, and other styles

24

Piper, Melanie. "Blood on Boylston: Digital Memory and the Dramatisation of Recent History in Patriots Day." M/C Journal 20, no.5 (October13, 2017). http://dx.doi.org/10.5204/mcj.1288.

Full text

Abstract:

IntroductionWhen I saw Patriots Day (Berg 2016) at my local multiplex, a family entered the theatre and sat a few rows in front of me. They had a child with them, a boy who was perhaps nine or ten years old. Upon seeing the kid, I had a physical reaction. Not quite a knee-jerk, but more of an uneasy gut punch. ‘Don't you know what this movie is about?’ I wanted to ask his parents; ‘I’ve seen Jeff Bauman’s bones, and that is not something a child should see.’ I had lived through the 2013 Boston Marathon bombing and subsequent manhunt, and the memories were vivid in my mind as I waited for the movie to start, to re-present the memory on screen. Admittedly, I had lived through it from the other side of the world, watching through the mediated windows of the computer, smartphone, and television screen. Nevertheless, I remembered it in blood-soaked colour detail, brought to me by online photo galleries, social media updates, the failed amateur sleuths of Reddit, and constant cable news updates, breaking news even when the events had temporarily stalled. Alison Landsberg has coined the term “prosthetic memory” to describe how historical events are re-created and imbued with an affective experience through cinema and other sites of mass cultural mediation, allowing those who did not experience the past to form a personal connection to and subjective memory of history (2). For the boy in the cinema, Patriots Day would most likely be his first encounter with and memory of the Boston Marathon bombing. But how does prosthetic memory apply to audience members like me, who had lived through the Boston bombing from a great distance, with personalised memories mediated by the first-person perspective of social media? Does the ease of dissemination of information, particularly eyewitness photographs and videos, create possibilities for a prosthetic experience of the present? Does the online mediation of historical events of the present translate to screen dramatisations? These questions become particularly pertinent when the first-release audience of a film has recent, living memories of the real events depicted on screen.The time between when an event occurs and when it is brought to cinemas in a true-events adaptation is decreasing. Rebecca A. Sheehan argues that the cultural value of instant information has given rise to a trend in the contemporary biopic and historical film that sees our mediated world turned into a temporal "paradox in which the present is figured as both historical and ongoing" (36). Since 2005, Sheehan writes, biographical films that depict the lives of still-living public figures or in other ways comment on the ongoing history of the present have become increasingly frequent. Sheehan cites films such as The Social Network (Fincher 2010), The Queen (Frears 2006), W. (Stone 2008), and Game Change (Roach 2012) as examples of this growing biopic trend (35-36). In addition to the instantaneous remediation of public figures in the contemporary biopic, similarly there is a stable of contemporary historical films based on the true stories of ordinary people involved in extraordinary recent events. Films such as The Impossible (Bayona 2012), World Trade Center (Stone 2006), United 93 (Greengrass 2006), and Deepwater Horizon (Berg 2016) bring the death and destruction of real-world natural disasters or terrorist attacks to a sanitised but experiential cinematic event. The sensitive nature of some of the events in question often see the films labelled “too soon” and exploitative of recent tragedy. Films such as these typically do not have known public figures as their protagonists, but they arise from a similar climate of the demands of televisual and online mediation that Sheehan describes in the “instant biopics” of her study (36). Given this rise of brief temporal space between real events and their dramatisations, in this essay, I examine Patriots Day in light of the role digital experience plays in both its dramatisation and how the film's initial audience may remember the event. As Patriots Day replicates a kind of prosthetic memory of the present, it uses the first-instance digital mediation of the event to form prosthetic memories for future viewers. Through Patriots Day, I seek to gesture toward the possibilities of first-person digital mediation of major news events in shaping dramatisations of the recent past.Digital Memories of the Boston Marathon BombingTo examine the ways the Boston Marathon bombing circulated in online space, I look at the link- and image-based online discussion platform Reddit as an example of engagement with and recirculation of the event, particularly as a form of engagement defined by photographs and videos. Because the Boston Marathon is a televised and widely-reported event, professional videographers and photographers were present at the marathon’s finish line at the time of the first explosion. Thus, the first bomb and its immediate aftermath were captured in news footage and still images. The graphic nature of some of these images depicting the violence of the scene saw traditional print and television outlets cropping or otherwise editing the photographs to make them appropriate for mass broadcast (Hughney). Some online outlets, however, showed these pictures in their unedited form, often accompanied by warnings that required readers to scroll further down the page or click through the warning to see the photographs. These distinctive capabilities of the online environment allowed individuals to choose whether to view the image, while still allowing the uncensored image to circulate and be reposted elsewhere, such as on Reddit. In addition to photos and videos shot by professionals at the finish line, witnesses armed with smart phone cameras and access to social media posted their views of the aftermath to social media like Twitter, enabling the collation of both amateur and professionally shot photographs of the scene by online news aggregators such as Buzzfeed (Broderick). The Reddit community is seen as an essential part of the Boston Bombing story for the way some of its users participated in a form of ‘crowd-sourced’ investigation that resulted in the false identification of suspects (see: Nhan et al.; Tapia et al.; Potts and Harrison). There is another aspect to Reddit’s role in the circulation and mediation of the story, however, as online venues became a go-to source for news on the unfolding event, where information was delivered faster and with greater accuracy than the often-sensationalised television news coverage (Starbird et al. 347). In addition to its role in providing information that is a part of Reddit’s culture that “value[s] evidence of some kind” to support discussion (Potts and Harrison 144), Reddit played a number of roles in the sense-making process that social media can often facilitate during crisis situations (Heverin and Zach). Through its division into “subreddits,” the individual communities and discussion areas that make up the platform, Reddit accommodates an incredibly diverse range of topics and interests. Different areas of Reddit were able to play different roles in the process of sharing information and acting in a community sense-making capacity in the aftermath of the bombing. Among the subreddits involved in attempting to make sense of the event were those that served as appropriate places for posting image galleries of both professional and amateur photographs and videos, drawn from a variety of online sources. Users of subreddits such as /r/WTF and /r/MorbidReality, for example, posted galleries of “NSFL” (Not Safe For Life) images of the bombing and its aftermath (see: touhou_hijack, titan059, f00d4tehg0dz). Additionally, the /r/Boston subreddit issued calls for anyone with photographs or videos related to the attack to upload them to the thread, as well as providing an e-mail address to submit them to the FBI (RichardHerold). The /r/FindBostonBombers subreddit became a hub for analysis of the photographs. The subreddit's investigatory work was picked up by other online and traditional media outlets (including the New York Post cover photo which misidentified two suspects), bringing wider attention to Reddit’s unfolding coverage of the bombing (Potts and Harrison 148). Landsberg’s theory of prosthetic memory, and her application of it, largely relates to mass culture’s role in “the production and dissemination of memories that have no direct connection to a person’s lived past” (20). The possibilities for news events to be recorded and disseminated by smart phones and social media, however, help to create a deeper sense of affective engagement with a distant present, creating prosthetic memories out of the mediated first-hand experiences of others. The graphic nature of the photos and videos of the Boston bombing collected by and shared on sites like Reddit, the ongoing nature of the event (which, from detonation to the capture of Dzokhar Tsarnaev, spanned five days), and the participatory activity of scouring photographs for clues to the identity of the bombers all lend a sense of ongoing, experiential engagement with first-person, audiovisual mediations of the event. These prosthetic memories of the present are, as Landsberg writes of those created from dramatisations or re-creations of the past, transferable, able to belong to those who have no “natural” claim to them (18) with an experiential element that personalises history for those who do not directly experience it (33). If widely disseminated first-person mediations of events like the Boston bombing can be thought of as a prosthetic experience of present history, how will they play a part in the prosthetic memories of the future? How will those who did not live through the Boston bombing, either as a personal experience or a digitally mediated one, incorporate this digital memory into their own experience of its cinematic re-creation? To address this question, I turn to consider Patriots Day. Of particular note is the bombing sequence’s resemblance to digital mediations of the event as a marker of a plausible docudramatic resemblance to reality.The Docudramatic Re-Presentation of Digital MemoryAs a cinematic representation of recent history, Patriots Day sits at a somewhat uncomfortable intersection of fact and fiction, of docudrama and popcorn action movie, more so than an instant history film typically would. Composite characters or entirely invented characters and narratives that play out against the backdrop of real events are nothing out of the ordinary in the historical film. However, Patriots Day's use of real material and that of pure invention coincides, frequently in stark contrast. The film's protagonist, Boston Police Sergeant Tommy Saunders (played by Mark Wahlberg) is a fictional character, the improbable hero of the story who is present at every step of the attack and the manhunt. He is there on Boylston Street when the bombs go off. He is there with the FBI, helping to identify the suspects with knowledge of Boylston Street security cameras that borders on a supernatural power. He is there at the Watertown shootout among exploding cars and one-liner quips. When Dzokhar Tsarnaev is finally located, he is, of course, first on the scene. Tommy Saunders, as embodied by Wahlberg, trades on all the connotations of both the stereotypical Boston Southie and the action hero that are embedded in Wahlberg’s star persona. As a result, Patriots Day often seems to be a depiction of an alternate universe where Mark Wahlberg in a cop uniform almost single-handedly caught a terrorist. The improbability of Saunders as a character in a true-events drama, though, is thoroughly couched in the docudramatic material of historical depiction. Steven N. Lipkin argues that docudrama is a mode of representation that performs a re-creation of memory to persuade us that it is representing the real (1). By conjuring the memory of an event into being in ways that seem plausible and anchored to the evidence of actuality—such as integrating archival footage or an indexical resemblance to the actual event or an actual person—the representational, cinematic, or fictionalised elements of docudrama are imbued with a sense of the reality they claim to represent (Lipkin 3). Patriots Day uses real visual material throughout the film. The integration of evidence is particularly notable in the bombing sequence, which combines archival footage of the 2013 race, surveillance footage of the Tsarnaev brothers approaching the finish line, and a dramatic re-creation that visually resembles the original to such an extent that its integration with archival footage is almost seamless (Landler). The conclusion of the film draws on this evidential connection to the real as well, in the way that docudrama is momentarily suspended to become documentary, as interviews with some of the real people who are depicted as characters in the film close out the story. In addition to its direct use of the actual, Patriots Day's re-creation of the bombing itself bears an indexical resemblance to the event as seen by those who were not there and relies on memories of the bombing's initial mediation to vouch for the dramatisation's accuracy. In the moments before the bombing's re-creation, actual footage of the Tsarnaevs's route down Boylston Street plays, a low ominous tone of the score building over the silent security footage. The fictional Saunders’s fictional wife (Michelle Monaghan) has come to the finish line to bring him a knee brace, and she passes Tamerlan Tsarnaev as she leaves. This shot directly crosses a visual resemblance to the actual (Themo Melikidze playing Tsarnaev, resembling the bomber through physicality and costuming) with the fictional structuring device of the film in the form of Tommy Saunders. Next, in a long shot, we see Tsarnaev bump into a man wearing a grey raglan shirt. The man turns to look at Tsarnaev. From the costuming, it is evident that this man who is not otherwise named is intended to represent Jeff Bauman, the subject of an iconic photograph from the bombing. In the photo, Bauman is shown being taken from the scene in a wheelchair with both legs amputated from below the knee by the blast (another cinematic dramatisation of the Boston bombing, Stronger, based on Bauman’s memoir of the same name, will be released in 2017). In addition to the visual signifier of Bauman from the memorable photograph, reports circulated that Bauman's ability to describe Tsarnaev to the FBI in the immediate aftermath of the bombing was instrumental in identifying the suspects (Hartmann). Here, this digital memory is re-created in a brief but recognisable moment: this is the before picture of Jeff Bauman, this is the moment of identification that was widely circulated and talked about, a memory of that one piece of good news that helped satisfy public curiosity about the status of the iconic Man in the Wheelchair.When the bombs detonate, we are brought into the smoke and ash, closer access than the original mediation afforded by the videographers at the finish line. After the first bomb detonates, the camera follows Saunders as he walks toward the smoke cloud. As the second bomb explodes, we go inside the scene. The sequence cuts from actual security camera footage that captured the blast, to a first-person perspective of the explosion, the resulting fire and smoke, and a shot that resembles the point of view of footage captured on a smart phone. The frame shakes wildly, giving the viewer disorienting flashes of the victims, a sense of the chaos without seeing anything in lasting, specific detail, before the frame tips sideways onto the pavement, stained with blood and littered with debris. Coupled with this is a soundscape that resembles both the subjective experience of a bombing victim and what their smart phone video has captured. There is the rumble of the explosion and muffled sounds of debris hidden under the noise of shockwaves of air hitting a microphone, fading into an electronic whine and tinnitus ring. A later shot shows the frame obscured by smoke, slowly clearing to give us a high angle view of the aftermath, resembling photographs taken from a window overlooking the scene on Boylston Street (see: touhou_hijack). Archival footage of first responders and points of view resembling a running cell phone camera that captures flashes of blood and open wounds combine with shots of the actors playing characters (both fictional and based on real people) that were established at the beginning of the film. There is once again a merging of the re-created and the actual, bound together by a sense of memory that encourages the viewer to take the former as plausible, based on its resemblance to the latter.When Saunders runs for the second bombing site further down the street, he looks down at two bodies on the ground. Framed in close-up, the bloodless, empty expression and bright blue shirt of Krystle Campbell are recognisable. We can ignore the inaccuracies of this element of the digital memory amidst the chaos of the sequence. Campbell died in the first bombing, not the second. The body of a woman in a black shirt is between the camera's position on the re-created Boylston Street and the actor standing in for Campbell, the opposite of how Campbell and her friend Karen Rand lay beside each other in photographs of the bombing aftermath. The police officer who takes Krystle's pulse on film and shakes her head at Wahlberg's character is a brunette, not the blonde in the widely-circulated picture of a first responder at the actual bombing. The most visceral portion of the image is there, though, re-created almost exactly as it appeared at its first point of mediation: the lifeless eyes and gaping mouth, the bright blue t-shirt. The memory of the event is conjured into being, and the cinematic image resembles the most salient elements of the memory enough for the cinematic image to be a plausible re-creation. The cinematic frame is positioned at a lower level to the original still, as though we are on the ground beside her, bringing the viewer even closer to the event, even as the frame crops out her injuries as scene photographs did not, granting a semblance of respectful distance from the real death. This re-creation of Krystle Campbell’s death is a brief flash in the sequence, but a powerful moment of recognition for those who remember its original mediation. The result is a sequence that shows the graphic violence of the actuality it represents in a series of images that invite its viewer to expand the sequence with their memory of the event the way most of them experienced it: on other screens, at the site of its first instance of digital mediation.ConclusionThrough its use of cinematography that resembles actual photographic evidence of the Boston Marathon bombing or imbues the re-creation with a sense of a first-person, digitally mediated account of the event, Patriots Day draws on its audience's digital memory of recent history to claim accuracy in its fictionalisation. Not everyone who sees Patriots Day may be as familiar with the wealth of eyewitness photographs and images of the Boston Marathon bombing as those who may have experienced and followed the events in online venues such as Reddit. Nonetheless, the fact of this material's existence shapes the event's dramatisation as the filmmakers attempt to imbue the dramatisation with a sense of accuracy and fidelity to the event. The influence of digital memory on the film’s representation of the event gestures toward the possibilities for how online engagement with major news events may play a role in their dramatisation moving forward. Events that have had eyewitness visual accounts distributed online, such as the 2015 Bataclan massacre, the 2016 Pulse nightclub shooting, the 2017 Manchester Arena bombing and Westminster Bridge attack, or the 2016 police shooting of Philando Castile that was streamed on Facebook live, may become the subject of future dramatisations of recent history. The dramatic renderings of contemporary history films will undoubtedly be shaped by the recent memory of their online mediations to appeal to a sense of accuracy in the viewer's memory. As recent history films continue, digital memories of the present will help make the prosthetic memories of the future. ReferencesBroderick, Ryan. “Photos from the Scene of the Boston Marathon Explosion (Extremely Graphic).” Buzzfeed News, 16 Apr. 2013. 2 Aug. 2017 <https://www.buzzfeed.com/ryanhatesthis/first-photos-from-the-scene-of-the-boston-marathon-explosion?utm_term=.fw38Byjq1#.peNXWPe8G>.f00d4tehg0dz. “Collection of Photos from the Boston Marathon Bombing (NSFW) (NSFL-Gore).” Reddit, 16 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/WTF/comments/1cfhg4/collection_of_photos_from_the_boston_marathon/>.Hartmann, Margaret. “Bombing Victim in Iconic Photo Was Key to Identifying Boston Suspects.” New York Magazine, 18 Apr. 2013. 8 Aug. 2017 <http://nymag.com/daily/intelligencer/2013/04/bombing-victim-identified-suspects.html>.Heverin, Thomas, and Lisl Zach. “Use of Microblogging for Collective Sense-Making during Violent Crises: A Study of Three Campus Shootings.” Journal of the American Society for Information Science and Technology 63.1 (2012): 34-47. Hughney, Christine. “News Media Weigh Use of Photos of Carnage.” New York Times, 17 Apr. 2013. 2 Aug. 2017 <http://www.nytimes.com/2013/04/18/business/media/news-media-weigh-use-of-photos-of-carnage.html>.Landler, Edward. “Recreating the Boston Marathon Bombing in Patriots Day.” Cinemontage, 21 Dec. 2016. 8 Aug. 2017 <http://cinemontage.org/2016/12/recreating-boston-marathon-bombing-patriots-day/>.Landsberg, Alison. Prosthetic Memory: The Transformation of American Remembrance in the Age of Mass Culture. New York: Columbia U P, 2004. Lipkin, Steven N. Docudrama Performs the Past: Arenas of Argument in Films Based on True Stories. Newcastle upon Tyne: Cambridge Scholars, 2011. Nhan, Johnny, Laura Huey, and Ryan Broll. “Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombing.” British Journal of Criminology 57 (2017): 341-361. Patriots Day. Dir. Peter Berg. CBS Films, 2016.Potts, Liza, and Angela Harrison. “Interfaces as Rhetorical Constructions. Reddit and 4chan during the Boston Marathon Bombings.” Proceedings of the 31st ACM International Conference on Design of Communication. Greenville, North Carolina, September-October 2013. 143-150. RichardHerold. “2013 Boston Marathon Attacks: Please Upload Any Photos in Relation to the Attacks That You Have.” Reddit, 15 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/boston/comments/1cf5wp/2013_boston_marathon_attacks_please_upload_any/>.Sheehan, Rebecca A. “Facebooking the Present: The Biopic and Cultural Instantaneity.” The Biopic in Contemporary Film Culture. Eds. Tom Brown and Bélen Vidal. New York: Routledge, 2014. 35-51. Starbird, Kate, Jim Maddock, Mania Orand, Peg Achterman, and Robert M. Mason. “Rumors, False Flags, and Digital Vigilantes: Misinformation on Twitter after the 2013 Boston Marathon Bombing.” iConference 2014 Proceedings. Berlin, March 2014. 654-662. Tapia, Andrea H., Nicolas LaLone, and Hyun-Woo Kim. “Run Amok: Group Crowd Participation in Identifying the Bomb and Bomber from the Boston Marathon Bombing.” Proceedings of the 11th International ISCRAM Conference. Eds. S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih. University Park, Pennsylvania, May 2014. 265-274. titan059. “Pics from Boston Bombing NSFL.” Reddit, 15 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/WTF/comments/1cf0po/pics_from_boston_bombing_nsfl/>.touhou_hijack. “Krystle Campbell Died Screaming. This Sequence of Photos Shows Her Final Moments.” Reddit, 18 Apr. 2013. 8 Aug. 2017 <https://www.reddit.com/r/MorbidReality/comments/1cktrx/krystle_campbell_died_screaming_this_sequence_of/>.

APA, Harvard, Vancouver, ISO, and other styles

We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography
Journal articles: 'Electronic mail and communication records of a similar nature' – Grafiati (2024)

References

Top Articles
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 6291

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.