To see the other types of publications on this topic, follow the link: Bills of lading – Data processing.

Journal articles on the topic 'Bills of lading – Data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 journal articles for your research on the topic 'Bills of lading – Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sugiyah, Sugiyah, and Nurhidayati Nurhidayati. "Prosedur Pengadaan Barang Impor Produk sepatu Di PT Sinar Pratama Agung Jakarta." Jurnal Akuntansi dan Manajemen 16, no. 02 (2019): 267–86. http://dx.doi.org/10.36406/jam.v16i02.248.

Full text
Abstract:
Procurement of goods is important for the company, because it is very important to the company and corporate profits. Procurement can be done in several ways, one of which is by way of import. In this time, an activity of importing a goods is not a difficult way because and many offer services to import the goods. Methods of data collection is done by observation, interview and documentation. Steps for procurement of goods is start from product selection, ordering of goods, making and checking documents to import, delivery of goods, payment of invoices, PIB payments, processes on shipping and customs, further processing of ports arriving at destination, carrying out goods, and finally can check the condition of goods in the warehouse. Documents required for the procurement process of imported goods are: Purchase Order, Invoice, Packing List, Bill of Lading, Certificate of Origin, Insurance, and Surveyor Report. To facilitate the process on customs and shipping until the expenditure of goods from the port can use forwarder services. This makes it easier and very helpful in the procurement process by importing.
 Pengadaan barang merupakan hal yang penting dalam suatu perusahaan dagang, karena sangat berpengaruh terhadap jalannya suatu perusahaan dan keuntungan perusahaan. Pengadaan barang dapat dilakukan dengan beberapa cara, salah satunya yaitu dengan cara impor. Pada saat ini kegiatan mengimpor barang bukanlah hal yang sulit dan banyak yang menawarkan jasa untuk mengimpor barang. Metode pengumpulan data dilakukan dengan cara observasi, wawancara dan dokumentasi. Prosedur pengadaan barang impor dilakukan mulai dari pemilihan produk barang, pemesanan barang, membuat dan pengecekan dokumen untuk mengimpor barang, pengiriman barang, pembayaran Invoice, pembayaran PIB, proses pada pelayaran dan beacukai, selanjutnya proses pengeluaran barang dari pelabuhan hingga barang tiba pada tempat tujuan, penerimiaan barang, dan terakhir kemudian dapat melakukan pengecekan terhadap kondisi barang pada gudang. Dokumen yang dibutuhkan untuk proses pengadaan barang impor tersebut diantaranya yaitu Purchase Order, Invoice, Packing List, Bill of Lading, Certificate of Origin, Insurance, dan Laporan Surveyor. Untuk mempermudah dalam proses pada bea cukai dan pelayaran hingga pengeluaran barang dari pelabuhan dapat menggunakan jasa forwarder. Hal ini membuat semakin mudahnya dan sangat membantu dalam proses pengadaan barang dengan cara impor.
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Dong Hua, and Xiao Kong Xiao. "Application of Electronic Bills of Lading in International E-Commerce." Advanced Materials Research 680 (April 2013): 546–49. http://dx.doi.org/10.4028/www.scientific.net/amr.680.546.

Full text
Abstract:
The traditional bill of lading is of great value in the maritime industry. However, as electronic communication takes over in international trade, the electronic bill of lading is now being considered first in some situations. A brief introduction of the bill of lading will be made together with a general comparison between the traditional bill of lading and the electronic bill of lading. Further analysis will concentrate on the issues of how the electronic bill of lading applies in some particular international e-commerce cases and how we can improve the new electronic data interchange system. Finally, this paper aims to demonstrate that it may be advantageous to ultimately switch entirely from the paper bill of lading to an electronic one in a modern e-commerce-driven society.
APA, Harvard, Vancouver, ISO, and other styles
3

Alan Jiju, Shaun Tuscano, and Chetana Badgujar. "OCR Text Extraction." International Journal of Engineering and Management Research 11, no. 2 (2021): 83–86. http://dx.doi.org/10.31033/ijemr.11.2.11.

Full text
Abstract:
This research tries to find out a methodology through which any data from the daily-use printed bills and invoices can be extracted. The data from these bills or invoices can be used extensively later on – such as machine learning or statistical analysis. This research focuses on extraction of final bill-amount, itinerary, date and similar data from bills and invoices as they encapsulate an ample amount of information about the users purchases, likes or dislikes etc. Optical Character Recognition (OCR) technology is a system that provides a full alphanumeric recognition of printed or handwritten characters from images. Initially, OpenCV has been used to detect the bill or invoice from the image and filter out the unnecessary noise from the image. Then intermediate image is passed for further processing using Tesseract OCR engine, which is an optical character recognition engine. Tesseract intends to apply Text Segmentation in order to extract written text in various fonts and languages. Our methodology proves to be highly accurate while tested on a variety of input images of bills and invoices.
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Yong Chang, Tao Xing, and Ping Zhu. "Application of XML Based EDI in Logistics Bills Circulation." Advanced Materials Research 228-229 (April 2011): 909–14. http://dx.doi.org/10.4028/www.scientific.net/amr.228-229.909.

Full text
Abstract:
Applies EDI in the logistics system, can make the constituent parties of supply chain logistics system, through based on standardized information formats and processing methods to share logistics system information, improve circulation efficiency and reduce logistics costs. In view of traditional EDI the problems exist in the bills circulation, use the XML to research. First, through the establishment of logistics EDI model, gives the workflows using the EDI to conduct the logistics business information process. Secondly, discusses the standardization problems which need solve by using the EDI to conduct logistics bills circulation. Then, in the format that XML is based on EDI, established EDI electronic commerce logistics model based XML. Finally, studies the data bills interchange base on XML, including mapping models of XML and relational database, mapping methods and conversion methods. The results show that, XML and EDI combination, allowing the exchange of data in different formats, can increase the information level of logistics and improve the core competitiveness of supply chain system.
APA, Harvard, Vancouver, ISO, and other styles
5

I.J Agabi and J.S Ibrahim. "Energy Evaluation and Processing Cost Reduction in Agudu Maize Processing Industry." International Journal of Engineering and Management Research 11, no. 1 (2021): 142–55. http://dx.doi.org/10.31033/ijemr.11.1.20.

Full text
Abstract:
This study evaluated energy consumption by Agudu Farms Limited (AFL) that processes maize and cassava into flour for human consumption. The objectives of study included to determine energy contribution to processing cost, to minimize the processing cost and to propose a new selling price per unit of sale of the product. The study materials included; a multi-meter, stopwatch, electrical appliances’ nameplates and bills, fuel purchased receipts, and production records. Data was collected through detailed energy audits and measurements of present electricity consumption. This data was converted into energy intensities, rates and costs, and analyzed. The monthly energy intensity plotted on bar charts using Microsoft excel and the results showed that diesel had the highest consumption variation of 3500 kWh/t, electricity 200kWh/t and labor 110 kWh/t. The percentage of energy contribution to processing cost was 33%. In monetary terms, the processing cost per hour of operation showed average value of ₦830. Whereas, the minimum production cost per hour using Tora software showed ₦767. The new product price per ten-kilogram (10kg) unit of sale of maize flour, using break-even analysis, showed ₦2864. The study observed that diesel contributed more to production cost than electricity and labor and therefore, recommended the setting up of an energy monitoring team to monitor procurement and control utilization of diesel to reduce production cost.
APA, Harvard, Vancouver, ISO, and other styles
6

Miao, Xian, and Hong Qing Liu. "Approach of Economical Efficiency of Scale for Raw Materials Inventory: A Case (MRP) in Manufacturing." Applied Mechanics and Materials 401-403 (September 2013): 2337–40. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.2337.

Full text
Abstract:
nformation transformation is important for state-owned manufacturing enterprises to improve the warehousing efficiency. Our work was: that with EDI in Intranet, applying the network database technology, designed the raw materials database and its application system for a large component supplier. Practice shows that this system realizes centralizing and processing for all kinds of contracts, suppliers, wagons, planning, bills for collection and inventory data. Thereby improve validity and timeliness of raw material delivery; reduce inventory management cost.
APA, Harvard, Vancouver, ISO, and other styles
7

Alpern, Stanley B. "What Africans Got for Their Slaves: A Master List of European Trade Goods." History in Africa 22 (January 1995): 5–43. http://dx.doi.org/10.2307/3171906.

Full text
Abstract:
A great deal has been written in recent decades about the Atlantic slave trade, including the mechanics and terms of purchase, but relatively little about what Africans received in return for the slaves and other exports such as gold and ivory. And yet, if one is trying to reconstruct the material culture of, say, the Guinea Coast of West Africa during the slave-trade period, the vast European input cannot be ignored.The written evidence consists of many thousands of surviving bills of lading, cargo manifests, port records, logbooks, invoices, quittances, trading-post inventories, account books, shipping recommendations, and orders from African traders. English customs records of commerce with Africa during the eighteenth century, when the slave trade peaked, alone contain hundreds of thousands of facts. A thorough analysis of all available data would call for the services of a research team equipped with computers, and fill many volumes. Using a portable typewriter (now finally abandoned for WordPerfect) and a card file, and sifting hundreds of published sources, I have over the years compiled an annotated master list of European trade goods sold on a portion of the Guinea Coast from Portuguese times to the mid-nineteenth century. The geographic focus is the shoreline from Liberia to Nigeria; from it more slaves left for the New World than from any comparable stretch of the African coast. I call the area “Kwaland” for the Kwa language family to which nearly all the indigenous peoples belong.
APA, Harvard, Vancouver, ISO, and other styles
8

MILLER, BENJAMIN D., CARRIE E. RIGDON, TRISHA J. ROBINSON, CRAIG HEDBERG, and KIRK E. SMITH. "Use of Global Trade Item Numbers in the Investigation of a Salmonella Newport Outbreak Associated with Blueberries in Minnesota, 2010." Journal of Food Protection 76, no. 5 (2013): 762–69. http://dx.doi.org/10.4315/0362-028x.jfp-12-407.

Full text
Abstract:
In August 2010, the Minnesota Department of Agriculture and Minnesota Department of Health investigated an outbreak of six cases of Salmonella Newport infection occurring in northwestern Minnesota, which identified fresh blueberries as the cause. Initially, traditional traceback methods involving the review of invoices and bills of lading were used to attempt to identify the source of the outbreak. When these methods failed, novel traceback methods were used. Specifically, supplier-specific 12-digit Global Trade Item Numbers (GTINs) and shopper-card information were used to identify a single blueberry grower linked to cases, corroborating the results of a case-control study in which consuming fresh blueberries was statistically associated with illness (5 of 5 cases versus 8 of 19 controls, matched odds ratio [MOR] undefined, P = 0.02). Consuming fresh blueberries from retailer A was also statistically associated with illness (3 of 3 cases versus 3 of 18 controls, MOR undefined, P = 0.03). Based on initially incomplete evidence in this investigation, the invoices pointed to wholesaler A and grower A, based on first-in–first-out product rotation. However, when point-of-sale data were analyzed and linked to shopper-card information, a common GTIN was identified. This information led to an on-site record evaluation at retailer A, and the discovery of additional records at this location documented the supply chain from grower B to wholesaler C to retailer A, shifting the focus of the investigation from grower A to grower B. This investigation demonstrates the emerging concepts of Critical Tracking Events (CTEs) and Key Data Elements (KDE) related to food product tracing. The use of these shopper-cased data and the event data that were queried by investigators demonstrates the potential utility of consciously designed CTEs and KDEs at critical points in the supply chain to better facilitate product tracing.
APA, Harvard, Vancouver, ISO, and other styles
9

Garofalakis, John, Konstantinos Plessas, Athanasios Plessas, and Panoraia Spiliopoulou. "Application of an Ecosystem Methodology Based on Legal Language Processing for the Transformation of Court Decisions and Legal Opinions into Open Data." Information 11, no. 1 (2019): 10. http://dx.doi.org/10.3390/info11010010.

Full text
Abstract:
Regulation of modern societies requires the generation of large sets of heterogeneous legal documents: bills, acts, decrees, administrative decisions, court decisions, legal opinions, circulars, etc. More and more legal publishing bodies publish these documents online, although usually in formats that are not machine-readable and without following Open Data principles. Until an open by default generation and publication process is employed, ex-post transformation of legal documents into Legal Open Data is required. Since manual transformation is a time-consuming and costly process, automated methods need to be applied. While some research efforts toward the automation of the transformation process exist, the alignment of such approaches with proposed Open Data methodologies in order to promote data exploitation is still an open issue. In this paper, we present a methodology aligned to the Open Data ecosystem approach for the automated transformation of Greek court decisions and legal opinions into Legal Open Data that builds on legal language processing methods and tools. We show that this approach produces Legal Open Data of satisfying quality while highly reducing the need for manual intervention.
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Hee Jung, and Ian Fraser. "‘My Sport Won’t Pay the Bills Forever’: High-Performance Athletes’ Need for Financial Literacy and Self-Management." Journal of Risk and Financial Management 14, no. 7 (2021): 324. http://dx.doi.org/10.3390/jrfm14070324.

Full text
Abstract:
This paper investigates high-performance athletes’ development of their financial literacy and self-management skills and the related organisational support available to them during their athletic careers. The data were collected from 20 retired high-performance athletes (10 male and 10 female) representing six different countries (Japan, Mexico, Portugal, Singapore, South Korea, and the UK). Thematic analysis was applied to the processing of the data and five themes emerged: (1) Funding battles: financial challenges and misjudgements; (2) Coping Strategies; (3) Support from sponsors, parents, and sport organisations; (4) Development of Financial Literacy; and (5) Life After Sport. The data indicates that athletes experienced financial challenges due to a lack of organisational support, reduced or terminated funding, and limited opportunities to access sponsorship. Typically, athletes developed their financial literacy and self-management skills by ‘self-help’ or ‘trial and error’. The findings contribute to both literature and practice by providing empirical evidence on the coping strategies adopted by athletes in order to overcome financial challenges and on the methods used in order to develop their financial literacy and self-management skills. These findings inform sport organisations and governing bodies to develop support schemes for high-performance athletes as well as deepen our knowledge of athletes’ career development and transitions focusing on the financial aspect.
APA, Harvard, Vancouver, ISO, and other styles
11

Iurasov, A., L. Ivashko, and O. Maksymov. "DEVELOPMENT OF DECISION-SUPPORT ALGORITHMS FOR COMMODITY MANAGEMENT." Financial and credit activity: problems of theory and practice 1, no. 36 (2021): 260–69. http://dx.doi.org/10.18371/fcaptp.v1i36.227782.

Full text
Abstract:
The purpose of this paper is to improve the commodity management of retail chains by developing theoretical provisions of decision support system of retail chain commodity management (DSS RCM). Trading networks buy goods directly from manufacturers or large wholesalers, place these goods in warehouses, organize their distribution to stores. Commodity managers should decide how to provide all stores of the network in timely manner with the most profitable product every day.
 The objective of the DSS RCM is to maximize the daily trading margin, per each euro invested in commodities taking into account restrictions on commodity resources and shelf space. The DSS RCM have to prepare bills of lading and orders for inbound logistics, distribution and re-distribution of commodities within the network. Decision support uses data available in any retail software. The calculation algorithms are simple and effective to ensure the necessary and sufficient accuracy with the time and hardware limitations and without significant investments in hardware and staff qualifications update. Algorithms calculate the optimal solution based on the objective function (for example, profit maximization) and restrictions (for example, inventory level, store sales, profit from sales of a given product).
 The paper systematized the approaches of other scientists to solve the problem of product management in retail. Author analyze the strengths and weaknesses of those approaches for purpose to find the optimal approach for retail chains.
 So the aim of this study is to develop theoretical basis of decision support system of retail chain commodity management (DSS RCM). The proposed method of optimization of commodity assets in retail based on their mathematical modeling and calculating of the consolidated profitability ratio. Research results are limited to homogeneous product retail chains (e.g., clothing or footwear).
 By using proposed algorithms calculations could be in real-time mode in the database for tens (hundreds) of thousands items in the product range (for example, when selling clothes and shoes, a unique combination of model, color and size forms a separate item in the product range) in hundreds (thousands) of stores. Therefore, it could be hundreds of millions of combinations items-stores (Big Data).
APA, Harvard, Vancouver, ISO, and other styles
12

Hasan, Md Nazmul, Rafia Nishat Toma, Abdullah-Al Nahid, M. M. Manjurul Islam, and Jong-Myon Kim. "Electricity Theft Detection in Smart Grid Systems: A CNN-LSTM Based Approach." Energies 12, no. 17 (2019): 3310. http://dx.doi.org/10.3390/en12173310.

Full text
Abstract:
Among an electricity provider’s non-technical losses, electricity theft has the most severe and dangerous effects. Fraudulent electricity consumption decreases the supply quality, increases generation load, causes legitimate consumers to pay excessive electricity bills, and affects the overall economy. The adaptation of smart grids can significantly reduce this loss through data analysis techniques. The smart grid infrastructure generates a massive amount of data, including the power consumption of individual users. Utilizing this data, machine learning and deep learning techniques can accurately identify electricity theft users. In this paper, an electricity theft detection system is proposed based on a combination of a convolutional neural network (CNN) and a long short-term memory (LSTM) architecture. CNN is a widely used technique that automates feature extraction and the classification process. Since the power consumption signature is time-series data, we were led to build a CNN-based LSTM (CNN-LSTM) model for smart grid data classification. In this work, a novel data pre-processing algorithm was also implemented to compute the missing instances in the dataset, based on the local values relative to the missing data point. Furthermore, in this dataset, the count of electricity theft users was relatively low, which could have made the model inefficient at identifying theft users. This class imbalance scenario was addressed through synthetic data generation. Finally, the results obtained indicate the proposed scheme can classify both the majority class (normal users) and the minority class (electricity theft users) with good accuracy.
APA, Harvard, Vancouver, ISO, and other styles
13

Valisireddy, Jalaja, and Anjaneyulu G.S.G.N. "Adept smart meters using homomorphic encryption based on factor problem over groups." Information and Learning Science 119, no. 12 (2018): 701–11. http://dx.doi.org/10.1108/ils-07-2018-0063.

Full text
Abstract:
Purpose The purpose of this paper is to replace electronic meters with smart meters. Smart meters will provide high resolution real-time end-user power consumption data for utilities to better monitor and control the system, which is used for end users to better manage their energy usage and bills. By using smart meters, we can reduce the errors and also minimize human intervention in processing information in an efficient way. So that time will be reduced for organization functionalities and accuracy will be increase. Design/methodology/approach The authors propose a new cryptosystem based on factor problem over non commutative groups. They tried to use this cryptosystem in the field of electricity. They extend and transform this projected cryptosystem to design expert smart meters based on homomorphic encryption with factor problem. Findings In these smart meters, a monitoring system is integrated that preserves customer’s privacy by homomorphically accumulating the consumption of all n members of a specific domain. Originality/value This expert smart meter system has a proficient linear O(n) communication cost and is proven to protect customer's privacy even in the presence of a corrupted substation and some malicious smart meters.
APA, Harvard, Vancouver, ISO, and other styles
14

Maulidina, Grifito yuan. "Design and Implementation of Android Applications as Mobile Payment Gateway Services in the Sistem Online Payment Point (SOPP) of PDAM Malang Regency." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 1, no. 1 (2015): 26–33. http://dx.doi.org/10.33795/jartel.v1i1.125.

Full text
Abstract:
The development of online payment systems such as the online payment point system has greatly assisted the public in processing monthly transactions such as water bills. However, in its application, this system still uses large devices such as computers and inkjet printers so that the operation takes a long time and is less efficient. Therefore, in this study, a mobile application is designed to replace the role of computers in making water bill payment transactions in the online payment point system (SOPP) of PDAM Malang Regency. The application that is connected to a database server via the internet is also integrated with a compact wireless thermal printer that can be carried anywhere and does not require ink refills so that it can speed up the transaction process and be more efficient in time, paper and space. The research method used was experimental and survey methods. The experimental method is used to test the running of the application, test the application's compatibility with the device and measure the time it takes for the application to exchange data. The survey method is used to test user satisfaction with the application.
APA, Harvard, Vancouver, ISO, and other styles
15

KARTYSHEV, D. V. "IMPLEMENTATION OF UKRAINE'S WORLD EXPERIENCE INSTITUTIONAL SUPPORT FOR CARRIAGE TRANSPORTATION." Economic innovations 20, no. 1(66) (2018): 87–95. http://dx.doi.org/10.31520/ei.2018.20.1(66).87-95.

Full text
Abstract:
Topicality. The functioning of international merchant shipping and the practice of international trade in goods are interrelated at different levels - from historical to the level of a separate treaty. Here, contracts for the purchase and sale of goods, transportation, insurance, financing, transport and warehouse documents of title are intertwined and interact. The necessary degree of awareness in these issues is an indispensable condition for both successful business activity and for solving the problems of unification of maritime and commercial law. Also the urgency of the organizing problems of electronic trade by shipping services of shipping lines and their agents through the internal brands, Intranet and the Internet and ways of their overcoming are considered. Aim and tasks. International cargo transportation is a really confusing business through its customers, partners and employees, which are scattered around the world. Today's information technology has become a focal point for shipowners in order to gain a competitive edge over their rivals by choosing and setting the right partners in their rapidly expanding and timely transmission of information and interactive communication between their partners in the value chain (see Porter's Value Chain). network of value creation. As the international marketing concept develops, companies recognize that the real value creation requires intensive interaction between the internal (employees in a number of departments) and external players and clients as a result of partnership, a flexible value chain. The speediness of the delivery of goods depends on the extent to which all participants in the logistics processes (commercial organizations and state regulatory bodies) were able to make the transition from paper technologies to electronic technologies. The use of paper documents in parallel with the electronic several times increases the time of registration at all stages of the movement of goods. Research results.The central theme in trade facilitation is the reduction of bureaucratic restrictions for the movement of goods across borders. Why ask commercial operators to submit about thirty documents to forty different agencies with often repeated information? To reduce these formalities, collect information necessary for controlling bodies as quickly and easily as possible - this is the essence of trade facilitation. Simplification and reduction of the required procedures, data and documents, their harmonization with international standards, computerization of documents and foreign trade processes will significantly accelerate the movement of goods and information about them across borders. Approximately 40 years ago, US experts calculated that eliminating unnecessary bureaucratic procedures and paper flows would reduce the cost of trade operations by 7% in the US, and this was always a very large amount that the society simply lost because of insufficiently streamlined processes. The Single Window system has already been implemented in many countries, such as Japan, Singapore, Sweden, the United States and Senegal. Conclusion. The proposal was accompanied by information that in existing national laws and international conventions there are significant gaps regarding the functioning of bills of lading and sea waybills, the connection of these transport documents with the rights and obligations of the seller and buyer of goods, the legal status of entities providing financing to one of the parties to the contract of carriage Cargo. In some states there is a regulatory framework for these issues, but it is not uniform. And in many states there is no regulatory framework in this sphere at all. This circumstance is an obstacle to the free movement of goods and increases the value of transactions. The widespread use of electronic means of communication in the transport of goods further exacerbates the consequences of the fragmentation and non-unification of various laws and leads to the need to develop uniform provisions on specific issues related to the use of the applied technologies.
APA, Harvard, Vancouver, ISO, and other styles
16

Kashkoush, M., and H. ElMaraghy. "Product Design Retrieval by Matching Bills of Materials." Journal of Mechanical Design 136, no. 1 (2013). http://dx.doi.org/10.1115/1.4025489.

Full text
Abstract:
A new automatic design retrieval method that identifies the legacy product design most similar to a new one is proposed. Matching phylogenetic trees has been utilized in biological science for decades and is referred to as “tree reconciliation.” A new application of this approach in manufacturing is presented where legacy designs are retrieved based on reconciliation of trees representing products bill of materials (BOM). A product BOM is a structured tree, which represents its components and their hierarchal relationships; hence, it captures the contents and structure of assembled products. Making use of data associated with the retrieved designs also helps speed-up other downstream planning activities such as process planning, hence improving planning efficiency. A chemical processing centrifugal pump is used as a case study for illustration. The results obtained using the proposed method is compared with those recently published on BOM trees matching for further analysis and verification. This novel method is less computationally complex than available state-of-the-art algorithms.
APA, Harvard, Vancouver, ISO, and other styles
17

Valerio, Kate E., Sarah Prieto, Alexander N. Hasselbach, Jena N. Moody, Scott M. Hayes, and Jasmeet P. Hayes. "Machine learning identifies novel markers predicting functional decline in older adults." Brain Communications 3, no. 3 (2021). http://dx.doi.org/10.1093/braincomms/fcab140.

Full text
Abstract:
Abstract The ability to carry out instrumental activities of daily living, such as paying bills, remembering appointments and shopping alone decreases with age, yet there are remarkable individual differences in the rate of decline among older adults. Understanding variables associated with a decline in instrumental activities of daily living is critical to providing appropriate intervention to prolong independence. Prior research suggests that cognitive measures, neuroimaging and fluid-based biomarkers predict functional decline. However, a priori selection of variables can lead to the over-valuation of certain variables and exclusion of others that may be predictive. In this study, we used machine learning techniques to select a wide range of baseline variables that best predicted functional decline in two years in individuals from the Alzheimer’s Disease Neuroimaging Initiative dataset. The sample included 398 individuals characterized as cognitively normal or mild cognitive impairment. Support vector machine classification algorithms were used to identify the most predictive modality from five different data modality types (demographics, structural MRI, fluorodeoxyglucose-PET, neurocognitive and genetic/fluid-based biomarkers). In addition, variable selection identified individual variables across all modalities that best predicted functional decline in a testing sample. Of the five modalities examined, neurocognitive measures demonstrated the best accuracy in predicting functional decline (accuracy = 74.2%; area under the curve = 0.77), followed by fluorodeoxyglucose-PET (accuracy = 70.8%; area under the curve = 0.66). The individual variables with the greatest discriminatory ability for predicting functional decline included partner report of language in the Everyday Cognition questionnaire, the ADAS13, and activity of the left angular gyrus using fluorodeoxyglucose-PET. These three variables collectively explained 32% of the total variance in functional decline. Taken together, the machine learning model identified novel biomarkers that may be involved in the processing, retrieval, and conceptual integration of semantic information and which predict functional decline two years after assessment. These findings may be used to explore the clinical utility of the Everyday Cognition as a non-invasive, cost and time effective tool to predict future functional decline.
APA, Harvard, Vancouver, ISO, and other styles
18

Anaya, Ananya. "Minimalist Design in the Age of Archive Fever." M/C Journal 24, no. 4 (2021). http://dx.doi.org/10.5204/mcj.2794.

Full text
Abstract:
In a listicle on becomingminimalist.com, Joshua Becker argues that advances in personal computing have contributed to the growing popularity of the minimalist lifestyle. Becker explains that computational media can efficiently absorb physical artefacts like books, photo albums, newspapers, clocks, calendars, and more. In Nawapol Thamrongrattanarit’s Happy Old Year (2019, ฮาวทูทิ้ง ทิ้งอย่างไร..ไม่ให้เหลือเธอ) the protagonist Jean also argues that material possessions are wasteful and unnecessary in the era of cloud storage. In the film, she redesigns her old-fashioned and messy childhood home to create a minimalist home office. In decluttering their material possessions through a partial reliance on computational storage, Jean and Becker conveniently dispense with the materiality of informational infrastructures and digital archives. Informational technology’s ever-growing capacity for storage and circulation also intensify anxieties about clutter. During our online interactions, we inadvertently leave an amassing trail of metadata behind that allows algorithms to “personalise” our interfaces. Consequently, our interfaces are “cluttered” with recommendations that range from toothpaste to news, movies, clothes, and more, based on a narrow and homophilic comparison of datasets. Notably, this hypertrophic trail of digital clutter threatens to overrepresent and blur personal identities. By mindfully reducing excessive consumption and discarding wasteful possessions, our personal spaces can become tidy and coherent. On the other hand, there is little that individuals can do to control nonhuman forms of digital accumulation and the datafied archives that meticulously record and store our activities on a micro-temporal scale. In this essay, I explore archive fever as the prosthetic externalisation of memory across physical and digital spaces. Paying close attention to Sianne Ngai’s work on vernacular aesthetic categories and Susanna Paasonen’s exploration of equivocal affective sensations, I study how advocates of minimalist design seek to recuperate our fraught capacities for affective experience in the digital era. In particular, I examine how Thamrongrattanarit problematises minimalist design, prosthetic memory, and the precarious materiality of digital media in Happy Old Year and Mary Is Happy, Mary Is Happy (2013, แมรี่ อีส แฮปปี้, แมรี่ อีส แฮปปี้). Transmedial Minimalist Networks and Empty Spaces Marie Kondo famously teaches us how to segregate objects that spark joy from material possessions that can be discarded (Kondo). The KonMari method has a strong transmedial presence with Kondo’s bestselling books, her blog and online store, a Netflix series, and sticky memes that feature her talking about objects that do not spark joy. It is interesting to note the rising popularity of prescriptive minimalist lifestyle blogs that utilise podcasts, video essays, tutorials, apps, and more to guide the mindful selection of essential material possessions from waste. Personal minimalism is presented as an antidote to late capitalist clutter as self-help gurus appear across our computational devices teach us how we can curb our carbon footprints and reduce consumerist excess. Yet, as noted by Katherine Hayles, maximal networked media demands a form of hyper-attention that implicates us in multiple information streams at once. There is a tension between the overwhelming simultaneity in the viewing experience of transmedial minimalist lifestyle networks and the rhetoric of therapeutic selection espoused in their content. In their ethnographic work with minimalists, Eun Jeong Cheon and Norman Makoto Su explore how mindfully constructed empty spaces can serve as a resource for technological design (Cheon and Su). Cheon and Su note how empty spaces possess a symbolic and functional value for their respondents. Decluttered empty spaces offer a sensuous experience for minimalists in coherently representing their identity and serve as a respite from congested and busy cities. Furthermore, empty spaces transform the home into a meaningful site of reflection about people’s objects and values as minimalists actively work to reduce their ownership of physical artefacts and the space that material possessions occupy in their homes and minds: the notion of gazing upon empty spaces is not simply about reading or processing information for minimalists. Rather, gazing gives minimalists, a visual indicator of their identity, progress, and values. (Cheon and Su 10) Instead of seeking to fill and augment empty space, Cheon and Su ask what it might mean to design technology that appreciates the absence of information and the limitation of space. The Interestingness of “Total Design and Internet Plenitude” Sianne Ngai argues that in a world where we are constantly hailed as aesthetic subjects, our aesthetic experiences grow increasingly fragile and ineffectual (Ngai 2015). Ngai further contends that late capitalism makes the elite exaggeration of the autonomy of art (at auction houses, mega-exhibitions, biennales, and more) concurrently possible with the hyper-aestheticisation of everyday life. The increase in inconsequential aesthetic experiences mirrors a larger habituation to aesthetic novelty along with the loss of the traditional friction between art and the commodity form: in tandem with these seismic changes to longstanding ideas of art’s vocation, weaker aesthetic categories crop up everywhere, testifying in their very proliferation to how, in a world of “total design and Internet plenitude”, aesthetic experience while less rarefied also becomes less intense. (Ngai 21) Ngai offers us the cute, interesting, and zany as the key vernacular categories that describe aesthetic experience in “the hyper-commodified, information-saturated, and performance-driven conditions of late-capitalist culture” (1). Aesthetic experience no longer subscribes to an exceptionally single feeling but is located at the ambiguous mixture of mundane affect. Susanna Paasonen notes how Ngai’s analysis of an everyday aesthetic experience that is complex and equivocal helps explain how seemingly contradictory and irreconcilable affective tensions might in fact be mutually co-dependent with each other (Paasonen). By critiquing the broad and binary generalisations about addiction and networked technologies, Paasonen emphasises the ambivalent and fleeting nature of affective formation in the era of networked media. Significantly, Paasonen explores how ubiquitous networked infrastructures bind us in dynamic sensations of attention and distraction, control and helplessness, and boredom and interest. For Ngai, the interesting is a “low, often hard-to-register flicker of affect accompanying our recognition of minor differences from a norm” (18). There is a discord between knowledge and feeling (and cognition and perception) at the heart of the interesting. We are drawn to the interesting object after noticing something peculiar about it and yet, we are simultaneously at a loss of knowledge about the exact contents of that peculiarity. The "interesting" is embodied in the seriality of constant circulation and a temporal experience of in-betweenness and anticipation in a paradoxical era of routinised novelty. Ngai notes how in the 1960s, many minimalist conceptual artists were preoccupied with tracking the movement of objects and information by transport and communication technologies. In offering a representation of networks of circulation, “merely interesting” conceptual art disseminates information about itself and makes technologies of distribution central to its process of production. The interesting is a pervasive aesthetic judgment that also explains our affectively complex rapport with information in the context of networked technologies. Acclimatised to the repetitive tempos of internet browsing and circular refreshing, Paasonen notes we often oscillate between boredom and interest during our usage of networked media. As Ngai explains, the interesting is “a discursive aesthetic about difference in the form of information and the pathways of its movement and exchange” (1). It is then “interesting” to explore how Thamrongrattanarit tracks the circulation of information and the pathways of transmedial exchange across Twitter and cinema in Mary Is Happy, Mary Is Happy. Digital Memory in MIHMIH Mary Is Happy, Mary Is Happy is adapted from a set of 410 consecutive tweets by Twitter user @marymaloney. The film instantiates the phatic, ephemeral flow of a Twitter feed through its deadpan and episodic narrative. The titular protagonist Mary is a fickle-headed high-school senior trying to design a minimalist yearbook for her school to preserve their important memories. Yet, the sudden entry of an autocratic principal forces her to follow the school administration’s arbitrary demands and curtail her artistic instincts. Ultimately, Mary produces a thick yearbook that is filled with hagiographic information about the anonymous principal. Thamrongrattanarit offers cheeky commentary about Thailand’s authoritarian royalist democracy where the combination of sudden coups and unquestioning obedience has fostered a peculiar environment of political amnesia. Hagiographic and bureaucratic informational overload is presented as an important means to sustain this combination of veneration and paranoia. @marymaloney’s haphazard tweets are superimposed in the film as intertitles and every scene also draws inspiration from the tweet displayed in an offhand manner. We see Mary swiftly do several random and unexplained things like purchase jellyfishes, sleep through a sudden trip to Paris, rob a restaurant, and more in rapid succession. The viewer is overwhelmed because of a synchronised engagement with two different informational currents. We simultaneously read the tweet and watch the scene. The durational tension between knowing and feeling draws our attention to the friction between conceptual interpretation and sensory perception. Like the conceptual artists of the 1960s, Thamrongrattanarit also shows “information in the act of being circulated” (Ngai 157). Throughout the film, we see Mary and her best friend Suri walk along emptied railway tracks that figuratively represent the routes of informational circulation across networked technologies. With its quirky vignettes and episodic narrative progression, MIHMIH closely mirrors Paasonen’s description of microevents and microflow-like movement on social media. The film also features several abrupt and spectacular “microshocks” that interrupt the narrative’s linear flow. For example, there is a running gag about Mary’s cheap and malfunctioning phone frequently exploding in the film while she is on a call. The repetitive explosions provide sudden jolts of deadpan humour. Notably, Mary also mentions how she uses bills of past purchases to document her daily thoughts rather than a notebook to save paper. The tweets are visually represented through the overwhelming accumulation of tiny bills that Mary often struggles to arrange in a coherent pattern. Thamrongrattanarit draws our attention to the fraught materiality of digital memory and microblogging that does not align with neat and orderly narrativisation. By encouraging a constant expression of thoughts within its distinctive character limit, Twitter promotes minimal writing and maximal fragmentation. Paasonen argues that our networked technologies take on a prosthetic function by externalising memory in their databases. This prosthetic reserve of datafied memory is utilised by the algorithmic unconscious of networked media for data mining. Our capacities for simultaneous multichannel attention and distraction are increasingly subsumed by capital’s novel forms of value extraction. Mary’s use of bills to document her diary takes on another “interesting” valence here as Thamrongrattanarit connects the circulation of information on social media with monetary transactions and the accumulation of debt. While memory in common parlance is normally associated with acts of remembrance and commemoration, digital memory refers to an address for storage and retrieval. Wendy Chun argues that software conflates storage with memory as the computer stores files in its memory (Chun). Furthermore, digital memory only endures through ephemeral processes of regeneration and degeneration. Even as our computational devices move towards planned obsolescence, digital memory paradoxically promises perpetual storage. The images of dusty and obsolete computers in MIHMIH recall the materiality of the devices whose databases formerly stored many prosthetic memories. For Wolfgang Ernst, digital archives displace cultural memory from a literary-based narrativised framework to a calculative and mathematical one as digital media environments increasingly control how a culture remembers. As Jussi Parikka notes “we are miniarchivists ourselves in this information society, which could be more aptly called an information management society” (2). While traditional archives required the prudent selection and curation of important objects that will be preserved for future use on a macro temporal scale, the Internet is an agglomerative storage and retrieval database that records information on a micro temporal scale. The proliferation of agglomerative mini archives also create anxieties about clutter where the miniarchivists of the “information-management society” must contend with the effects of our ever-expanding digital trail. It is useful to note how processes of selection and curation that remain central to minimalist decluttering can be connected with the design of a personal archive. Ernst further argues that digital memory cannot be visualised as a place where objects lay in static rest but is better understood as a collection of mini archives in motion that become perceptible because of dynamic signal-based processing. In MIHMIH, memory inscription is associated with the “minimalist” yearbook that Mary was trying to create along with the bills where she documents her tweets/thoughts. At one point, Mary tries to carefully arrange her overflowing bills across her wall in a pattern to make sense of her growing emotional crisis. Yet, she is overwhelmed by the impossibility of this task. Networked media’s storage of prosthetic memory also makes self-representation ambiguous and messy. As a result, Mary’s story does align with cathartic and linear narrativisation but a messy agglomerative database. Happy Old Year: Decluttering to Mend Prosthetic Memories Kylie Cardell argues that the KonMari method connects tidiness to the self-conscious design of a curated personal archive. Marie Kondo associates decluttering with self-representation. "As Kondo is acutely aware, making memories is not simply about recuperating and preserving symbolic objects of the past, but is a future-oriented process that positions subjects in a peculiar way" (Cardell 2). This narrative formation of personal identity involves carefully storing a limited number of physical artefacts that will spark joy for the future self. Yet, we must segregate these affectively charged objects from clutter. Kondo encourages us to make intuitive judgments of conviction by overcoming ambivalent feelings and attachments about the past that are distributed over a wide set of material possessions. Notably, this form of decluttering involves archiving the prosthetic memories that dwell in our (analogue) material possessions. In Happy Old Year, Jean struggles to curate her personal archive as she becomes painfully aware of the memories that reside in her belongings. Interestingly, the film’s Thai title loosely translates as “How to Dump”. Jean has an urgent deadline to declutter her home so that it can be designed into a minimalist home office. Nevertheless, she gradually realises that she cannot coldly “dump” all her things and decides to return some of the borrowed objects to her estranged friends. This form of decluttering helps assuage her guilt about letting go of the past and allows her to (awkwardly and) elegantly honour her prosthetic memories. HOY reverses the clichéd before-after progression of events since we begin with the minimalist home and go back in flashbacks to observe its inundated and messy state. HOY’s after-before narrative along with its peculiar title that substitutes ‘new’ with ‘old’ alludes to the clashing temporalities that Jean is caught up within. She is conflicted between deceptive nostalgic remembrance and her desire to start over with a minimalist-blank slate that is purged of her past regrets. In many remarkable moments, HOY instantiates movement on computational screens to mirror digital media’s dizzying speeds of circulation and storage. Significantly, the film begins with the machinic perspective of a phone screen capturing a set of minimalist designs from a book. Jean refuses to purchase (and store) the whole book since she only requires a few images that can be preserved in her phone’s memory. As noted in the introduction, minimalist organisation can effectively draw on computational storage to declutter physical spaces. In another subplot, Jean is forced to retrieve a photo that she took years ago for a friend. She grudgingly searches through a box of CDs (a cumbersome storage device in the era of clouds) but ultimately finds the image in her ex-boyfriend Aim’s hard disk. As she browses through a folder titled 2013, her hesitant clicks display a montage of happy and intimate moments that the couple shared together. Aim notes how the computer often behaves like a time machine. Unlike Aim, Jean did not carefully organise and store her prosthetic memories and was even willing to discard the box of CDs that were emblematic of defunct and wasteful accumulation. Speaking about how memory is externalised in digital storage, Thamrongrattanarit notes: for me, in the digital era, we just changed the medium, but human relationships stay the same. … It’s just more complicated because we can communicate from a distance, we can store a ton of memories, which couldn’t have ever happened in the past. (emphasis added) When Jean “dumped” Aim to move to Sweden, she blocked him across channels of networked communicational media to avoid any sense of ambient intimacy between them. In digitising our prosthetic memories and maintaining a sense of “connected presence” across social media, micro temporal databases have made it nearly impossible to erase and forget our past actions. Minimalist organisation might help us craft a coherent and stable representation of personal identity through meticulous decluttering. Yet, late-capitalist clutter takes on a different character in our digital archives where the algorithmic unconscious of networked media capitalises on prosthetic storage to make personal identity ambiguous and untidy. It is interesting to note that Jean initially gets in touch with Aim to return his old camera and apologise for their sudden breakup. The camera can record events to “freeze” them in time and space. Later in the film, Jean discovers a happy family photo that makes her reconsider whether she has been too harsh on her father because of how he “dumped” her family. Yet, Jean bitterly finds that her re-evaluation of her material possessions and their dated prosthetic memories is deceptive. In overidentifying with the frozen images and her affectively charged material possessions, she is misled by the overwhelming plenitude of nostalgic remembrance. Ultimately, Jean must “dump” all her things instead of trying to tidy up the jumbled temporal frictions. In the final sequence of HOY, Jean lies to her friend Pink about her relationship with Aim. She states that they are on good terms. Jean then unfriends Aim on Facebook, yet again rupturing any possibility of phatic and ambient intimacy between them. As they sit before her newly emptied house, Pink notes how Jean can do a lot with this expanded space. In a tight close-up, Jean gazes at her empty space with an ambiguous yet pained expression. Her plan to cathartically purge her regrets and fraught memories by recuperating her prosthetic memories failed. With the remnants of her past self expunged as clutter, Jean is left with a set of empty spaces that will eventually resemble the blank slate that we see at the beginning of the film. The new year and blank slate signify a fresh beginning for her future self. However, this reverse transition from a minimalist blank slate to her chaotically inundated childhood home frames a set of deeply equivocal affective sensations. Nonetheless, Jean must mislead Pink to sustain the notion of tidy and narrativised coherence that equivocally masks her fragmented sense of an indefinable loss. Conclusion MIHMIH and HOY explore the unresolvable and conflicting affective tensions that arise in an ecosystem of all-pervasive networked media. Paasonen argues that our ability to control networked technologies concurrently fosters our mundane and prosthetic dependency on them. Both Jean and Mary seek refuge in the simplicity of minimalist design to wrestle control over their overstimulating spaces and to tidy up their personal narratives. It is important to examine contemporary minimalist networks in conjunction with affective formation and aesthetic experience in the era of “total design and internet plenitude”. In an information-management society where prosthetic memories haunt our physical and digital spaces, minimalist decluttering becomes a form of personal archiving that simultaneously empowers unambiguous aesthetic feeling and linear and stable autobiographical representation. The neatness of minimalist decluttering conjugates with an ideal self that can resolve ambivalent affective attachments about the past and have a coherent vision for the future. Yet, we cannot sort the clutter that resides in digital memory’s micro temporal archives and drastically complicates our personal narratives. Significantly, the digital self is not compatible with neat and orderly narrativisation but instead resembles an unstable and agglomerative database. References Cardell, Kylie. “Modern Memory-Making: Marie Kondo, Online Journaling, and the Excavation, Curation, and Control of Personal Digital Data.” a/b: Auto/Biography Studies 32.3 (2017): 499–517. DOI: 10.1080/08989575.2017.1337993. Cheon, Eun Jeong, and Norman Makoto Su. “The Value of Empty Space for Design.” Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018. DOI: 10.1145/3173574.3173623. Ernst, Wolfgang, and Jussi Parikka. Digital Memory and the Archive. U of Minnesota P, 2013. Happy Old Year. Dir. Nawapol Thamrongrattanarit. Happy Ending Film, 2019. Hayles, N. Katherine. “How We Read: Close, Hyper, Machine.” ADE Bulletin (2010): 62-79. DOI: 10.1632/ade.150.62. Kondo, Marie. The Life-Changing Magic of Tidying Up. Ten Speed Press, 2010. Kyong, Chun Wendy Hui. Programmed Visions: Software and Memory. MIT P, 2013. Mankowski, Lukasz. “Interview with Nawapol Thamrongrattanarit: Happy Old Year Is Me in 100% for the First Time.” Asian Movie Pulse, 9 Feb. 2020. <http://asianmoviepulse.com/2020/02/interview-with-nawapol-thamrongrattanarit-2/>. Mary Is Happy, Mary Is Happy. Dir. Nawapol Thamrongrattanarit. Pop Pictures, 2013. Ngai, Sianne. Our Aesthetic Categories: Zany, Cute, Interesting. Harvard UP, 2015. Paasonen, Susanna. Dependent, Distracted, Bored: Affective Formations in Networked Media. MIT P, 2021. Stephens, Paul. The Poetics of Information Overload: From Gertrude Stein to Conceptual Writing. U of Minnesota P, 2015.
APA, Harvard, Vancouver, ISO, and other styles
19

Ibrahim, Yasmin. "Commodifying Terrorism." M/C Journal 10, no. 3 (2007). http://dx.doi.org/10.5204/mcj.2665.

Full text
Abstract:

 
 
 Introduction Figure 1 The counter-Terrorism advertising campaign of London’s Metropolitan Police commodifies some everyday items such as mobile phones, computers, passports and credit cards as having the potential to sustain terrorist activities. The process of ascribing cultural values and symbolic meanings to some everyday technical gadgets objectifies and situates Terrorism into the everyday life. The police, in urging people to look out for ‘the unusual’ in their normal day-to-day lives, juxtapose the everyday with the unusual, where day-to-day consumption, routines and flows of human activity can seemingly house insidious and atavistic elements. This again is reiterated in the Met police press release: Terrorists live within our communities making their plans whilst doing everything they can to blend in, and trying not to raise suspicions about their activities. (MPA Website) The commodification of Terrorism through uncommon and everyday objects situates Terrorism as a phenomenon which occupies a liminal space within the everyday. It resides, breathes and co-exists within the taken-for-granted routines and objects of ‘the everyday’ where it has the potential to explode and disrupt without warning. Since 9/11 and the 7/7 bombings Terrorism has been narrated through the disruption of mobility, whether in mid-air or in the deep recesses of the Underground. The resonant thread of disruption to human mobility evokes a powerful meta-narrative where acts of Terrorism can halt human agency amidst the backdrop of the metropolis, which is often a metaphor for speed and accelerated activities. If globalisation and the interconnected nature of the world are understood through discourses of risk, Terrorism bears the same footprint in urban spaces of modernity, narrating the vulnerability of the human condition in an inter-linked world where ideological struggles and resistance are manifested through inexplicable violence and destruction of lives, where the everyday is suspended to embrace the unexpected. As a consequence ambient fear “saturates the social spaces of everyday life” (Hubbard 2). The commodification of Terrorism through everyday items of consumption inevitably creates an intertextuality with real and media events, which constantly corrode the security of the metropolis. Paddy Scannell alludes to a doubling of place in our mediated world where “public events now occur simultaneously in two different places; the place of the event itself and that in which it is watched and heard. The media then vacillates between the two sites and creates experiences of simultaneity, liveness and immediacy” (qtd. in Moores 22). The doubling of place through media constructs a pervasive environment of risk and fear. Mark Danner (qtd. in Bauman 106) points out that the most powerful weapon of the 9/11 terrorists was that innocuous and “most American of technological creations: the television set” which provided a global platform to constantly replay and remember the dreadful scenes of the day, enabling the terrorist to appear invincible and to narrate fear as ubiquitous and omnipresent. Philip Abrams argues that ‘big events’ (such as 9/11 and 7/7) do make a difference in the social world for such events function as a transformative device between the past and future, forcing society to alter or transform its perspectives. David Altheide points out that since September 11 and the ensuing war on terror, a new discourse of Terrorism has emerged as a way of expressing how the world has changed and defining a state of constant alert through a media logic and format that shapes the nature of discourse itself. Consequently, the intensity and centralisation of surveillance in Western countries increased dramatically, placing the emphasis on expanding the forms of the already existing range of surveillance processes and practices that circumscribe and help shape our social existence (Lyon, Terrorism 2). Normalisation of Surveillance The role of technologies, particularly information and communication technologies (ICTs), and other infrastructures to unevenly distribute access to the goods and services necessary for modern life, while facilitating data collection on and control of the public, are significant characteristics of modernity (Reiman; Graham and Marvin; Monahan). The embedding of technological surveillance into spaces and infrastructures not only augment social control but also redefine data as a form of capital which can be shared between public and private sectors (Gandy, Data Mining; O’Harrow; Monahan). The scale, complexity and limitations of omnipresent and omnipotent surveillance, nevertheless, offer room for both subversion as well as new forms of domination and oppression (Marx). In surveillance studies, Foucault’s analysis is often heavily employed to explain lines of continuity and change between earlier forms of surveillance and data assemblage and contemporary forms in the shape of closed-circuit television (CCTV) and other surveillance modes (Dee). It establishes the need to discern patterns of power and normalisation and the subliminal or obvious cultural codes and categories that emerge through these arrangements (Fopp; Lyon, Electronic; Norris and Armstrong). In their study of CCTV surveillance, Norris and Armstrong (cf. in Dee) point out that when added to the daily minutiae of surveillance, CCTV cameras in public spaces, along with other camera surveillance in work places, capture human beings on a database constantly. The normalisation of surveillance, particularly with reference to CCTV, the popularisation of surveillance through television formats such as ‘Big Brother’ (Dee), and the expansion of online platforms to publish private images, has created a contradictory, complex and contested nature of spatial and power relationships in society. The UK, for example, has the most developed system of both urban and public space cameras in the world and this growth of camera surveillance and, as Lyon (Surveillance) points out, this has been achieved with very little, if any, public debate as to their benefits or otherwise. There may now be as many as 4.2 million CCTV cameras in Britain (cf. Lyon, Surveillance). That is one for every fourteen people and a person can be captured on over 300 cameras every day. An estimated £500m of public money has been invested in CCTV infrastructure over the last decade but, according to a Home Office study, CCTV schemes that have been assessed had little overall effect on crime levels (Wood and Ball). In spatial terms, these statistics reiterate Foucault’s emphasis on the power economy of the unseen gaze. Michel Foucault in analysing the links between power, information and surveillance inspired by Bentham’s idea of the Panopticon, indicated that it is possible to sanction or reward an individual through the act of surveillance without their knowledge (155). It is this unseen and unknown gaze of surveillance that is fundamental to the exercise of power. The design and arrangement of buildings can be engineered so that the “surveillance is permanent in its effects, even if it is discontinuous in its action” (Foucault 201). Lyon (Terrorism), in tracing the trajectory of surveillance studies, points out that much of surveillance literature has focused on understanding it as a centralised bureaucratic relationship between the powerful and the governed. Invisible forms of surveillance have also been viewed as a class weapon in some societies. With the advancements in and proliferation of surveillance technologies as well as convergence with other technologies, Lyon argues that it is no longer feasible to view surveillance as a linear or centralised process. In our contemporary globalised world, there is a need to reconcile the dialectical strands that mediate surveillance as a process. In acknowledging this, Giles Deleuze and Felix Guattari have constructed surveillance as a rhizome that defies linearity to appropriate a more convoluted and malleable form where the coding of bodies and data can be enmeshed to produce intricate power relationships and hierarchies within societies. Latour draws on the notion of assemblage by propounding that data is amalgamated from scattered centres of calculation where these can range from state and commercial institutions to scientific laboratories which scrutinise data to conceive governance and control strategies. Both the Latourian and Deleuzian ideas of surveillance highlight the disparate arrays of people, technologies and organisations that become connected to make “surveillance assemblages” in contrast to the static, unidirectional Panopticon metaphor (Ball, “Organization” 93). In a similar vein, Gandy (Panoptic) infers that it is misleading to assume that surveillance in practice is as complete and totalising as the Panoptic ideal type would have us believe. Co-optation of Millions The Metropolitan Police’s counter-Terrorism strategy seeks to co-opt millions where the corporeal body can complement the landscape of technological surveillance that already co-exists within modernity. In its press release, the role of civilian bodies in ensuring security of the city is stressed; Keeping Londoners safe from Terrorism is not a job solely for governments, security services or police. If we are to make London the safest major city in the world, we must mobilise against Terrorism not only the resources of the state, but also the active support of the millions of people who live and work in the capita. (MPA Website). Surveillance is increasingly simulated through the millions of corporeal entities where seeing in advance is the goal even before technology records and codes these images (William). Bodies understand and code risk and images through the cultural narratives which circulate in society. Compared to CCTV technology images, which require cultural and political interpretations and interventions, bodies as surveillance organisms implicitly code other bodies and activities. The travel bag in the Metropolitan Police poster reinforces the images of the 7/7 bombers and the renewed attempts to bomb the London Underground on the 21st of July. It reiterates the CCTV footage revealing images of the bombers wearing rucksacks. The image of the rucksack both embodies the everyday as well as the potential for evil in everyday objects. It also inevitably reproduces the cultural biases and prejudices where the rucksack is subliminally associated with a specific type of body. The rucksack in these terms is a laden image which symbolically captures the context and culture of risk discourses in society. The co-optation of the population as a surveillance entity also recasts new forms of social responsibility within the democratic polity, where privacy is increasingly mediated by the greater need to monitor, trace and record the activities of one another. Nikolas Rose, in discussing the increasing ‘responsibilisation’ of individuals in modern societies, describes the process in which the individual accepts responsibility for personal actions across a wide range of fields of social and economic activity as in the choice of diet, savings and pension arrangements, health care decisions and choices, home security measures and personal investment choices (qtd. in Dee). While surveillance in individualistic terms is often viewed as a threat to privacy, Rose argues that the state of ‘advanced liberalism’ within modernity and post-modernity requires considerable degrees of self-governance, regulation and surveillance whereby the individual is constructed both as a ‘new citizen’ and a key site of self management. By co-opting and recasting the role of the citizen in the age of Terrorism, the citizen to a degree accepts responsibility for both surveillance and security. In our sociological imagination the body is constructed both as lived as well as a social object. Erving Goffman uses the word ‘umwelt’ to stress that human embodiment is central to the constitution of the social world. Goffman defines ‘umwelt’ as “the region around an individual from which signs of alarm can come” and employs it to capture how people as social actors perceive and manage their settings when interacting in public places (252). Goffman’s ‘umwelt’ can be traced to Immanuel Kant’s idea that it is the a priori categories of space and time that make it possible for a subject to perceive a world (Umiker-Sebeok; qtd. in Ball, “Organization”). Anthony Giddens adapted the term Umwelt to refer to “a phenomenal world with which the individual is routinely ‘in touch’ in respect of potential dangers and alarms which then formed a core of (accomplished) normalcy with which individuals and groups surround themselves” (244). Benjamin Smith, in considering the body as an integral component of the link between our consciousness and our material world, observes that the body is continuously inscribed by culture. These inscriptions, he argues, encompass a wide range of cultural practices and will imply knowledge of a variety of social constructs. The inscribing of the body will produce cultural meanings as well as create forms of subjectivity while locating and situating the body within a cultural matrix (Smith). Drawing on Derrida’s work, Pugliese employs the term ‘Somatechnics’ to conceptualise the body as a culturally intelligible construct and to address the techniques in and through which the body is formed and transformed (qtd. in Osuri). These techniques can encompass signification systems such as race and gender and equally technologies which mediate our sense of reality. These technologies of thinking, seeing, hearing, signifying, visualising and positioning produce the very conditions for the cultural intelligibility of the body (Osuri). The body is then continuously inscribed and interpreted through mediated signifying systems. Similarly, Hayles, while not intending to impose a Cartesian dichotomy between the physical body and its cognitive presence, contends that the use and interactions with technology incorporate the body as a material entity but it also equally inscribes it by marking, recording and tracing its actions in various terrains. According to Gayatri Spivak (qtd. in Ball, “Organization”) new habits and experiences are embedded into the corporeal entity which then mediates its reactions and responses to the social world. This means one’s body is not completely one’s own and the presence of ideological forces or influences then inscribe the body with meanings, codes and cultural values. In our modern condition, the body and data are intimately and intricately bound. Outside the home, it is difficult for the body to avoid entering into relationships that produce electronic personal data (Stalder). According to Felix Stalder our physical bodies are shadowed by a ‘data body’ which follows the physical body of the consuming citizen and sometimes precedes it by constructing the individual through data (12). Before we arrive somewhere, we have already been measured and classified. Thus, upon arrival, the citizen will be treated according to the criteria ‘connected with the profile that represents us’ (Gandy, Panoptic; William). Following September 11, Lyon (Terrorism) reveals that surveillance data from a myriad of sources, such as supermarkets, motels, traffic control points, credit card transactions records and so on, was used to trace the activities of terrorists in the days and hours before their attacks, confirming that the body leaves data traces and trails. Surveillance works by abstracting bodies from places and splitting them into flows to be reassembled as virtual data-doubles, and in the process can replicate hierarchies and centralise power (Lyon, Terrorism). Mike Dee points out that the nature of surveillance taking place in modern societies is complex and far-reaching and in many ways insidious as surveillance needs to be situated within the broadest context of everyday human acts whether it is shopping with loyalty cards or paying utility bills. Physical vulnerability of the body becomes more complex in the time-space distanciated surveillance systems to which the body has become increasingly exposed. As such, each transaction – whether it be a phone call, credit card transaction, or Internet search – leaves a ‘data trail’ linkable to an individual person or place. Haggerty and Ericson, drawing from Deleuze and Guattari’s concept of the assemblage, describe the convergence and spread of data-gathering systems between different social domains and multiple levels (qtd. in Hier). They argue that the target of the generic ‘surveillance assemblage’ is the human body, which is broken into a series of data flows on which surveillance process is based. The thrust of the focus is the data individuals can yield and the categories to which they can contribute. These are then reapplied to the body. In this sense, surveillance is rhizomatic for it is diverse and connected to an underlying, invisible infrastructure which concerns interconnected technologies in multiple contexts (Ball, “Elements”). The co-opted body in the schema of counter-Terrorism enters a power arrangement where it constitutes both the unseen gaze as well as the data that will be implicated and captured in this arrangement. It is capable of producing surveillance data for those in power while creating new data through its transactions and movements in its everyday life. The body is unequivocally constructed through this data and is also entrapped by it in terms of representation and categorisation. The corporeal body is therefore part of the machinery of surveillance while being vulnerable to its discriminatory powers of categorisation and victimisation. As Hannah Arendt (qtd. in Bauman 91) had warned, “we terrestrial creatures bidding for cosmic significance will shortly be unable to comprehend and articulate the things we are capable of doing” Arendt’s caution conveys the complexity, vulnerability as well as the complicity of the human condition in the surveillance society. Equally it exemplifies how the corporeal body can be co-opted as a surveillance entity sustaining a new ‘banality’ (Arendt) in the machinery of surveillance. Social Consequences of Surveillance Lyon (Terrorism) observed that the events of 9/11 and 7/7 in the UK have inevitably become a prism through which aspects of social structure and processes may be viewed. This prism helps to illuminate the already existing vast range of surveillance practices and processes that touch everyday life in so-called information societies. As Lyon (Terrorism) points out surveillance is always ambiguous and can encompass genuine benefits and plausible rationales as well as palpable disadvantages. There are elements of representation to consider in terms of how surveillance technologies can re-present data that are collected at source or gathered from another technological medium, and these representations bring different meanings and enable different interpretations of life and surveillance (Ball, “Elements”). As such surveillance needs to be viewed in a number of ways: practice, knowledge and protection from threat. As data can be manipulated and interpreted according to cultural values and norms it reflects the inevitability of power relations to forge its identity in a surveillance society. In this sense, Ball (“Elements”) concludes surveillance practices capture and create different versions of life as lived by surveilled subjects. She refers to actors within the surveilled domain as ‘intermediaries’, where meaning is inscribed, where technologies re-present information, where power/resistance operates, and where networks are bound together to sometimes distort as well as reiterate patterns of hegemony (“Elements” 93). While surveillance is often connected with technology, it does not however determine nor decide how we code or employ our data. New technologies rarely enter passive environments of total inequality for they become enmeshed in complex pre-existing power and value systems (Marx). With surveillance there is an emphasis on the classificatory powers in our contemporary world “as persons and groups are often risk-profiled in the commercial sphere which rates their social contributions and sorts them into systems” (Lyon, Terrorism 2). Lyon (Terrorism) contends that the surveillance society is one that is organised and structured using surveillance-based techniques recorded by technologies, on behalf of the organisations and governments that structure our society. This information is then sorted, sifted and categorised and used as a basis for decisions which affect our life chances (Wood and Ball). The emergence of pervasive, automated and discriminatory mechanisms for risk profiling and social categorising constitute a significant mechanism for reproducing and reinforcing social, economic and cultural divisions in information societies. Such automated categorisation, Lyon (Terrorism) warns, has consequences for everyone especially in face of the new anti-terror measures enacted after September 11. In tandem with this, Bauman points out that a few suicidal murderers on the loose will be quite enough to recycle thousands of innocents into the “usual suspects”. In no time, a few iniquitous individual choices will be reprocessed into the attributes of a “category”; a category easily recognisable by, for instance, a suspiciously dark skin or a suspiciously bulky rucksack* *the kind of object which CCTV cameras are designed to note and passers-by are told to be vigilant about. And passers-by are keen to oblige. Since the terrorist atrocities on the London Underground, the volume of incidents classified as “racist attacks” rose sharply around the country. (122; emphasis added) Bauman, drawing on Lyon, asserts that the understandable desire for security combined with the pressure to adopt different kind of systems “will create a culture of control that will colonise more areas of life with or without the consent of the citizen” (123). This means that the inhabitants of the urban space whether a citizen, worker or consumer who has no terrorist ambitions whatsoever will discover that their opportunities are more circumscribed by the subject positions or categories which are imposed on them. Bauman cautions that for some these categories may be extremely prejudicial, restricting them from consumer choices because of credit ratings, or more insidiously, relegating them to second-class status because of their colour or ethnic background (124). Joseph Pugliese, in linking visual regimes of racial profiling and the shooting of Jean Charles de Menezes in the aftermath of 7/7 bombings in London, suggests that the discursive relations of power and visuality are inextricably bound. Pugliese argues that racial profiling creates a regime of visuality which fundamentally inscribes our physiology of perceptions with stereotypical images. He applies this analogy to Menzes running down the platform in which the retina transforms him into the “hallucinogenic figure of an Asian Terrorist” (Pugliese 8). With globalisation and the proliferation of ICTs, borders and boundaries are no longer sacrosanct and as such risks are managed by enacting ‘smart borders’ through new technologies, with huge databases behind the scenes processing information about individuals and their journeys through the profiling of body parts with, for example, iris scans (Wood and Ball 31). Such body profiling technologies are used to create watch lists of dangerous passengers or identity groups who might be of greater ‘risk’. The body in a surveillance society can be dissected into parts and profiled and coded through technology. These disparate codings of body parts can be assembled (or selectively omitted) to construct and represent whole bodies in our information society to ascertain risk. The selection and circulation of knowledge will also determine who gets slotted into the various categories that a surveillance society creates. Conclusion When the corporeal body is subsumed into a web of surveillance it often raises questions about the deterministic nature of technology. The question is a long-standing one in our modern consciousness. We are apprehensive about according technology too much power and yet it is implicated in the contemporary power relationships where it is suspended amidst human motive, agency and anxiety. The emergence of surveillance societies, the co-optation of bodies in surveillance schemas, as well as the construction of the body through data in everyday transactions, conveys both the vulnerabilities of the human condition as well as its complicity in maintaining the power arrangements in society. Bauman, in citing Jacques Ellul and Hannah Arendt, points out that we suffer a ‘moral lag’ in so far as technology and society are concerned, for often we ruminate on the consequences of our actions and motives only as afterthoughts without realising at this point of existence that the “actions we take are most commonly prompted by the resources (including technology) at our disposal” (91). References Abrams, Philip. Historical Sociology. Shepton Mallet, UK: Open Books, 1982. Altheide, David. “Consuming Terrorism.” Symbolic Interaction 27.3 (2004): 289-308. Arendt, Hannah. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Faber & Faber, 1963. Bauman, Zygmunt. Liquid Fear. Cambridge, UK: Polity, 2006. Ball, Kristie. “Elements of Surveillance: A New Framework and Future Research Direction.” Information, Communication and Society 5.4 (2002): 573-90 ———. “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12 (2005): 89-108. Dee, Mike. “The New Citizenship of the Risk and Surveillance Society – From a Citizenship of Hope to a Citizenship of Fear?” Paper Presented to the Social Change in the 21st Century Conference, Queensland University of Technology, Queensland, Australia, 22 Nov. 2002. 14 April 2007 http://eprints.qut.edu.au/archive/00005508/02/5508.pdf>. Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus. Minneapolis: U of Minnesota P, 1987. Fopp, Rodney. “Increasing the Potential for Gaze, Surveillance and Normalization: The Transformation of an Australian Policy for People and Homeless.” Surveillance and Society 1.1 (2002): 48-65. Foucault, Michel. Discipline and Punish: The Birth of the Prison. London: Allen Lane, 1977. Giddens, Anthony. Modernity and Self-Identity. Self and Society in the Late Modern Age. Stanford: Stanford UP, 1991. Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview, 1997. ———. “Data Mining and Surveillance in the Post 9/11 Environment.” The Intensification of Surveillance: Crime, Terrorism and War in the Information Age. Eds. Kristie Ball and Frank Webster. Sterling, VA: Pluto Press, 2003. Goffman, Erving. Relations in Public. Harmondsworth: Penguin, 1971. Graham, Stephen, and Simon Marvin. Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition. New York: Routledge, 2001. Hier, Sean. “Probing Surveillance Assemblage: On the Dialectics of Surveillance Practices as Process of Social Control.” Surveillance and Society 1.3 (2003): 399-411. Hayles, Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature and Informatics. Chicago: U of Chicago P, 1999. Hubbard, Phil. “Fear and Loathing at the Multiplex: Everyday Anxiety in the Post-Industrial City.” Capital & Class 80 (2003). Latour, Bruno. Science in Action. Cambridge, Mass: Harvard UP, 1987 Lyon, David. The Electronic Eye – The Rise of Surveillance Society. Oxford: Polity Press, 1994. ———. “Terrorism and Surveillance: Security, Freedom and Justice after September 11 2001.” Privacy Lecture Series, Queens University, 12 Nov 2001. 16 April 2007 http://privacy.openflows.org/lyon_paper.html>. ———. “Surveillance Studies: Understanding Visibility, Mobility and the Phonetic Fix.” Surveillance and Society 1.1 (2002): 1-7. Metropolitan Police Authority (MPA). “Counter Terrorism: The London Debate.” Press Release. 21 June 2006. 18 April 2007 http://www.mpa.gov.uk.access/issues/comeng/Terrorism.htm>. Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol15no1_2006/ pugliese.htm>. Marx, Gary. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59.2 (2003). 18 April 2007 http://web.mit.edu/gtmarx/www/tack.html>. Moores, Shaun. “Doubling of Place.” Mediaspace: Place Scale and Culture in a Media Age. Eds. Nick Couldry and Anna McCarthy. Routledge, London, 2004. Monahan, Teri, ed. Surveillance and Security: Technological Politics and Power in Everyday Life. Routledge: London, 2006. Norris, Clive, and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg, 1999. O’Harrow, Robert. No Place to Hide. New York: Free Press, 2005. Osuri, Goldie. “Media Necropower: Australian Media Reception and the Somatechnics of Mamdouh Habib.” Borderlands 5.1 (2006). 30 May 2007 http://www.borderlandsejournal.adelaide.edu.au/vol5no1_2006 osuri_necropower.htm>. Rose, Nikolas. “Government and Control.” British Journal of Criminology 40 (2000): 321–399. Scannell, Paddy. Radio, Television and Modern Life. Oxford: Blackwell, 1996. Smith, Benjamin. “In What Ways, and for What Reasons, Do We Inscribe Our Bodies?” 15 Nov. 1998. 30 May 2007 http:www.bmezine.com/ritual/981115/Whatways.html>. Stalder, Felix. “Privacy Is Not the Antidote to Surveillance.” Surveillance and Society 1.1 (2002): 120-124. Umiker-Sebeok, Jean. “Power and the Construction of Gendered Spaces.” Indiana University-Bloomington. 14 April 2007 http://www.slis.indiana.edu/faculty/umikerse/papers/power.html>. William, Bogard. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge UP, 1996. Wood, Kristie, and David M. Ball, eds. “A Report on the Surveillance Society.” Surveillance Studies Network, UK, Sep. 2006. 14 April 2007 http://www.ico.gov.uk/upload/documents/library/data_protection/ practical_application/surveillance_society_full_report_2006.pdf>. 
 
 
 
 Citation reference for this article
 
 MLA Style
 Ibrahim, Yasmin. "Commodifying Terrorism: Body, Surveillance and the Everyday." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/05-ibrahim.php>. APA Style
 Ibrahim, Y. (Jun. 2007) "Commodifying Terrorism: Body, Surveillance and the Everyday," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/05-ibrahim.php>. 
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography