To see the other types of publications on this topic, follow the link: Computer security – Zambia – Management Case studies.

Journal articles on the topic 'Computer security – Zambia – Management Case studies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 40 journal articles for your research on the topic 'Computer security – Zambia – Management Case studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.

Full text
Abstract:
A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communication and goal setting in Internet banking security through indepth interviews within three case studies. That said, it promotes an interdisciplinary and inter-organizational theory which fosters a new dialog that transcends security industry specific contexts as opposed to other studies. Interview results suggest how an effective setting of Internet banking security goals can be achieved through specific considerations for improving the communication of security messages. The research contributes to interpretive information systems with the study of risk communication and goal setting in an Internet banking security context.
APA, Harvard, Vancouver, ISO, and other styles
2

O'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (August 1, 2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.

Full text
Abstract:
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical mass and acceptance of a new service; training and technical issues, as well as staff acceptance issues; that privacy and security issues arise through the potential to track the location of people and through the amounts of personal data collected; difficulties in integrating with existing back-end systems; projects being affected by changes to legislation, or requiring changes to the law; and that while there is potential for mobile phone operators to develop new billing methods that become new models for issuing credit, they are not covered by existing credit laws. We have placed the case studies in a Fit-Viability framework and analyzed the issues according to key success criteria. While many organizations are keen to use the technology, they are struggling to find a compelling business case for adoption and that without a strong business case projects are unlikely to progress past the pilot stage.
APA, Harvard, Vancouver, ISO, and other styles
3

Alzamil, Zakarya A. "Information security practice in Saudi Arabia: case study on Saudi organizations." Information & Computer Security 26, no. 5 (November 12, 2018): 568–83. http://dx.doi.org/10.1108/ics-01-2018-0006.

Full text
Abstract:
Purpose Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of its information assets. The purpose of this paper is to investigate the status of the information security policy at a subset of Saudi’s organizations by understanding the perceptions of their information technology’s employees. Design/methodology/approach A descriptive and statistical approach has been used to describe the collected data and characteristics of the IT employees and managers to understand the information security policy at the surveyed organizations. The author believes that understanding the IT employees’ views gives a better understanding of the organization’s status of information security policy. Findings It has been found that most of the surveyed organizations have established information security policy and deployed fair technology; however, many of such policies are not enforced and publicized effectively and efficiently which degraded the deployed technology for such protection. In addition, the clarity and the comprehensibility of such policies are questionable as indicated by most of the IT employees’ responses. A comparison with similar studies at Middle Eastern and European countries has shown similar findings and shares the same concerns. Originality/value The findings of this research suggest that the Saudi Communications and Information Technology Commission should develop a national framework for information security to guide the governmental and non-governmental organizations as well as the information security practitioners on the good information security practices in terms of policy and procedures to help the organizations to avoid any vulnerability that may lead to violations on the security of their information.
APA, Harvard, Vancouver, ISO, and other styles
4

Line, Maria Bartnes, and Eirik Albrechtsen. "Examining the suitability of industrial safety management approaches for information security incident management." Information & Computer Security 24, no. 1 (March 14, 2016): 20–37. http://dx.doi.org/10.1108/ics-01-2015-0003.

Full text
Abstract:
Purpose – This paper aims to discuss whether recent theoretical and practical approaches within industrial safety management might be applicable to, and solve challenges experienced in, the field of information security, specifically related to incident management. Design/methodology/approach – A literature review was carried out. Findings – Principles, research and experiences on the issues of plans, training and learning in the context of industrial safety management would be suitable for adoption into the field of information security incident management and aid in addressing current challenges. Research limitations/implications – There are a number of reasons why approaches from industrial safety management have something to offer to information security incident management: the former field is more mature and has longer traditions, there is more organizational research on industrial safety issues than on information security issues so far, individual awareness is higher for industrial safety risks and worker participation in systematic industrial safety work is ensured by law. More organizational research on information security issues and continuous strengthening of individual security awareness would push information security to further maturity levels where current challenges are solved. Practical implications – This paper shows that the field of information security incident management would gain from closer collaborations with industrial safety management, both in research and in practical loss prevention in organizations. The ideas discussed in this paper form a basis for further research on practical implementations and case studies. Originality/value – The main audience of this paper includes information security researchers and practitioners, as they will find inspirational theories and experiences to bring into their daily work and future projects.
APA, Harvard, Vancouver, ISO, and other styles
5

Formby, William A., and Vergil L. Williams. "Assessing Security Manpower Needs for Industrial Sites." Industrial Management & Data Systems 85, no. 11/12 (November 1, 1985): 3–5. http://dx.doi.org/10.1108/eb057418.

Full text
Abstract:
The cost of providing security is a legitimate operational expense in any company, despite its increases in recent years. In many cases, a good security programme will inevitably pay for itself through the protection of company assets. Two case studies covering companies utilising access control systems demonstrate the means of maintaining an adequate level of security while containing costs. The application of this process, and its impact on particular organisations, will depend on the interpretation of what constitutes a mandatory activity and the amount of unplanned activities by the organisation. Only through a critical analysis of any given situation can these activities, and subsequently the amount of savings, be determined.
APA, Harvard, Vancouver, ISO, and other styles
6

Akinsanya, Opeoluwa Ore, Maria Papadaki, and Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)." Information & Computer Security 28, no. 3 (December 16, 2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.

Full text
Abstract:
Purpose The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature. Design/methodology/approach The intended use of the proposed model was demonstrated using the evaluation method – “construct validity test” as the paper’s aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals’ cyber security internal processes through web-accessible documents, and identified relevant literature. Findings The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation’s capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security. Research limitations/implications Due to the selected research method, the research results may lack generalizability. Therefore, future research studies can investigate the propositions further. Another is that the current thresholds were determined empirically, although it worked for the case study assessment. However, to establish more realistic threshold levels, there is a need for more validation of the model using more case studies. Practical implications The paper includes maturity model for the assessment management and improvement of the security posture of a health-care organisation actively using cloud. For executives, it provides a detailed security assessment of the eHealth cloud to aid in decision making. For security experts, its quantitative metrics support proactive and reactive processes. Originality/value The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.
APA, Harvard, Vancouver, ISO, and other styles
7

Rasouli, Mohammad R., Rik Eshuis, Paul W. P. J. Grefen, Jos J. M. Trienekens, and Rob J. Kusters. "Information Governance in Dynamic Networked Business Process Management." International Journal of Cooperative Information Systems 25, no. 04 (December 2016): 1740004. http://dx.doi.org/10.1142/s0218843017400044.

Full text
Abstract:
Competition in today’s globalized markets forces organizations to collaborate within dynamic business networks to provide mass-customized integrated solutions for customers. The collaboration within dynamic business networks necessitates forming dynamic networked business processes (DNBPs). Networked business processes need to be supported by high quality information that is exchanged in a trustworthy environment. Information governance (IG) is described as a holistic approach to different mechanisms that support high quality and secure information exchanges. However, dynamism of networked business processes causes IG issues like unsecured information access and low quality information products to emerge. In this paper, a comprehensive list of the IG issues in DNBPs is identified through structured steps. The identified IG issues are characterized within four main categories, respectively, information product quality, information service quality, information security, and metadata issues. For the evaluation of the practical significance of the identified IG issues, a case study is conducted in a business network that provides mobility solutions. In this way, the paper closes the gap between studies on IG, which have mostly concentrated on IG within the borders of a single organization or IG in stable business networks, and studies on dynamic business networks, which have addressed the formation of dynamic inter-organizational interactions without paying rigorous attention to information artefacts that are exchanged.
APA, Harvard, Vancouver, ISO, and other styles
8

Pham, Hiep-Cong, Jamal El-Den, and Joan Richardson. "Stress-based security compliance model – an exploratory study." Information & Computer Security 24, no. 4 (October 10, 2016): 326–47. http://dx.doi.org/10.1108/ics-10-2014-0067.

Full text
Abstract:
Purpose This paper aims to extend current information security compliance research by adapting “work-stress model” of the extended Job Demands-Resources model to explore how security compliance demands, organization and personal resources influence end-user security compliance. The paper proposes that security compliance burnout and security engagement as the mediating factors between security compliance demands, organizational and personal resources and individual security compliance. Design/methodology/approach The authors used a multi-case in-depth interview method to explore the relevance and significance of security demands, organizational resources and personal resources on security compliance at work. Seventeen participants in three organizations including a bank, a university and an oil distribution company in Vietnam were interviewed during a four-month period. Findings The study identified three security demands, three security resources and two aspects of personal resources that influence security compliance. The study demonstrates that the security environment factors such as security demands and resources affected compliance burden and security engagement. Personal resources could play an integral role in moderating the impact of security environment on security compliance. Research limitations/implications The findings presented are not generalizable to the wider population of end-users in Vietnam due to the small sample size used in the interviews. Further quantitative studies need to measure the extent of each predictor on security compliance. Originality/value The originality of the research stems from proposing not only stress-based but also motivating factors from the security environment on security compliance. By using qualitative approach, the study provides more insight to understand the impact of the security environments on security compliance.
APA, Harvard, Vancouver, ISO, and other styles
9

Rabii, Anass, Saliha Assoul, Khadija Ouazzani Touhami, and Ounsa Roudies. "Information and cyber security maturity models: a systematic literature review." Information & Computer Security 28, no. 4 (June 6, 2020): 627–44. http://dx.doi.org/10.1108/ics-03-2019-0039.

Full text
Abstract:
Purpose This paper aims to clarify the uncertainty reflected in the current state of information security maturity evaluation where it has not enough matured and converged so that a generic approach or many specfics approaches become the go-to choice. In fact, in the past decade, many secruity maturity models are still being produced and remain unproven regardless of the existence of ISO 21827. Design/methodology/approach The authors have used the systematic literature review to summarize existing research, help identify gaps in the existing literature and provide background for positioning new research studies. Findings The authors highlighted the prevalent influence of the ISO/IEC 27001/27002 standard but raised the necessity for an in-depth investigation of ISO 21827. The authors also made the implementation facet a central topic of our review. The authors found out that, compared to the number of proposed models, implementation experiments are lacking. This could be due to the arduous task of validation and it could also be the reason why specific models are dominant. Originality/value While the research literature contains many experience reports and a few case studies on information security maturity evaluation, a systematic review and synthesis of this growing field of research is unavailable as far as the authors know. In fact, the authors only picked-up one bodywork [Maturity models in cyber security A systematic review (2017)] carrying out a literature review on security maturity models between 2012 and 2017, written in Spanish.
APA, Harvard, Vancouver, ISO, and other styles
10

Anjaria, Kushal, and Arun Mishra. "Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management." Kybernetes 47, no. 1 (January 8, 2018): 58–79. http://dx.doi.org/10.1108/k-06-2017-0226.

Full text
Abstract:
Purpose Situation awareness theory is a primary mean to take decisions and actions in a dynamically changing environment. Nowadays, to implement situation awareness, theories and models in organizational scenarios have become an important research challenge. The purpose of this paper is to investigate the relationship between the situation awareness theory and cybernetics. Further, the aim is to use this relationship to check the feasibility of situation awareness-based information security risk management (ISRM) implementation in the organizational scenario. Design/methodology/approach To investigate the relationship between situation awareness theory and cybernetics, Endsley’s situation awareness theory and Norbert Wiener’s cybernetics concepts and philosophy have been used in the present work. For a detailed study, concepts, techniques and philosophy of the cybernetics have been extracted from the thesis of Norbert Wiener titled “The human use of human beings” and “Cybernetics or control and communication in the animal and the machine”. Findings The present paper demonstrates that relationship can be successfully established between cybernetics and situation awareness theory. Further, this relationship can be used to solve organizational implementation issues related to situation awareness based systems. To demonstrate relationship and solutions of implementation issues, two case studies related to ISRM are also incorporated in the present case study. Originality/value The present work bridges two parallel and prominent theories of situation awareness and cybernetics. It also demonstrates that combination of both the theories can be used to feasibly implement situation awareness based systems in organizations.
APA, Harvard, Vancouver, ISO, and other styles
11

Agate, Vincenzo, Alessandra De Paola, Giuseppe Lo Re, and Marco Morana. "A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems." ACM Transactions on Computer Systems 37, no. 1-4 (June 2021): 1–30. http://dx.doi.org/10.1145/3458510.

Full text
Abstract:
Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.
APA, Harvard, Vancouver, ISO, and other styles
12

Kotenko, Igor, and Elena Doynikova. "Selection of countermeasures against network attacks based on dynamical calculation of security metrics." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (March 8, 2017): 181–204. http://dx.doi.org/10.1177/1548512917690278.

Full text
Abstract:
This paper considers the issue of countermeasure selection for ongoing computer network attacks. We outline several challenges that should be overcome for the efficient response: the uncertainty of an attacker behavior, the complexity of interconnections between the resources of the modern distributed systems, the huge set of security data, time limitations, and balancing between countermeasure costs and attack losses. Although there are many works that are focused on the particular challenges, we suppose that there is still a need for an integrated solution that takes into account all of these issues. We suggest a model-driven approach to the security assessment and countermeasure selection in the computer networks that takes into account characteristics of different objects of assessment. The approach is based on integration with security information and event management systems to consider the dynamics of attack development, taking into account security event processing. Open standards and databases are used to automate security data processing. The suggested technique for countermeasure selection is based on the countermeasure model that was defined on the basis of open standards, the family of interrelated security metrics, and the security analysis technique based on attack graphs and service dependencies. We describe the prototype of the developed system and validate it on several case studies.
APA, Harvard, Vancouver, ISO, and other styles
13

Campanile, Lelio, Marco Gribaudo, Mauro Iacono, Fiammetta Marulli, and Michele Mastroianni. "Computer Network Simulation with ns-3: A Systematic Literature Review." Electronics 9, no. 2 (February 5, 2020): 272. http://dx.doi.org/10.3390/electronics9020272.

Full text
Abstract:
Complexity of current computer networks, including e.g., local networks, large structured networks, wireless sensor networks, datacenter backbones, requires a thorough study to perform analysis and support design. Simulation is a tool of paramount importance to encompass all the different aspects that contribute to design quality and network performance (including as well energy issues, security management overheads, dependability), due to the fact that such complexity produces several interactions at all network layers that is not easily modellable with analytic approaches. In this systematic literature review we aim to analyze, basing our investigation on available literature, the adoption of a popular network simulator, namely ns-3, and its use in the scientific community. More in detail, we are interested in understanding what are the impacted application domains in which authors prefer ns-3 to other similar tools and how extensible it is in practice according to the experience of authors. The results of our analysis, which has been conducted by especially focusing on 128 papers published between 2009 to 2019, reveals that 10% of the evaluated papers were discarded because they represented informal literature; most of the studies presented comparisons among different network simulators, beyond ns-3 and conceptual studies related to performance assessment and validation and routing protocols. Only about 30% of considered studies present extensions of ns-3 in terms of new modules and only about 10% present effective case studies demonstrating the effectiveness of employing network simulator in real application, except conceptual and modeling studies.
APA, Harvard, Vancouver, ISO, and other styles
14

Fu, Chao, Qing Lv, and Reza G. Badrnejad. "Fog computing in health management processing systems." Kybernetes 49, no. 12 (January 4, 2020): 2893–917. http://dx.doi.org/10.1108/k-09-2019-0621.

Full text
Abstract:
Purpose Fog computing (FC) is a new field of research and has emerged as a complement to the cloud, which can mitigate the problems inherent to the cloud computing (CC) and internet of things (IoT) model such as unreliable latency, bandwidth constraints, security and mobility. Because there is no comprehensive study on the FC in health management processing systems techniques, this paper aims at surveying and analyzing the existing techniques systematically as well as offering some suggestions for upcoming works. Design/methodology/approach The paper complies with the methodological requirements of systematic literature reviews (SLR). The present paper investigates the newest systems and studies their practical techniques in detail. The applications of FC in health management systems have been categorized into three major groups, including review articles, data analysis, frameworks and models mechanisms. Findings The results have indicated that despite the popularity of FC as having real-time processing, low latency, dynamic configuration, scalability, low reaction time (less than a second), high bandwidth, battery life and network traffic, a few issues remain unanswered, such as security. The most recent research has focused on improvements in remote monitoring of the patients, such as less latency and rapid response. Also, the results have shown the application of qualitative methodology and case study in the use of FC in health management systems. While FC studies are growing in the clinical field, CC studies are decreasing. Research limitations/implications This study aims to be comprehensive, but there are some limitations. This research has only surveyed the articles that are mined, according to a keyword exploration of FC health, FC health care, FC health big data and FC health management system. Fog-based applications in the health management system may not be published with determined keywords. Moreover, the publications written in non-English languages have been ignored. Some important research studies may be printed in a language other than English. Practical implications The results of this survey will be valuable for academicians, and these can provide visions into future research areas in this domain. This survey helps the hospitals and related industries to identify FC needs. Moreover, the disadvantages and advantages of the above systems have been studied, and their key issues have been emphasized to develop a more effective FC in health management processing mechanisms over IoT in the future. Originality/value Previous literature review studies in the field of SLR have used a simple literature review to find the tasks and challenges in the field. In this study, for the first time, the FC in health management processing systems is applied in a systematic review focused on the mediating role of the IoT and thereby provides a novel contribution. An SLR is conducted to find more specific answers to the proposed research questions. SLR helps to reduce implicit researcher bias. Through the adoption of broad search strategies, predefined search strings and uniform inclusion and exclusion criteria, SLR effectively forces researchers to search for studies beyond their subject areas and networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Yu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (March 14, 2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.

Full text
Abstract:
Purpose – Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy. Design/methodology/approach – The authors develop a model to formalize the password repetitive problem and design efficient algorithms to analyze the repeat patterns. To help security practitioners to analyze patterns, the authors design and implement a lightweight, Web-based visualization tool for interactive exploration of password data. Findings – Through case studies on a real-world leaked password data set, the authors demonstrate how the tool can be used to identify various interesting patterns, e.g. shorter substrings of the same type used to make up longer strings, which are then repeated to make up the final passwords, suggesting that the length requirement of password policy does not necessarily increase security. Originality/value – The contributions of this study are two-fold. First, the authors formalize the problem of password repetitive patterns by considering both short and long substrings and in both directions, which have not yet been considered in past. Efficient algorithms are developed and implemented that can analyze various repeat patterns quickly even in large data set. Second, the authors design and implement four novel visualization views that are particularly useful for exploration of password repeat patterns, i.e. the character frequency charts view, the short repeat heatmap view, the long repeat parallel coordinates view and the repeat word cloud view.
APA, Harvard, Vancouver, ISO, and other styles
16

Coppola, Pierluigi, Luigi dell’Olio, and Fulvio Silvestri. "Random-Parameters Behavioral Models to Investigate Determinants of Perceived Safety in Railway Stations." Journal of Advanced Transportation 2021 (August 24, 2021): 1–11. http://dx.doi.org/10.1155/2021/5530591.

Full text
Abstract:
Recent studies have highlighted the existence of a gap between actual and perceived safety and have shown that feelings of insecurity can affect individuals’ travel behavior before and during the journey. In this paper, a methodology is proposed for assessing determinants of travelers’ perception of safety and security in railway stations. The methodological approach includes focus groups, stated preference (SP) surveys, and the estimation of behavioral models with fixed parameters (Binomial Logit) and random parameters (Mixed Logit). The estimation results for a medium-sized railway station (Frosinone, Italy) confirmed that safety and security measures are not equally perceived by individuals and the use of random-parameters models leads to more robust estimates. The proposed modeling approach allows the identification of the interventions that should be prioritized to increase travelers’ perceived levels of safety, highlighting those factors, such as, for the considered case study, the presence of security personnel and the level of decorum and maintenance, which are perceived by users as more important than others (e.g., surveillance cameras).
APA, Harvard, Vancouver, ISO, and other styles
17

Diamantopoulou, Vasiliki, and Haralambos Mouratidis. "Practical evaluation of a reference architecture for the management of privacy level agreements." Information & Computer Security 27, no. 5 (November 11, 2019): 711–30. http://dx.doi.org/10.1108/ics-04-2019-0052.

Full text
Abstract:
Purpose The enforcement of the General Data Protection Regulation imposes specific privacy- and -security related requirements that any organisation that processes European Union citizens’ personal data must comply with. The application of privacy- and security-by-design principles are assisting organisation in achieving compliance with the Regulation. The purpose of this study is to assist data controllers in their effort to achieve compliance with the new Regulation, by proposing the adoption of the privacy level agreement (PLA). A PLA is considered as a formal way for the data controllers and the data subjects to mutually agree the privacy settings of a service provisioned. A PLA supports privacy management, by analysing privacy threats, vulnerabilities and information systems’ trust relationships. Design/methodology/approach However, the concept of PLA has only been proposed on a theoretical level. To this aim, two different domains have been selected acting as real-life case studies, the public administration and the health care, where special categories of personal data are processed. Findings The results of the evaluation of the adoption of the PLA by the data controllers are positive. Furthermore, they indicate that the adoption of such an agreement facilitates data controllers in demonstrating transparency of their processes. Regarding data subjects, the evaluation process revealed that the use of the PLA increases trust levels on data controllers. Originality/value This paper proposes a novel reference architecture to enable PLA management in practice and reports on the application and evaluation of PLA management.
APA, Harvard, Vancouver, ISO, and other styles
18

A. Rabaa'i, Ahmad, and Xiaodi Zhu. "Understanding the Determinants of Wearable Payment Adoption: An Empirical Study." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 173–211. http://dx.doi.org/10.28945/4746.

Full text
Abstract:
Aim/Purpose: The aim of this study is to determine the variables which affect the intention to use Near Field Communication (NFC)-enabled smart wearables (e.g., smartwatches, rings, wristbands) payments. Background: Despite the enormous potential of wearable payments, studies investigating the adoption of this technology are scarce. Methodology: This study extends the Technology Acceptance Model (TAM) with four additional variables (Perceived Security, Trust, Perceived Cost, and Attractiveness of Alternatives) to investigate behavioral intentions to adopt wearable payments. The moderating role of gender was also examined. Data collected from 311 Kuwaiti respondents were analyzed using Structural Equation Modeling (SEM) and multi-group analysis (MGA). Contribution: The research model provided in this study may be useful for academics and scholars conducting further research into m-payments adoption, specifically in the case of wearable payments where studies are scarce and still in the nascent stage; hence, addressing the gap in existing literature. Further, this study is the first to have specifically investigated wearable payments in the State of Kuwait; therefore, enriching Kuwaiti context literature. Findings: This study empirically demonstrated that behavioral intention to adopt wearable payments is mainly predicted by attractiveness of alternatives, perceived usefulness, perceived ease of use, perceived security and trust, while the role of perceived cost was found to be insignificant. Recommendations for Practitioners: This study draws attention to the importance of cognitive factors, such as perceived usefulness and ease of use, in inducing users’ behavioral intention to adopt wearable payments. As such, in the case of perceived usefulness, smart wearable devices manufacturers and banks enhance the functionalities and features of these devices, expand on the financial services provided through them, and maintain the availability, performance, effectiveness, and efficiency of these tools. In relation to ease of use, smart wearable devices should be designed with an easy to use, high quality and customizable user interface. The findings of this study demonstrated the influence of trust and perceived security in motivating users to adopt wearable payments, Hence, banks are advised to focus on a relationship based on trust, especially during the early stages of acceptance and adoption of wearable payments. Recommendation for Researchers: The current study validated the role of attractiveness of alternatives, which was never examined in the context of wearable payments. This, in turn, provides a new dimension about a determinant factor considered by customers in predicting their behavioral intention to adopt wearable payments. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other m-payments methods, such as m-wallets and P2P payments. Future Research: Future studies should investigate the proposed model in a cross-country and cross-cultural perspective with additional economic, environmental, and technological factors. Also, future research may conduct a longitudinal study to explain how temporal changes and usage experience affect users’ behavioral intentions to adopt wearable payments. Finally, while this study included both influencing factors and inhibiting factors, other factors such as social influence, perceived compatibility, personal innovativeness, mobility, and customization could be considered in future research.
APA, Harvard, Vancouver, ISO, and other styles
19

Stewart, Harrison, and Jan Jürjens. "Data security and consumer trust in FinTech innovation in Germany." Information & Computer Security 26, no. 1 (March 12, 2018): 109–28. http://dx.doi.org/10.1108/ics-06-2017-0039.

Full text
Abstract:
Purpose The purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement of mobile devices and their usage have increased the uptake of financial technology (FinTech) innovation. Financial sectors and startups see FinTech as a gateway to increase business opportunities, but mobile applications and other technology platforms must be launched to explore such opportunities. Mobile application security threats have increased tremendously and have become a challenge for both users and FinTech innovators. In this paper, the authors empirically inspect the components that influence the expectations of both users and organizations to adopt FinTech, such as customer trust, data security, value added, user interface design and FinTech promotion. The empirical results definitely confirm that data security, customer trust and the user design interface affect the adoption of FinTech. Existing studies have used the Technology Acceptance Model (TAM) to address this issue. The outcomes of this study can be used to improve the performance of FinTech strategies and enable banks to achieve economies of scale for global intensity. Design/methodology/approach In this paper, the authors empirically consider factors that influence the expectations of both users and organizations in adopting FinTech, such as customer trust, data security, value added, the user design interface and FinTech promotion. The results confirm that customer trust, data security and the user design interface affect the adoption of FinTech. This research proposes a model called “Intention to adopt FinTech in Germany,” constructs of which were developed based on the TAM and five additional components, as identified. The outcomes of this study can be used to improve the performance of FinTech strategies and enable banks to achieve economies of scale for global intensity. Findings The authors demonstrated that the number of mobile users in Germany is rapidly increasing; yet the adoption of FinTech is extremely sluggish. It is intriguing to reckon that 99 per cent of respondents had mobile devices, but only 10 per cent recognized FinTech. Further, it is significantly discouraging to perceive that only 10 of the 209 respondents had ever used FinTech services, representing under 1 per cent of the surveyed respondents. It is obvious that the FinTech incubators and banks offering FinTech services need to persuade their customers regarding the usefulness and value added advantages of FinTech. This study has been carried out to determine the key factors that influence and provoke FinTech adoption. Research limitations/implications There are a few limitations in this study. Initially, this study focuses on FinTech implementation in Germany and not the whole of Europe. In addition, demographic and regional factors could be consolidated to inspect their particular impact on the intention to use FinTech services, particularly among younger users with a high interest in technology. Without these constraints, the authors could have gathered additional data for a more robust result and obtained new knowledge to further upgrade polices to enhance the FinTech adoption process. Future analysts can assist exploration of this topic by altering determinants in the unified theory of acceptance and use of technology model. Additionally, because the cluster sampling technique was used, the reported outcomes are not 100 per cent generalized to the German population. To accomplish a complete generalization, a basic random sampling strategy for the whole population is essential. The authors could also alleviate some limitations by examining how online vendors are performing with regard to FinTech to satisfy the needs of customers via case studies. Practical implications This study was conducted in Germany and might have produced different results if held in other countries, as technology acceptance is different in a different environment. For instance, the authors suspect that the results would be somewhat different, were the research to be conducted in the United Kingdom, where take-up of FinTech appears to be far greater than in Germany. Therefore, the authors’ results are only generalized for the country of Germany and not other geographical areas. Furthermore, respondents may have been influenced by past experiences about FinTech usage which might have led them to neglect to answer some questions. In spite of this, this study did not consider the influence of moderating variables such as age, education and FinTech services experience. The authors also neglected social impact and control factors, as their corresponding items disregarded the instrument dependability. Accordingly, the authors could not quantify social impact and control factors on FinTech use. Social implications The outcomes of this study can be used to improve the performance of FinTech strategies and enable banks to accomplish economies of scale for global intensity. The authors do hope that this paper will serve to encourage FinTech innovators in their approach to FinTech and enable FinTech researchers to use past work with more prominent certainty, resulting in rigid hypothesis improvement in the future. Originality/value A considerable amount of revenue has been invested in the information technology (IT) infrastructure of banks to enhance their performance, but investment in IT remains a substantial risk regarding the return on investment (Carlson, 2015). Most banks and financial organizations around the globe are engaging in an extreme pressure from their customers and competitors to enhance IT.
APA, Harvard, Vancouver, ISO, and other styles
20

Romuald Iwańkowicz, Remigiusz, and Wlodzimierz Rosochacki. "Clustering risk assessment method for shipbuilding industry." Industrial Management & Data Systems 114, no. 9 (October 7, 2014): 1499–518. http://dx.doi.org/10.1108/imds-06-2014-0193.

Full text
Abstract:
Purpose – The purpose of this paper is to develop a risk assessment method for production processes of large-size steel ship hulls. Design/methodology/approach – This study uses a quantitative-probabilistic approach with involvement of clustering technique in order to analyse the database of accidents and predict the process risk. The case-based reasoning is used in here. A set of technological hazard classes as a basis for analysing the similarities between the production processes is proposed. The method has been explained using a case study on large-size shipyard. Findings – Statistical and clustering approach ensures effective risk managing in shipbuilding process designing. Results show that by selection of adequate number of clusters in the database, the quality of predictions can be controlled. Research limitations/implications – The suggested k-means method using the Euclidean distance measure is initial approach. Testing the other distance measures and consideration of fuzzy clustering method is desirable in the future. The analysis in the case study is simplified. The use of the method according to prediction of risk related to loss of health or life among people exposed to the hazards is presented. Practical implications – The risk index allows to compare the processes in terms of security, as well as provide significant information at the technology design stage of production task. Originality/value – There are no studies on quantitative methods developed specifically for managing risks in shipbuilding processes. Proposed list of technological hazard classes allows to utilize database of past processes accidents in risk prediction. The clustering method of analysing the database is agile thanks to the number of clusters parameter. The case study basing on actual data from the real shipyard constitutes additional value of the paper.
APA, Harvard, Vancouver, ISO, and other styles
21

Mathrani, Sanjay, and Xusheng Lai. "Big Data Analytic Framework for Organizational Leverage." Applied Sciences 11, no. 5 (March 6, 2021): 2340. http://dx.doi.org/10.3390/app11052340.

Full text
Abstract:
Web data have grown exponentially to reach zettabyte scales. Mountains of data come from several online applications, such as e-commerce, social media, web and sensor-based devices, business web sites, and other information types posted by users. Big data analytics (BDA) can help to derive new insights from this huge and fast-growing data source. The core advantage of BDA technology is in its ability to mine these data and provide information on underlying trends. BDA, however, faces innate difficulty in optimizing the process and capabilities that require merging of diverse data assets to generate viable information. This paper explores the BDA process and capabilities in leveraging data via three case studies who are prime users of BDA tools. Findings emphasize four key components of the BDA process framework: system coordination, data sourcing, big data application service, and end users. Further building blocks are data security, privacy, and management that represent services for providing functionality to the four components of the BDA process across information and technology value chains.
APA, Harvard, Vancouver, ISO, and other styles
22

Kassen, Maxat. "Politicization of e-voting rejection: reflections from Kazakhstan." Transforming Government: People, Process and Policy 14, no. 2 (May 4, 2020): 305–30. http://dx.doi.org/10.1108/tg-11-2019-0106.

Full text
Abstract:
Purpose Despite certain political, organizational, technological and socioeconomic benefits that e-voting brings, governments around the world are beginning one by one to denounce its further use in the electoral process. In this regard, the paper aims to analyze reasons that led to the discontinuation of e-voting, resorting to the case of Kazakhstan, a transitional post-soviet country, which actively used the technology in 2004-2011, as a poster child of the global trend, elaborating on key political, socioeconomic, organizational and technological risks that could be associated with the possible return of this innovation in future elections. Design/methodology/approach The research is based on the combination of context and policy analysis, as well as focus groups studies and semi-structured interviews. The context analysis was aimed to understand various political and socioeconomic benefits in adopting e-voting in Kazakhstan. The policy analysis was useful in identifying implementation strategies of the government in promoting e-voting. The focus groups were helpful in understanding the perspectives of various audiences on e-voting. The semi-structured interviews were carried among independent developers in regard to the potential software products that could be used to propose new solutions in the area, including by experimenting with various blockchain platforms. Findings Analyzing the lessons from Kazakhstan, one can conclude that e-voting was introduced and used for several years by authorities in this country for certain economic and organizational benefits, but later they had to reject it and return to traditional paper ballot due to lack of confidence from the non-governmental sector in the capacity of public sector to ensure the integrity of e-voting procedures. As a result, building trust and applying innovative approaches should be a priority for policymakers in the area, if they wish to return to this technology, especially in adopting new presumably more reliable solutions based on blockchain technologies. Research limitations/implications The primary data that was collected by the author from field studies were indexed, refined and presented in a special matrix in a separate section, which were interpreted in the discussion session. These data could be used by other scholars for further interpretation and analysis in their own studies, setting new research agendas and testing hypotheses. This is a single case study research, which is focused on the analysis of reasons that led to the denunciation of e-voting in Kazakhstan, which results could be extrapolated mostly to similar transitional post-totalitarian settings. Practical implications The study can be used to inform ways of how to improve the current e-voting platforms, especially in ensuring better security and transparency of the systems, which could be useful for developers who work on blockchain-driven solutions. Social implications The results of the case study research and expert opinions expressed by various software developers in the e-government areas, which were presented in the paper, could be used by both an academic community and practitioners in understanding better a wide range of political, organizational, economic, social and technological drivers, risks and new opportunities in promoting e-voting technology as a trust generating social phenomenon. Originality/value The paper proposes the first case study of reasons that led to the discontinuation of e-voting in the context of such a typical transitional, post-totalitarian and post-soviet society as Kazakhstan, providing new insights into a wide range of political, regulatory, socioeconomic, organizational and technological aspects of related policy decision-making and implementation strategies adopted by public institutions in this country.
APA, Harvard, Vancouver, ISO, and other styles
23

Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.

Full text
Abstract:
Purpose The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity. Design/methodology/approach The methodology employed is multiple case studies approach with in-depth interviews with five multinational enterprises (MNEs)/multinational corporations (MNCs). Findings The findings reveal that information leakage can be approached with human governance mechanism such as organizational ethical climate and information security culture. Besides, higher frequency of leakages negatively affects information sharing integrity. Moreover, this paper also contributes to a research framework which could be a guide to overcome information leakage issue in information sharing. Research limitations/implications The current study involved MNCs/MNEs operating in Malaysia, while companies in other countries may have different ethical climate and information sharing culture. Thus, for future research, it will be good to replicate the study in a larger geographic region to verify the findings and insights of this research. Practical implications This research contributes to the industry and business that are striving toward solving the mounting problem of information leakage by raising awareness of human factors and to take appropriate mitigating governance strategies to pre-empt information leakage. This paper also contributes to a novel theoretical model that characterizes the iniquities of humans in sharing information, and suggests measures which could be a guide to avert disruptive leakages. Originality/value This paper is likely an unprecedented research in molding human governance in the domain of information sharing and its Achilles’ heel which is information leakage.
APA, Harvard, Vancouver, ISO, and other styles
24

Dorin, Alan. "Simulating Bee Pollination for Horticultural Applications." Proceedings 36, no. 1 (April 7, 2020): 178. http://dx.doi.org/10.3390/proceedings2019036178.

Full text
Abstract:
We depend on wild and managed bees for the pollination of a third of fruits, vegetables and nuts for human consumption. Consequently, the details of the interactions between bees and flowers are of utmost concern to growers and seed producers. However, due to the increasing variability of our climate, the loss of bees’ natural habitat, the use of pesticides and the industrialisation of agriculture, the interactions between bees and our flowering crops are changing in complex ways. Traditional field trials are one approach helping to establish how these changes are impacting on food production, but these techniques are time-consuming, season-limited, and susceptible themselves to the same rapid and dynamic disruptions the ecosystems are subject to. Instead, we propose an iterative experimental approach, in which detailed computer simulations that predict how best to run field trials, are repeatedly informed by field observations and field trial outcomes. The simulations account for bee species’ unique perceptual, behavioural, physiological and morphological characteristics, and realistically model the bees’ foraging environments, including open fields, protected crops, and natural ecosystems. We explain how our simulations work, and provide case studies detailing the results of experiments with planting layout to boost pollination. These models lead to improved plant/pollinator interaction management. They have the potential to boost yield, quality, and shelf-life for a variety of crops, to raise food security generally, and to improve the sustainability of our farm and natural ecosystem management practices.
APA, Harvard, Vancouver, ISO, and other styles
25

Aslam, Usman, Muhammad Arfeen, Wahbeeah Mohti, and Ubaid ur Rahman. "Organizational cynicism and its impact on privatization (evidence from federal government agency of Pakistan)." Transforming Government: People, Process and Policy 9, no. 4 (October 19, 2015): 401–25. http://dx.doi.org/10.1108/tg-11-2014-0054.

Full text
Abstract:
Purpose – The aim of this study is to explore the impact of cynicism on the relationship among personality traits, organizational contextual factors and job outcomes. This study set up and examined the overarching model on resistance to change. Moreover, there were two models theoretically presented and investigated, i.e. direct and indirect models. This study was an attempt to explore and capture the causes of organizational cynicism against the change initiative. Design/methodology/approach – A case study research design was used in this study, and data were collected from 335 employees by using purposive sampling technique and structured questionnaire. While linear regression and Baron and Kenny’s (1986) tests were used to evaluate the direct and indirect models. Findings – Results highlighted the considerable positive relationship between dispositional resistance and employee’s turnover intention. Additionally, significant connection was also examined among organizational contextual factors and job outcomes, whereas interactive impact of behavioral resistance was found in the relation among dispositional resistance, organizational contextual factors and employee’s intent to quit. However, another dimension of organizational cynicism, i.e. cognitive resistance, could not influence the direct linear relationship between organizational context and continuance commitment. Research limitations/implications – Major limitations of this research were non-probability sampling technique, cross-sectional design, single organization and traditional data collection tool. Practical implications – Management can eradicate cynicism by providing social support and positive information, i.e. job security, wage award, medical benefits and promotion criteria, after implementing change. The management can clarify the objectives of that change by including employees in decision-making, reducing employee’s turnover intention. Organizational cynicism is a faith, which means that the change leaders have lack of integrity; when organizational cynicism mixes with negative cognitive process, it leads to a more destructive behavior against that change. Originality/value – This study contributed to the extensive knowledge of organizational cynicism. A conceptual model of resistance to change the model was unique in nature. There were rare studies conducted to check the impact of organizational cynicism on privatization, especially in the sub-continent. Therefore, it will add a good contribution in quality literature to understand the cynicism and its consequences for privatization.
APA, Harvard, Vancouver, ISO, and other styles
26

Kariuki, Paul, Lizzy O Ofusori, Prabhakar Rontala Subramanniam, Moses Okpeku, and Maria L Goyayi. "Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 101–24. http://dx.doi.org/10.28945/4736.

Full text
Abstract:
Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving.
APA, Harvard, Vancouver, ISO, and other styles
27

Yakubu, Bashir Ishaku, Shua’ib Musa Hassan, and Sallau Osisiemo Asiribo. "AN ASSESSMENT OF SPATIAL VARIATION OF LAND SURFACE CHARACTERISTICS OF MINNA, NIGER STATE NIGERIA FOR SUSTAINABLE URBANIZATION USING GEOSPATIAL TECHNIQUES." Geosfera Indonesia 3, no. 2 (August 28, 2018): 27. http://dx.doi.org/10.19184/geosi.v3i2.7934.

Full text
Abstract:
Rapid urbanization rates impact significantly on the nature of Land Cover patterns of the environment, which has been evident in the depletion of vegetal reserves and in general modifying the human climatic systems (Henderson, et al., 2017; Kumar, Masago, Mishra, & Fukushi, 2018; Luo and Lau, 2017). This study explores remote sensing classification technique and other auxiliary data to determine LULCC for a period of 50 years (1967-2016). The LULCC types identified were quantitatively evaluated using the change detection approach from results of maximum likelihood classification algorithm in GIS. Accuracy assessment results were evaluated and found to be between 56 to 98 percent of the LULC classification. The change detection analysis revealed change in the LULC types in Minna from 1976 to 2016. Built-up area increases from 74.82ha in 1976 to 116.58ha in 2016. Farmlands increased from 2.23 ha to 46.45ha and bared surface increases from 120.00ha to 161.31ha between 1976 to 2016 resulting to decline in vegetation, water body, and wetlands. The Decade of rapid urbanization was found to coincide with the period of increased Public Private Partnership Agreement (PPPA). Increase in farmlands was due to the adoption of urban agriculture which has influence on food security and the environmental sustainability. The observed increase in built up areas, farmlands and bare surfaces has substantially led to reduction in vegetation and water bodies. The oscillatory nature of water bodies LULCC which was not particularly consistent with the rates of urbanization also suggests that beyond the urbanization process, other factors may influence the LULCC of water bodies in urban settlements. Keywords: Minna, Niger State, Remote Sensing, Land Surface Characteristics References Akinrinmade, A., Ibrahim, K., & Abdurrahman, A. (2012). Geological Investigation of Tagwai Dams using Remote Sensing Technique, Minna Niger State, Nigeria. Journal of Environment, 1(01), pp. 26-32. Amadi, A., & Olasehinde, P. (2010). Application of remote sensing techniques in hydrogeological mapping of parts of Bosso Area, Minna, North-Central Nigeria. International Journal of Physical Sciences, 5(9), pp. 1465-1474. Aplin, P., & Smith, G. (2008). Advances in object-based image classification. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 37(B7), pp. 725-728. Ayele, G. T., Tebeje, A. K., Demissie, S. S., Belete, M. A., Jemberrie, M. A., Teshome, W. M., . . . Teshale, E. Z. (2018). Time Series Land Cover Mapping and Change Detection Analysis Using Geographic Information System and Remote Sensing, Northern Ethiopia. Air, Soil and Water Research, 11, p 1178622117751603. Azevedo, J. A., Chapman, L., & Muller, C. L. (2016). Quantifying the daytime and night-time urban heat island in Birmingham, UK: a comparison of satellite derived land surface temperature and high resolution air temperature observations. Remote Sensing, 8(2), p 153. Blaschke, T., Hay, G. J., Kelly, M., Lang, S., Hofmann, P., Addink, E., . . . van Coillie, F. (2014). Geographic object-based image analysis–towards a new paradigm. ISPRS Journal of Photogrammetry and Remote Sensing, 87, pp. 180-191. Bukata, R. P., Jerome, J. H., Kondratyev, A. S., & Pozdnyakov, D. V. (2018). Optical properties and remote sensing of inland and coastal waters: CRC press. Camps-Valls, G., Tuia, D., Bruzzone, L., & Benediktsson, J. A. (2014). Advances in hyperspectral image classification: Earth monitoring with statistical learning methods. IEEE signal processing magazine, 31(1), pp. 45-54. Chen, J., Chen, J., Liao, A., Cao, X., Chen, L., Chen, X., . . . Lu, M. (2015). Global land cover mapping at 30 m resolution: A POK-based operational approach. ISPRS Journal of Photogrammetry and Remote Sensing, 103, pp. 7-27. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile networks and applications, 19(2), pp. 171-209. Cheng, G., Han, J., Guo, L., Liu, Z., Bu, S., & Ren, J. (2015). Effective and efficient midlevel visual elements-oriented land-use classification using VHR remote sensing images. IEEE transactions on geoscience and remote sensing, 53(8), pp. 4238-4249. Cheng, G., Han, J., Zhou, P., & Guo, L. (2014). Multi-class geospatial object detection and geographic image classification based on collection of part detectors. ISPRS Journal of Photogrammetry and Remote Sensing, 98, pp. 119-132. Coale, A. J., & Hoover, E. M. (2015). Population growth and economic development: Princeton University Press. Congalton, R. G., & Green, K. (2008). Assessing the accuracy of remotely sensed data: principles and practices: CRC press. Corner, R. J., Dewan, A. M., & Chakma, S. (2014). Monitoring and prediction of land-use and land-cover (LULC) change Dhaka megacity (pp. 75-97): Springer. Coutts, A. M., Harris, R. J., Phan, T., Livesley, S. J., Williams, N. S., & Tapper, N. J. (2016). Thermal infrared remote sensing of urban heat: Hotspots, vegetation, and an assessment of techniques for use in urban planning. Remote Sensing of Environment, 186, pp. 637-651. Debnath, A., Debnath, J., Ahmed, I., & Pan, N. D. (2017). Change detection in Land use/cover of a hilly area by Remote Sensing and GIS technique: A study on Tropical forest hill range, Baramura, Tripura, Northeast India. International journal of geomatics and geosciences, 7(3), pp. 293-309. Desheng, L., & Xia, F. (2010). Assessing object-based classification: advantages and limitations. Remote Sensing Letters, 1(4), pp. 187-194. Dewan, A. M., & Yamaguchi, Y. (2009). Land use and land cover change in Greater Dhaka, Bangladesh: Using remote sensing to promote sustainable urbanization. Applied Geography, 29(3), pp. 390-401. Dronova, I., Gong, P., Wang, L., & Zhong, L. (2015). Mapping dynamic cover types in a large seasonally flooded wetland using extended principal component analysis and object-based classification. Remote Sensing of Environment, 158, pp. 193-206. Duro, D. C., Franklin, S. E., & Dubé, M. G. (2012). A comparison of pixel-based and object-based image analysis with selected machine learning algorithms for the classification of agricultural landscapes using SPOT-5 HRG imagery. Remote Sensing of Environment, 118, pp. 259-272. Elmhagen, B., Destouni, G., Angerbjörn, A., Borgström, S., Boyd, E., Cousins, S., . . . Hambäck, P. (2015). Interacting effects of change in climate, human population, land use, and water use on biodiversity and ecosystem services. Ecology and Society, 20(1) Farhani, S., & Ozturk, I. (2015). Causal relationship between CO 2 emissions, real GDP, energy consumption, financial development, trade openness, and urbanization in Tunisia. Environmental Science and Pollution Research, 22(20), pp. 15663-15676. Feng, L., Chen, B., Hayat, T., Alsaedi, A., & Ahmad, B. (2017). The driving force of water footprint under the rapid urbanization process: a structural decomposition analysis for Zhangye city in China. Journal of Cleaner Production, 163, pp. S322-S328. Fensham, R., & Fairfax, R. (2002). Aerial photography for assessing vegetation change: a review of applications and the relevance of findings for Australian vegetation history. Australian Journal of Botany, 50(4), pp. 415-429. Ferreira, N., Lage, M., Doraiswamy, H., Vo, H., Wilson, L., Werner, H., . . . Silva, C. (2015). Urbane: A 3d framework to support data driven decision making in urban development. Visual Analytics Science and Technology (VAST), 2015 IEEE Conference on. Garschagen, M., & Romero-Lankao, P. (2015). Exploring the relationships between urbanization trends and climate change vulnerability. Climatic Change, 133(1), pp. 37-52. Gokturk, S. B., Sumengen, B., Vu, D., Dalal, N., Yang, D., Lin, X., . . . Torresani, L. (2015). System and method for search portions of objects in images and features thereof: Google Patents. Government, N. S. (2007). Niger state (The Power State). Retrieved from http://nigerstate.blogspot.com.ng/ Green, K., Kempka, D., & Lackey, L. (1994). Using remote sensing to detect and monitor land-cover and land-use change. Photogrammetric engineering and remote sensing, 60(3), pp. 331-337. Gu, W., Lv, Z., & Hao, M. (2017). Change detection method for remote sensing images based on an improved Markov random field. Multimedia Tools and Applications, 76(17), pp. 17719-17734. Guo, Y., & Shen, Y. (2015). Quantifying water and energy budgets and the impacts of climatic and human factors in the Haihe River Basin, China: 2. Trends and implications to water resources. Journal of Hydrology, 527, pp. 251-261. Hadi, F., Thapa, R. B., Helmi, M., Hazarika, M. K., Madawalagama, S., Deshapriya, L. N., & Center, G. (2016). Urban growth and land use/land cover modeling in Semarang, Central Java, Indonesia: Colombo-Srilanka, ACRS2016. Hagolle, O., Huc, M., Villa Pascual, D., & Dedieu, G. (2015). A multi-temporal and multi-spectral method to estimate aerosol optical thickness over land, for the atmospheric correction of FormoSat-2, LandSat, VENμS and Sentinel-2 images. Remote Sensing, 7(3), pp. 2668-2691. Hegazy, I. R., & Kaloop, M. R. (2015). Monitoring urban growth and land use change detection with GIS and remote sensing techniques in Daqahlia governorate Egypt. International Journal of Sustainable Built Environment, 4(1), pp. 117-124. Henderson, J. V., Storeygard, A., & Deichmann, U. (2017). Has climate change driven urbanization in Africa? Journal of development economics, 124, pp. 60-82. Hu, L., & Brunsell, N. A. (2015). A new perspective to assess the urban heat island through remotely sensed atmospheric profiles. Remote Sensing of Environment, 158, pp. 393-406. Hughes, S. J., Cabral, J. A., Bastos, R., Cortes, R., Vicente, J., Eitelberg, D., . . . Santos, M. (2016). A stochastic dynamic model to assess land use change scenarios on the ecological status of fluvial water bodies under the Water Framework Directive. Science of the Total Environment, 565, pp. 427-439. Hussain, M., Chen, D., Cheng, A., Wei, H., & Stanley, D. (2013). Change detection from remotely sensed images: From pixel-based to object-based approaches. ISPRS Journal of Photogrammetry and Remote Sensing, 80, pp. 91-106. Hyyppä, J., Hyyppä, H., Inkinen, M., Engdahl, M., Linko, S., & Zhu, Y.-H. (2000). Accuracy comparison of various remote sensing data sources in the retrieval of forest stand attributes. Forest Ecology and Management, 128(1-2), pp. 109-120. Jiang, L., Wu, F., Liu, Y., & Deng, X. (2014). Modeling the impacts of urbanization and industrial transformation on water resources in China: an integrated hydro-economic CGE analysis. Sustainability, 6(11), pp. 7586-7600. Jin, S., Yang, L., Zhu, Z., & Homer, C. (2017). A land cover change detection and classification protocol for updating Alaska NLCD 2001 to 2011. Remote Sensing of Environment, 195, pp. 44-55. Joshi, N., Baumann, M., Ehammer, A., Fensholt, R., Grogan, K., Hostert, P., . . . Mitchard, E. T. (2016). A review of the application of optical and radar remote sensing data fusion to land use mapping and monitoring. Remote Sensing, 8(1), p 70. Kaliraj, S., Chandrasekar, N., & Magesh, N. (2015). Evaluation of multiple environmental factors for site-specific groundwater recharge structures in the Vaigai River upper basin, Tamil Nadu, India, using GIS-based weighted overlay analysis. Environmental earth sciences, 74(5), pp. 4355-4380. Koop, S. H., & van Leeuwen, C. J. (2015). Assessment of the sustainability of water resources management: A critical review of the City Blueprint approach. Water Resources Management, 29(15), pp. 5649-5670. Kumar, P., Masago, Y., Mishra, B. K., & Fukushi, K. (2018). Evaluating future stress due to combined effect of climate change and rapid urbanization for Pasig-Marikina River, Manila. Groundwater for Sustainable Development, 6, pp. 227-234. Lang, S. (2008). Object-based image analysis for remote sensing applications: modeling reality–dealing with complexity Object-based image analysis (pp. 3-27): Springer. Li, M., Zang, S., Zhang, B., Li, S., & Wu, C. (2014). A review of remote sensing image classification techniques: The role of spatio-contextual information. European Journal of Remote Sensing, 47(1), pp. 389-411. Liddle, B. (2014). Impact of population, age structure, and urbanization on carbon emissions/energy consumption: evidence from macro-level, cross-country analyses. Population and Environment, 35(3), pp. 286-304. Lillesand, T., Kiefer, R. W., & Chipman, J. (2014). Remote sensing and image interpretation: John Wiley & Sons. Liu, Y., Wang, Y., Peng, J., Du, Y., Liu, X., Li, S., & Zhang, D. (2015). Correlations between urbanization and vegetation degradation across the world’s metropolises using DMSP/OLS nighttime light data. Remote Sensing, 7(2), pp. 2067-2088. López, E., Bocco, G., Mendoza, M., & Duhau, E. (2001). Predicting land-cover and land-use change in the urban fringe: a case in Morelia city, Mexico. Landscape and urban planning, 55(4), pp. 271-285. Luo, M., & Lau, N.-C. (2017). Heat waves in southern China: Synoptic behavior, long-term change, and urbanization effects. Journal of Climate, 30(2), pp. 703-720. Mahboob, M. A., Atif, I., & Iqbal, J. (2015). Remote sensing and GIS applications for assessment of urban sprawl in Karachi, Pakistan. Science, Technology and Development, 34(3), pp. 179-188. Mallinis, G., Koutsias, N., Tsakiri-Strati, M., & Karteris, M. (2008). Object-based classification using Quickbird imagery for delineating forest vegetation polygons in a Mediterranean test site. ISPRS Journal of Photogrammetry and Remote Sensing, 63(2), pp. 237-250. Mas, J.-F., Velázquez, A., Díaz-Gallegos, J. R., Mayorga-Saucedo, R., Alcántara, C., Bocco, G., . . . Pérez-Vega, A. (2004). Assessing land use/cover changes: a nationwide multidate spatial database for Mexico. International Journal of Applied Earth Observation and Geoinformation, 5(4), pp. 249-261. Mathew, A., Chaudhary, R., Gupta, N., Khandelwal, S., & Kaul, N. (2015). Study of Urban Heat Island Effect on Ahmedabad City and Its Relationship with Urbanization and Vegetation Parameters. International Journal of Computer & Mathematical Science, 4, pp. 2347-2357. Megahed, Y., Cabral, P., Silva, J., & Caetano, M. (2015). Land cover mapping analysis and urban growth modelling using remote sensing techniques in greater Cairo region—Egypt. ISPRS International Journal of Geo-Information, 4(3), pp. 1750-1769. Metternicht, G. (2001). Assessing temporal and spatial changes of salinity using fuzzy logic, remote sensing and GIS. Foundations of an expert system. Ecological modelling, 144(2-3), pp. 163-179. Miller, R. B., & Small, C. (2003). Cities from space: potential applications of remote sensing in urban environmental research and policy. Environmental Science & Policy, 6(2), pp. 129-137. Mirzaei, P. A. (2015). Recent challenges in modeling of urban heat island. Sustainable Cities and Society, 19, pp. 200-206. Mohammed, I., Aboh, H., & Emenike, E. (2007). A regional geoelectric investigation for groundwater exploration in Minna area, north west Nigeria. Science World Journal, 2(4) Morenikeji, G., Umaru, E., Liman, S., & Ajagbe, M. (2015). Application of Remote Sensing and Geographic Information System in Monitoring the Dynamics of Landuse in Minna, Nigeria. International Journal of Academic Research in Business and Social Sciences, 5(6), pp. 320-337. Mukherjee, A. B., Krishna, A. P., & Patel, N. (2018). Application of Remote Sensing Technology, GIS and AHP-TOPSIS Model to Quantify Urban Landscape Vulnerability to Land Use Transformation Information and Communication Technology for Sustainable Development (pp. 31-40): Springer. Myint, S. W., Gober, P., Brazel, A., Grossman-Clarke, S., & Weng, Q. (2011). Per-pixel vs. object-based classification of urban land cover extraction using high spatial resolution imagery. Remote Sensing of Environment, 115(5), pp. 1145-1161. Nemmour, H., & Chibani, Y. (2006). Multiple support vector machines for land cover change detection: An application for mapping urban extensions. ISPRS Journal of Photogrammetry and Remote Sensing, 61(2), pp. 125-133. Niu, X., & Ban, Y. (2013). Multi-temporal RADARSAT-2 polarimetric SAR data for urban land-cover classification using an object-based support vector machine and a rule-based approach. International journal of remote sensing, 34(1), pp. 1-26. Nogueira, K., Penatti, O. A., & dos Santos, J. A. (2017). Towards better exploiting convolutional neural networks for remote sensing scene classification. Pattern Recognition, 61, pp. 539-556. Oguz, H., & Zengin, M. (2011). Analyzing land use/land cover change using remote sensing data and landscape structure metrics: a case study of Erzurum, Turkey. Fresenius Environmental Bulletin, 20(12), pp. 3258-3269. Pohl, C., & Van Genderen, J. L. (1998). Review article multisensor image fusion in remote sensing: concepts, methods and applications. International journal of remote sensing, 19(5), pp. 823-854. Price, O., & Bradstock, R. (2014). Countervailing effects of urbanization and vegetation extent on fire frequency on the Wildland Urban Interface: Disentangling fuel and ignition effects. Landscape and urban planning, 130, pp. 81-88. Prosdocimi, I., Kjeldsen, T., & Miller, J. (2015). Detection and attribution of urbanization effect on flood extremes using nonstationary flood‐frequency models. Water resources research, 51(6), pp. 4244-4262. Rawat, J., & Kumar, M. (2015). Monitoring land use/cover change using remote sensing and GIS techniques: A case study of Hawalbagh block, district Almora, Uttarakhand, India. The Egyptian Journal of Remote Sensing and Space Science, 18(1), pp. 77-84. Rokni, K., Ahmad, A., Solaimani, K., & Hazini, S. (2015). A new approach for surface water change detection: Integration of pixel level image fusion and image classification techniques. International Journal of Applied Earth Observation and Geoinformation, 34, pp. 226-234. Sakieh, Y., Amiri, B. J., Danekar, A., Feghhi, J., & Dezhkam, S. (2015). Simulating urban expansion and scenario prediction using a cellular automata urban growth model, SLEUTH, through a case study of Karaj City, Iran. Journal of Housing and the Built Environment, 30(4), pp. 591-611. Santra, A. (2016). Land Surface Temperature Estimation and Urban Heat Island Detection: A Remote Sensing Perspective. Remote Sensing Techniques and GIS Applications in Earth and Environmental Studies, p 16. Shrivastava, L., & Nag, S. (2017). MONITORING OF LAND USE/LAND COVER CHANGE USING GIS AND REMOTE SENSING TECHNIQUES: A CASE STUDY OF SAGAR RIVER WATERSHED, TRIBUTARY OF WAINGANGA RIVER OF MADHYA PRADESH, INDIA. Shuaibu, M., & Sulaiman, I. (2012). Application of remote sensing and GIS in land cover change detection in Mubi, Adamawa State, Nigeria. J Technol Educ Res, 5, pp. 43-55. Song, B., Li, J., Dalla Mura, M., Li, P., Plaza, A., Bioucas-Dias, J. M., . . . Chanussot, J. (2014). Remotely sensed image classification using sparse representations of morphological attribute profiles. IEEE transactions on geoscience and remote sensing, 52(8), pp. 5122-5136. Song, X.-P., Sexton, J. O., Huang, C., Channan, S., & Townshend, J. R. (2016). Characterizing the magnitude, timing and duration of urban growth from time series of Landsat-based estimates of impervious cover. Remote Sensing of Environment, 175, pp. 1-13. Tayyebi, A., Shafizadeh-Moghadam, H., & Tayyebi, A. H. (2018). Analyzing long-term spatio-temporal patterns of land surface temperature in response to rapid urbanization in the mega-city of Tehran. Land Use Policy, 71, pp. 459-469. Teodoro, A. C., Gutierres, F., Gomes, P., & Rocha, J. (2018). Remote Sensing Data and Image Classification Algorithms in the Identification of Beach Patterns Beach Management Tools-Concepts, Methodologies and Case Studies (pp. 579-587): Springer. Toth, C., & Jóźków, G. (2016). Remote sensing platforms and sensors: A survey. ISPRS Journal of Photogrammetry and Remote Sensing, 115, pp. 22-36. Tuholske, C., Tane, Z., López-Carr, D., Roberts, D., & Cassels, S. (2017). Thirty years of land use/cover change in the Caribbean: Assessing the relationship between urbanization and mangrove loss in Roatán, Honduras. Applied Geography, 88, pp. 84-93. Tuia, D., Flamary, R., & Courty, N. (2015). Multiclass feature learning for hyperspectral image classification: Sparse and hierarchical solutions. ISPRS Journal of Photogrammetry and Remote Sensing, 105, pp. 272-285. Tzotsos, A., & Argialas, D. (2008). Support vector machine classification for object-based image analysis Object-Based Image Analysis (pp. 663-677): Springer. Wang, L., Sousa, W., & Gong, P. (2004). Integration of object-based and pixel-based classification for mapping mangroves with IKONOS imagery. International journal of remote sensing, 25(24), pp. 5655-5668. Wang, Q., Zeng, Y.-e., & Wu, B.-w. (2016). Exploring the relationship between urbanization, energy consumption, and CO2 emissions in different provinces of China. Renewable and Sustainable Energy Reviews, 54, pp. 1563-1579. Wang, S., Ma, H., & Zhao, Y. (2014). Exploring the relationship between urbanization and the eco-environment—A case study of Beijing–Tianjin–Hebei region. Ecological Indicators, 45, pp. 171-183. Weitkamp, C. (2006). Lidar: range-resolved optical remote sensing of the atmosphere: Springer Science & Business. Wellmann, T., Haase, D., Knapp, S., Salbach, C., Selsam, P., & Lausch, A. (2018). Urban land use intensity assessment: The potential of spatio-temporal spectral traits with remote sensing. Ecological Indicators, 85, pp. 190-203. Whiteside, T. G., Boggs, G. S., & Maier, S. W. (2011). Comparing object-based and pixel-based classifications for mapping savannas. International Journal of Applied Earth Observation and Geoinformation, 13(6), pp. 884-893. Willhauck, G., Schneider, T., De Kok, R., & Ammer, U. (2000). Comparison of object oriented classification techniques and standard image analysis for the use of change detection between SPOT multispectral satellite images and aerial photos. Proceedings of XIX ISPRS congress. Winker, D. M., Vaughan, M. A., Omar, A., Hu, Y., Powell, K. A., Liu, Z., . . . Young, S. A. (2009). Overview of the CALIPSO mission and CALIOP data processing algorithms. Journal of Atmospheric and Oceanic Technology, 26(11), pp. 2310-2323. Yengoh, G. T., Dent, D., Olsson, L., Tengberg, A. E., & Tucker III, C. J. (2015). Use of the Normalized Difference Vegetation Index (NDVI) to Assess Land Degradation at Multiple Scales: Current Status, Future Trends, and Practical Considerations: Springer. Yu, Q., Gong, P., Clinton, N., Biging, G., Kelly, M., & Schirokauer, D. (2006). Object-based detailed vegetation classification with airborne high spatial resolution remote sensing imagery. Photogrammetric Engineering & Remote Sensing, 72(7), pp. 799-811. Zhou, D., Zhao, S., Zhang, L., & Liu, S. (2016). Remotely sensed assessment of urbanization effects on vegetation phenology in China's 32 major cities. Remote Sensing of Environment, 176, pp. 272-281. Zhu, Z., Fu, Y., Woodcock, C. E., Olofsson, P., Vogelmann, J. E., Holden, C., . . . Yu, Y. (2016). Including land cover change in analysis of greenness trends using all available Landsat 5, 7, and 8 images: A case study from Guangzhou, China (2000–2014). Remote Sensing of Environment, 185, pp. 243-257.
APA, Harvard, Vancouver, ISO, and other styles
28

Jeon, Soohyun, Insoo Son, and Jinyoung Han. "Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case." Information Technology & People ahead-of-print, ahead-of-print (May 11, 2020). http://dx.doi.org/10.1108/itp-05-2018-0256.

Full text
Abstract:
PurposeEmployee compliance with information system security policies (ISSPs) has been emphasized as a key factor in protecting information assets against insider threats. Even though previous studies have identified extrinsic factors (in the form of external pressure, rewards and social norms) influencing employee compliance, the functioning of employees' intrinsic motivation has not been clearly analyzed. Thus, the aim of this study is to explore the influence of intrinsic motivations on employees' ISSP compliance.Design/methodology/approachThis study follows a survey approach and conducts structural equation modeling using WarpPLS 5.0 to test the research model and hypotheses. The survey respondents are users of an enterprise digital rights management (EDRM) system.FindingsThe analysis results demonstrate that work impediments, perceived responsibility and self-efficacy significantly influence the intention to comply with ISSP. Additionally, autonomy significantly affects self-efficacy and perceived responsibility. Furthermore, autonomy plays a moderating role in the relationship between work impediment and ISSP compliance intentions.Originality/valueThis study initiatively explores the effect of intrinsic motivations on ISSP compliance intention of employees for a specific information security system (i.e. the EDRM system). This study clarifies the enabling role of intrinsic motivations in ISSP compliance and helps organizations to understand that employee's self-motivated intention, i.e. autonomy, is an essential factor that achieves a higher level of ISSP compliance in the workplace.
APA, Harvard, Vancouver, ISO, and other styles
29

Pham, Hiep Cong, Duy Dang Pham, Linda Brennan, and Joan Richardson. "Information Security and People: A Conundrum for Compliance." Australasian Journal of Information Systems 21 (January 18, 2017). http://dx.doi.org/10.3127/ajis.v21i0.1321.

Full text
Abstract:
This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a series of case studies, this research illustrates that making it easier for end-users to comply does not necessarily equate to enhanced implementation of security measures. End-users want to be autonomous, competent, self-motivated and active participants in the development of secure environments. However, managers and experts want to limit autonomy to ensure that procedures are followed closely, rather than permitting flexibility. This results in the creation of environments that are intrinsically de-motivating rather than motivating end-users to become self-determined and self-regulating co-creators of a secure IT environment. The paper also discusses alternative approaches to developing a human system that works for end-users and experts.
APA, Harvard, Vancouver, ISO, and other styles
30

Irannezhad, Elnaz, and Renuka Mahadevan. "Is blockchain tourism’s new hope?" Journal of Hospitality and Tourism Technology ahead-of-print, ahead-of-print (December 11, 2020). http://dx.doi.org/10.1108/jhtt-02-2019-0039.

Full text
Abstract:
Purpose Blockchain is a disruptive technology enabling distributed, encrypted, smart and secure peer-to-peer transactions. The fragmented nature of the tourism industry with a high number of contracts and transactions between several parties has security issues, disputes and delay. Although these motivate the use of blockchain, scholars have barely begun to systematically assess the value proposition of blockchain in the hospitality and tourism industry. The purpose of this paper is to examine the impacts, opportunities and challenges of blockchain in the tourism and hospitality sector. The authors present early use cases of blockchain in the tourism industry. Design/methodology/approach The authors conducted a multiple case-study approach and grounded this study based on the technology acceptance management literature with context-specific variables that are pivotal to the study of this topic. Findings This paper outlines the useful features of blockchain in the tourism industry in seven major streams and raises four future research questions. This review will enable hypotheses to be set out for consumers and producers involved in tourism to uncover potential motives and barriers to embracing blockchain. Research limitations/implications Blockchain is a relatively new technology, and given that all use cases are limited to the proof of concept and have not been fully adopted by the industry, empirical assessment of case studies is not feasible yet. Originality/value As blockchain is becoming more known and used in the tourism industry, there is a need to identify challenges, issues and concerns relevant for this industry moving forward. This paper fulfils this need and provides directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
31

Al Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.

Full text
Abstract:
Few epidemiological studies have discussed the gender-specific prevalence of ischemic heart disease (IHD). We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. Three hundred patients were recruited from Prince Sultan Cardiac Center in Al Ahsa, KSA. Hypertension was identified as systolic pressure equal to or more than 140 mmHg and/or diastolic pressure equal to or more than 90 mmHg or by the patient currently being on antihypertensive medication, and coronary artery disease (CAD) was diagnosed by electrocardiogram, cardiac markers, cardiac exercise testing or coronary angiography. Hypertension was found in 80% of males and 72% of females. A significantly higher rate of diabetes was noted in females (62%) compared to males (48%) (p<0.012). Co-existing diabetes and hypertension was found in 70% of females as compared to 38% of males. The occurrence of IHD in males was significantly higher than that in females (p<0.001). However, the incidence of myocardial infarction was greater in females (52%) compared to males (38%) (p<0.035). Co-existing hypertension and diabetes may affect the gender prevalence of myocardial infarction among emergency department patients, with more infarctions being noted among females. This finding helps to guide the treatment strategy for both genders.
APA, Harvard, Vancouver, ISO, and other styles
32

Chesher, Chris. "Mining Robotics and Media Change." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.626.

Full text
Abstract:
Introduction Almost all industries in Australia today have adopted digital media in some way. However, uses in large scale activities such as mining may seem to be different from others. This article looks at mining practices with a media studies approach, and concludes that, just as many other industries, mining and media have converged. Many Australian mine sites are adopting new media for communication and control to manage communication, explore for ore bodies, simulate forces, automate drilling, keep records, and make transport and command robotic. Beyond sharing similar digital devices for communication and computation, new media in mining employ characteristic digital media operations, such as numerical operation, automation and managed variability. This article examines the implications of finding that some of the most material practices have become mediated by new media. Mining has become increasingly mediated through new media technologies similar to GPS, visualisation, game remote operation, similar to those adopted in consumer home and mobile digital media. The growing and diversified adoption of digital media championed by companies like Rio Tinto aims not only ‘improve’ mining, but to change it. Through remediating practices of digital mining, new media have become integral powerful tools in prospective, real time and analytical environments. This paper draws on two well-known case studies of mines in the Pilbara and Western NSW. These have been documented in press releases and media reports as representing changes in media and mining. First, the West Angelas mines in the Pilbara is an open cut iron ore mine introducing automation and remote operation. This mine is located in the remote Pilbara, and is notable for being operated remotely from a control centre 2000km away, near Perth Airport, WA. A growing fleet of Komatsu 930E haul trucks, which can drive autonomously, traverses the site. Fitted with radars, lasers and GPS, these enormous vehicles navigate through the open pit mine with no direct human control. Introducing these innovations to mine sites become more viable after iron ore mining became increasingly profitable in the mid-2000s. A boom in steel building in China drove unprecedented demand. This growing income coincided with a change in public rhetoric from companies like Rio Tinto. They pointed towards substantial investments in research, infrastructure, and accelerated introduction of new media technologies into mining practices. Rio Tinto trademarked the term ‘Mine of the future’ (US Federal News Service 1), and publicised their ambitious project for renewal of mining practice, including digital media. More recently, prices have been more volatile. The second case study site is a copper and gold underground mine at Northparkes in Western NSW. Northparkes uses substantial sensing and control, as well as hybrid autonomous and remote operated vehicles. The use of digital media begins with prospecting, and through to logistics of transportation. Engineers place explosives in optimal positions using computer modelling of the underground rock formations. They make heavy use of software to coordinate layer-by-layer use of explosives in this advanced ‘box cut’ mine. After explosives disrupt the rock layer a kilometre underground, another specialised vehicle collects and carries the ore to the surface. The Sandvik loader-hauler-dumper (LHD) can be driven conventionally by a driver, but it can also travel autonomously in and out of the mine without a direct operator. Once it reaches a collection point, where the broken up ore has accumulated, a user of the surface can change the media mode to telepresence. The human operator then takes control using something like a games controller and multiple screens. The remote operator controls the LHD to fill the scoop with ore. The fully-loaded LHD backs up, and returns autonomously using laser senses to follow a trail to the next drop off point. The LHD has become a powerful mediator, reconfiguring technical, material and social practices throughout the mine. The Meanings of Mining and Media Are Converging Until recently, mining and media typically operated ontologically separately. The media, such as newspapers and television, often tell stories about mining, following regular narrative scripts. There are controversies and conflicts, narratives of ecological crises, and the economics of national benefit. There are heroic and tragic stories such as the Beaconsfield mine collapse (Clark). There are new industry policies (Middelbeek), which are politically fraught because of the lobbying power of miners. Almost completely separately, workers in mines were consumers of media, from news to entertainment. These media practices, while important in their own right, tell nothing of the approaching changes in many other sectors of work and everyday life. It is somewhat unusual for a media studies scholar to study mine sites. Mine sites are most commonly studied by Engineering (Bellamy & Pravica), Business and labour and cultural histories (McDonald, Mayes & Pini). Until recently, media scholarship on mining has related to media institutions, such as newspapers, broadcasters and websites, and their audiences. As digital media have proliferated, the phenomena that can be considered as media phenomena has changed. This article, pointing to the growing roles of media technologies, observes the growing importance that media, in these terms, have in the rapidly changing domain of mining. Another meaning for ‘media’ studies, from cybernetics, is that a medium is any technology that translates perception, makes interpretations, and performs expressions. This meaning is more abstract, operating with a broader definition of media — not only those institutionalised as newspapers or radio stations. It is well known that computer-based media have become ubiquitous in culture. This is true in particular within the mining company’s higher ranks. Rio Tinto’s ambitious 2010 ‘Mine of the Future’ (Fisher & Schnittger, 2) program was premised on an awareness that engineers, middle managers and senior staff were already highly computer literate. It is worth remembering that such competency was relatively uncommon until the late 1980s. The meanings of digital media have been shifting for many years, as computers become experienced more as everyday personal artefacts, and less as remote information systems. Their value has always been held with some ambivalence. Zuboff’s (387-414) picture of loss, intimidation and resistance to new information technologies in the 1980s seems to have dissipated by 2011. More than simply being accepted begrudgingly, the PC platform (and variants) has become a ubiquitous platform, a lingua franca for information workers. It became an intimate companion for many professions, and in many homes. It was an inexpensive, versatile and generalised convergent medium for communication and control. And yet, writers such as Gregg observe, the flexibility of networked digital work imposes upon many workers ‘unlimited work’. The office boundaries of the office wall break down, for better or worse. Emails, utility and other work-related behaviours increasingly encroach onto domestic and public space and time. Its very attractiveness to users has tied them to these artefacts. The trail that leads the media studies discipline down the digital mine shaft has been cleared by recent work in media archaeology (Parikka), platform studies (Middelbeek; Montfort & Bogost; Maher) and new media (Manovich). Each of these redefined Media Studies practices addresses the need to diversify the field’s attention and methods. It must look at more specific, less conventional and more complex media formations. Mobile media and games (both computer-based) have turned out to be quite different from traditional media (Hjorth; Goggin). Kirschenbaum’s literary study of hard drives and digital fiction moves from materiality to aesthetics. In my study of digital mining, I present a reconfigured media studies, after the authors, that reveals heterogeneous media configurations, deserving new attention to materiality. This article also draws from the actor network theory approach and terminology (Latour). The uses of media / control / communications in the mining industry are very complex, and remain under constant development. Media such as robotics, computer modelling, remote operation and so on are bound together into complex practices. Each mine site is different — geologically, politically, and economically. Mines are subject to local and remote disasters. Mine tunnels and global prices can collapse, rendering active sites uneconomical overnight. Many technologies are still under development — including Northparkes and West Angelas. Both these sites are notable for their significant use of autonomous vehicles and remote operated vehicles. There is no doubt that the digital technologies modulate all manner of the mining processes: from rocks and mechanical devices to human actors. Each of these actors present different forms of collusion and opposition. Within a mining operation, the budgets for computerised and even robotic systems are relatively modest for their expected return. Deep in a mine, we can still see media convergence at work. Convergence refers to processes whereby previously diverse practices in media have taken on similar devices and techniques. While high-end PCs in mining, running simulators; control data systems; visualisation; telepresence, and so on may be high performance, ruggedised devices, they still share a common platform to the desktop PC. Conceptual resources developed in Media Ecology, New Media Studies, and the Digital Humanities can now inform readings of mining practices, even if their applications differ dramatically in size, reliability and cost. It is not entirely surprising that some observations by new media theorists about entertainment and media applications can also relate to features of mining technologies. Manovich argues that numerical representation is a distinctive feature of new media. Numbers have always already been key to mining engineering. However, computers visualise numerical fields in simulations that extend out of the minds of the calculators, and into visual and even haptic spaces. Specialists in geology, explosives, mechanical apparatuses, and so on, can use plaftorms that are common to everyday media. As the significance of numbers is extended by computers in the field, more and more diverse sources of data provide apparently consistent and seamless images of multiple fields of knowledge. Another feature that Manovich identifies in new media is the capacity for automation of media operations. Automation of many processes in mechanical domains clearly occurred long before industrial technologies were ported into new media. The difference with new media in mine sites is that robotic systems must vary their performance according to feedback from their extra-system environments. For our purposes, the haul trucks in WA are software-controlled devices that already qualify as robots. They sense, interpret and act in the world based on their surroundings. They evaluate multiple factors, including the sensors, GPS signals, operator instructions and so on. They can repeat the path, by sensing the differences, day after day, even if the weather changes, the track wears away or the instructions from base change. Automation compensates for differences within complex and changing environments. Automation of an open-pit mine haulage system… provides more consistent and efficient operation of mining equipment, it removes workers from potential danger, it reduces fuel consumption significantly reducing greenhouse gas (GHG) emissions, and it can help optimize vehicle repairs and equipment replacement because of more-predictable and better-controlled maintenance. (Parreire and Meech 1-13) Material components in physical mines tend to become modular and variable, as their physical shape lines up with the logic of another of Manovich’s new media themes, variability. Automatic systems also make obsolete human drivers, who previously handled those environmental variations, for better or for worse, through the dangerous, dull and dirty spaces of the mine. Drivers’ capacity to control repeat trips is no longer needed. The Komatsu driverless truck, introduced to the WA iron ore mines from 2008, proved itself to be almost as quick as human drivers at many tasks. But the driverless trucks have deeper advantages: they can run 23 hours each day with no shift breaks; they drive more cautiously and wear the equipment less than human drivers. There is no need to put up workers and their families up in town. The benefit most often mentioned is safety: even the worst accident won’t produce injuries to drivers. The other advantage less mentioned is that autonomous trucks don’t strike. Meanwhile, managers of human labour also need to adopt certain strategies of modulation to support the needs and expectations of their workers. Mobile phones, televisions and radio are popular modes of connecting workers to their loved ones, particularly in the remote and harsh West Angelas site. One solution — regular fly-in-fly out shifts — tends also to be alienating for workers and locals (Cheshire; Storey; Tonts). As with any operations, the cost of maintaining a safe and comfortable environment for workers requires trade-offs. Companies face risks from mobile phones, leaking computer networks, and espionage that expose the site to security risks. Because of such risks, miners tend be subject to disciplinary regimes. It is common to test alcohol and drug levels. There was some resistance from workers, who refused to change to saliva testing from urine testing (Latimer). Contesting these machines places the medium, in a different sense, at the centre of regulation of the workers’ bodies. In Northparkes, the solution of hybrid autonomous and remote operation is also a solution for modulating labour. It is safer and more comfortable, while also being more efficient, as one experienced driver can control three trucks at a time. This more complex mode of mediation is necessary because underground mines are more complex in geology, and working environments to suit full autonomy. These variations provide different relationships between operators and machines. The operator uses a games controller, and watches four video views from the cabin to make the vehicle fill the bucket with ore (Northparkes Mines, 9). Again, media have become a pivotal element in the mining assemblage. This combines the safety and comfort of autonomous operation (helping to retain staff) with the required use of human sensorimotor dexterity. Mine systems deserve attention from media studies because sites are combining large scale physical complexity with increasingly sophisticated computing. The conventional pictures of mining and media rarely address the specificity of subjective and artefactual encounters in and around mine sites. Any research on mining communication is typically within the instrumental frames of engineering (Duff et al.). Some of the developments in mechanical systems have contributed to efficiency and safety of many mines: larger trucks, more rock crushers, and so on. However, the single most powerful influence on mining has been adopting digital media to control, integrate and mining systems. Rio Tinto’s transformative agenda document is outlined in its high profile ‘Mine of the Future’ agenda (US Federal News Service). The media to which I refer are not only those in popular culture, but also those with digital control and communications systems used internally within mines and supply chains. The global mining industry began adopting digital communication automation (somewhat) systematically only in the 1980s. Mining companies hesitated to adopt digital media because the fundamentals of mining are so risky and bound to standard procedures. Large scale material operations, extracting and processing minerals from under the ground: hardly to be an appropriate space for delicate digital electronics. Mining is also exposed to volatile economic conditions, so investing in anything major can be unattractive. High technology perhaps contradicts an industry ethos of risk-taking and masculinity. Digital media became domesticated, and familiar to a new generation of formally educated engineers for whom databases and algorithms (Manovich) were second nature. Digital systems become simultaneously controllers of objects, and mediators of meanings and relationships. They control movements, and express communications. Computers slide from using meanings to invoking direct actions over objects in the world. Even on an everyday scale, computer operations often control physical processes. Anti-lock Braking Systems regulate a vehicle’s braking pressure to avoid the danger when wheels lock-up. Or another example, is the ATM, which involves both symbolic interactions, and also exchange of physical objects. These operations are examples of the ‘asignifying semiotic’ (Guattari), in which meanings and non-meanings interact. There is no operation essential distinction between media- and non-media digital operations. Which are symbolic, attached or non-consequential is not clear. This trend towards using computation for both meanings and actions has accelerated since 2000. Mines of the Future Beyond a relatively standard set of office and communications software, many fields, including mining, have adopted specialised packages for their domains. In 3D design, it is AutoCAD. In hard sciences, it is custom modelling. In audiovisual production, it may be Apple and Adobe products. Some platforms define their subjectivity, professional identity and practices around these platforms. This platform orientation is apparent in areas of mining, so that applications such as the Gemcom, Rockware, Geological Database and Resource Estimation Modelling from Micromine; geology/mine design software from Runge, Minemap; and mine production data management software from Corvus. However, software is only a small proportion of overall costs in the industry. Agents in mining demand solutions to peculiar problems and requirements. They are bound by their enormous scale; physical risks of environments, explosive and moving elements; need to negotiate constant change, as mining literally takes the ground from under itself; the need to incorporate geological patterns; and the importance of logistics. When digital media are the solution, there can be what is perceived as rapid gains, including greater capacities for surveillance and control. Digital media do not provide more force. Instead, they modulate the direction, speed and timing of activities. It is not a complete solution, because too many uncontrolled elements are at play. Instead, there are moment and situations when the degree of control refigures the work that can be done. Conclusions In this article I have proposed a new conception of media change, by reading digital innovations in mining practices themselves as media changes. This involved developing an initial reading of the operations of mining as digital media. With this approach, the array of media components extends far beyond the conventional ‘mass media’ of newspapers and television. It offers a more molecular media environment which is increasingly heterogeneous. It sometimes involves materiality on a huge scale, and is sometimes apparently virtual. The mining media event can be a semiotic, a signal, a material entity and so on. It can be a command to a human. It can be a measurement of location, a rock formation, a pressure or an explosion. The mining media event, as discussed above, is subject to Manovich’s principles of media, being numerical, variable and automated. In the mining media event, these principles move from the aesthetic to the instrumental and physical domains of the mine site. The role of new media operates at many levels — from the bottom of the mine site to the cruising altitude of the fly-in-fly out aeroplanes — has motivated significant changes in the Australian industry. When digital media and robotics come into play, they do not so much introduce change, but reintroduce similarity. This inversion of media is less about meaning, and more about local mastery. Media modulation extends the kinds of influence that can be exerted by the actors in control. In these situations, the degrees of control, and of resistance, are yet to be seen. Acknowledgments Thanks to Mining IQ for a researcher's pass at Mining Automation and Communication Conference, Perth in August 2012. References Bellamy, D., and L. Pravica. “Assessing the Impact of Driverless Haul Trucks in Australian Surface Mining.” Resources Policy 2011. Cheshire, L. “A Corporate Responsibility? The Constitution of Fly-In, Fly-Out Mining Companies as Governance Partners in Remote, Mine-Affected Localities.” Journal of Rural Studies 26.1 (2010): 12–20. Clark, N. “Todd and Brant Show PM Beaconsfield's Cage of Hell.” The Mercury, 6 Nov. 2008. Duff, E., C. Caris, A. Bonchis, K. Taylor, C. Gunn, and M. Adcock. “The Development of a Telerobotic Rock Breaker.” CSIRO 2009: 1–10. Fisher, B.S. and S. Schnittger. Autonomous and Remote Operation Technologies in the Mining Industry: Benefits and Costs. BAE Report 12.1 (2012). Goggin, G. Global Mobile Media. London: Routledge, 2010. Gregg, M. Work’s Intimacy. Cambridge: Polity, 2011. Guattari, F. Chaosmosis: An Ethico-Aesthetic Paradigm. Trans. Paul Bains and Julian Pefanis. Bloomington: Indiana UP, 1992. Hjorth, L. Mobile Media in the Asia-Pacific: Gender and the Art of Being Mobile. Taylor & Francis, 2008. Kirschenbaum, M.G. Mechanisms: New Media and the Forensic Imagination. Campridge, Mass.: MIT Press, 2008. Latimer, Cole. “Fair Work Appeal May Change Drug Testing on Site.” Mining Australia 2012. 3 May 2013 ‹http://www.miningaustralia.com.au/news/fair-work-appeal-may-change-drug-testing-on-site›. Latour, B. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press, 2007. Maher, J. The Future Was Here: The Commodore Amiga. Cambridge, Mass.: MIT Press, 2012. Manovich, Lev. The Language of New Media. Cambridge, Mass.: MIT Press, 2001. McDonald, P., R. Mayes, and B. Pini. “Mining Work, Family and Community: A Spatially-Oriented Approach to the Impact of the Ravensthorpe Nickel Mine Closure in Remote Australia.” Journal of Industrial Relations 2012. Middelbeek, E. “Australia Mining Tax Set to Slam Iron Ore Profits.” Metal Bulletin Weekly 2012. Montfort, N., and I. Bogost. Racing the Beam: The Atari Video Computer System. Cambridge, Mass.: MIT Press, 2009. Parikka, J. What Is Media Archaeology? London: Polity Press, 2012. Parreira, J., and J. Meech. “Autonomous vs Manual Haulage Trucks — How Mine Simulation Contributes to Future Haulage System Developments.” Paper presented at the CIM Meeting, Vancouver, 2010. 3 May 2013 ‹http://www.infomine.com/library/publications/docs/parreira2010.pdf›. Storey, K. “Fly-In/Fly-Out and Fly-Over: Mining and Regional Development in Western Australia.” Australian Geographer 32.2 (2010): 133–148. Storey, K. “Fly-In/Fly-Out: Implications for Community Sustainability.” Sustainability 2.5 (2010): 1161–1181. 3 May 2013 ‹http://www.mdpi.com/2071-1050/2/5/1161›. Takayama, L., W. Ju, and C. Nas. “Beyond Dirty, Dangerous and Dull: What Everyday People Think Robots Should Do.” Paper presented at HRI '08, Amsterdam, 2008. 3 May 2013 ‹http://www-cdr.stanford.edu/~wendyju/publications/hri114-takayama.pdf›. Tonts, M. “Labour Market Dynamics in Resource Dependent Regions: An Examination of the Western Australian Goldfields.” Geographical Research 48.2 (2010): 148-165. 3 May 2013 ‹http://onlinelibrary.wiley.com/doi/10.1111/j.1745-5871.2009.00624.x/abstract›. US Federal News Service, Including US State News. “USPTO Issues Trademark: Mine of the Future.” 31 Aug. 2011. Wu, S., H. Han, X. Liu, H. Wang, F. Xue. “Highly Effective Use of Australian Pilbara Blend Lump Ore in a Blast Furnace.” Revue de Métallurgie 107.5 (2010): 187-193. doi:10.1051/metal/2010021. Zuboff, S. In the Age of the Smart Machine: The Future of Work and Power. Heinemann Professional, 1988.
APA, Harvard, Vancouver, ISO, and other styles
33

Arnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no. 2 (May 3, 2010). http://dx.doi.org/10.5204/mcj.221.

Full text
Abstract:
Our thesis is that the city’s ambience is now an unstable dialectic in which we are watchers and watched, mirrored and refracted in a landscape of iPhone auteurs, eTags, CCTV and sousveillance. Embrace ambience! Invoking Benjamin’s spirit, this article does not seek to limit understanding through restriction to a particular theme or theoretical construct (Buck-Morss 253). Instead, it offers snapshots of interactions at the dawn of the postmodern city. That bricolage also engages how people appropriate, manipulate, disrupt and divert urban spaces and strategies of power in their everyday life. Ambient information can both liberate and disenfranchise the individual. This article asks whether our era’s dialectics result in a new personhood or merely restate the traditional spectacle of ‘bright lights, big city’. Does the virtualized city result in ambient anomie and satiation or in surprise, autonomy and serendipity? (Gumpert 36) Since the steam age, ambience has been characterised in terms of urban sound, particularly the alienation attributable to the individual’s experience as a passive receptor of a cacophony of sounds – now soft, now loud, random and recurrent–from the hubbub of crowds, the crash and grind of traffic, the noise of industrial processes and domestic activity, factory whistles, fire alarms, radio, television and gramophones (Merchant 111; Thompson 6). In the age of the internet, personal devices such as digital cameras and iPhones, and urban informatics such as CCTV networks and e-Tags, ambience is interactivity, monitoring and signalling across multiple media, rather than just sound. It is an interactivity in which watchers observe the watched observing them and the watched reshape the fabric of virtualized cities merely by traversing urban precincts (Hillier 295; De Certeau 163). It is also about pervasive although unevenly distributed monitoring of individuals, using sensors that are remote to the individual (for example cameras or tag-readers mounted above highways) or are borne by the individual (for example mobile phones or badges that systematically report the location to a parent, employer or sex offender register) (Holmes 176; Savitch 130). That monitoring reflects what Doel and Clark characterized as a pervasive sense of ambient fear in the postmodern city, albeit fear that like much contemporary anxiety is misplaced–you are more at risk from intimates than from strangers, from car accidents than terrorists or stalkers–and that is ahistorical (Doel 13; Scheingold 33). Finally, it is about cooption, with individuals signalling their identity through ambient advertising: wearing tshirts, sweatshirts, caps and other apparel that display iconic faces such as Obama and Monroe or that embody corporate imagery such as the Nike ‘Swoosh’, Coca-Cola ‘Ribbon’, Linux Penguin and Hello Kitty feline (Sayre 82; Maynard 97). In the postmodern global village much advertising is ambient, rather than merely delivered to a device or fixed on a billboard. Australian cities are now seas of information, phantasmagoric environments in which the ambient noise encountered by residents and visitors comprises corporate signage, intelligent traffic signs, displays at public transport nodes, shop-window video screens displaying us watching them, and a plethora of personal devices showing everything from the weather to snaps of people in the street or neighborhood satellite maps. They are environments through which people traverse both as persons and abstractions, virtual presences on volatile digital maps and in online social networks. Spectacle, Anomie or Personhood The spectacular city of modernity is a meme of communication, cultural and urban development theory. It is spectacular in the sense that of large, artificial, even sublime. It is also spectacular because it is built around the gaze, whether the vistas of Hausmann’s boulevards, the towers of Manhattan and Chicago, the shopfront ‘sea of light’ and advertising pillars noted by visitors to Weimar Berlin or the neon ‘neo-baroque’ of Las Vegas (Schivelbusch 114; Fritzsche 164; Ndalianis 535). In the year 2010 it aspires to 2020 vision, a panoptic and panspectric gaze on the part of governors and governed alike (Kullenberg 38). In contrast to the timelessness of Heidegger’s hut and the ‘fixity’ of rural backwaters, spectacular cities are volatile domains where all that is solid continues to melt into air with the aid of jackhammers and the latest ‘new media’ potentially result in a hypereality that make it difficult to determine what is real and what is not (Wark 22; Berman 19). The spectacular city embodies a dialectic. It is anomic because it induces an alienation in the spectator, a fatigue attributable to media satiation and to a sense of being a mere cog in a wheel, a disempowered and readily-replaceable entity that is denied personhood–recognition as an autonomous individual–through subjection to a Fordist and post-Fordist industrial discipline or the more insidious imprisonment of being ‘a housewife’, one ant in a very large ant hill (Dyer-Witheford 58). People, however, are not automatons: they experience media, modernity and urbanism in different ways. The same attributes that erode the selfhood of some people enhance the autonomy and personhood of others. The spectacular city, now a matrix of digits, information flows and opportunities, is a realm in which people can subvert expectations and find scope for self-fulfillment, whether by wearing a hoodie that defeats CCTV or by using digital technologies to find and associate with other members of stigmatized affinity groups. One person’s anomie is another’s opportunity. Ambience and Virtualisation Eighty years after Fritz Lang’s Metropolis forecast a cyber-sociality, digital technologies are resulting in a ‘virtualisation’ of social interactions and cities. In post-modern cityscapes, the space of flows comprises an increasing number of electronic exchanges through physically disjointed places (Castells 2002). Virtualisation involves supplementation or replacement of face-to-face contact with hypersocial communication via new media, including SMS, email, blogging and Facebook. In 2010 your friends (or your boss or a bully) may always be just a few keystrokes away, irrespective of whether it is raining outside, there is a public transport strike or the car is in for repairs (Hassan 69; Baron 215). Virtualisation also involves an abstraction of bodies and physical movements, with the information that represents individual identities or vehicles traversing the virtual spaces comprised of CCTV networks (where viewers never encounter the person or crowd face to face), rail ticketing systems and road management systems (x e-Tag passed by this tag reader, y camera logged a specific vehicle onto a database using automated number-plate recognition software) (Wood 93; Lyon 253). Surveillant Cities Pervasive anxiety is a permanent and recurrent feature of urban experience. Often navigated by an urgency to control perceived disorder, both physically and through cultivated dominant theory (early twentieth century gendered discourses to push women back into the private sphere; ethno-racial closure and control in the Black Metropolis of 1940s Chicago), history is punctuated by attempts to dissolve public debate and infringe minority freedoms (Wilson 1991). In the Post-modern city unprecedented technological capacity generates a totalizing media vector whose plausible by-product is the perception of an ambient menace (Wark 3). Concurrent faith in technology as a cost-effective mechanism for public management (policing, traffic, planning, revenue generation) has resulted in emergence of the surveillant city. It is both a social and architectural fabric whose infrastructure is dotted with sensors and whose people assume that they will be monitored by private/public sector entities and directed by interactive traffic management systems – from electronic speed signs and congestion indicators through to rail schedule displays –leveraging data collected through those sensors. The fabric embodies tensions between governance (at its crudest, enforcement of law by police and their surrogates in private security services) and the soft cage of digital governmentality, with people being disciplined through knowledge that they are being watched and that the observation may be shared with others in an official or non-official shaming (Parenti 51; Staples 41). Encounters with a railway station CCTV might thus result in exhibition of the individual in court or on broadcast television, whether in nightly news or in a ‘reality tv’ crime expose built around ‘most wanted’ footage (Jermyn 109). Misbehaviour by a partner might merely result in scrutiny of mobile phone bills or web browser histories (which illicit content has the partner consumed, which parts of cyberspace has been visited), followed by a visit to the family court. It might instead result in digital viligilantism, with private offences being named and shamed on electronic walls across the global village, such as Facebook. iPhone Auteurism Activists have responded to pervasive surveillance by turning the cameras on ‘the watchers’ in an exercise of ‘sousveillance’ (Bennett 13; Huey 158). That mirroring might involve the meticulous documentation, often using the same geospatial tools deployed by public/private security agents, of the location of closed circuit television cameras and other surveillance devices. One outcome is the production of maps identifying who is watching and where that watching is taking place. As a corollary, people with anxieties about being surveilled, with a taste for street theatre or a receptiveness to a new form of urban adventure have used those maps to traverse cities via routes along which they cannot be identified by cameras, tags and other tools of the panoptic sort, or to simply adopt masks at particular locations. In 2020 can anyone aspire to be a protagonist in V for Vendetta? (iSee) Mirroring might take more visceral forms, with protestors for example increasingly making a practice of capturing images of police and private security services dealing with marches, riots and pickets. The advent of 3G mobile phones with a still/video image capability and ongoing ‘dematerialisation’ of traditional video cameras (ie progressively cheaper, lighter, more robust, less visible) means that those engaged in political action can document interaction with authority. So can passers-by. That ambient imaging, turning the public gaze on power and thereby potentially redefining the ‘public’ (given that in Australia the community has been embodied by the state and discourse has been mediated by state-sanctioned media), poses challenges for media scholars and exponents of an invigorated civil society in which we are looking together – and looking at each other – rather than bowling alone. One challenge for consumers in construing ambient media is trust. Can we believe what we see, particularly when few audiences have forensic skills and intermediaries such as commercial broadcasters may privilege immediacy (the ‘breaking news’ snippet from participants) over context and verification. Social critics such as Baudelaire and Benjamin exalt the flaneur, the free spirit who gazed on the street, a street that was as much a spectacle as the theatre and as vibrant as the circus. In 2010 the same technologies that empower citizen journalism and foster a succession of velvet revolutions feed flaneurs whose streetwalking doesn’t extend beyond a keyboard and a modem. The US and UK have thus seen emergence of gawker services, with new media entrepreneurs attempting to build sustainable businesses by encouraging fans to report the location of celebrities (and ideally provide images of those encounters) for the delectation of people who are web surfing or receiving a tweet (Burns 24). In the age of ambient cameras, where the media are everywhere and nowhere (and micro-stock photoservices challenge agencies such as Magnum), everyone can join the paparazzi. Anyone can deploy that ambient surveillance to become a stalker. The enthusiasm with which fans publish sightings of celebrities will presumably facilitate attacks on bodies rather than images. Information may want to be free but so, inconveniently, do iconoclasts and practitioners of participatory panopticism (Dodge 431; Dennis 348). Rhetoric about ‘citizen journalism’ has been co-opted by ‘old media’, with national broadcasters and commercial enterprises soliciting still images and video from non-professionals, whether for free or on a commercial basis. It is a world where ‘journalists’ are everywhere and where responsibility resides uncertainly at the editorial desk, able to reject or accept offerings from people with cameras but without the industrial discipline formerly exercised through professional training and adherence to formal codes of practice. It is thus unsurprising that South Australia’s Government, echoed by some peers, has mooted anti-gawker legislation aimed at would-be auteurs who impede emergency services by stopping their cars to take photos of bushfires, road accidents or other disasters. The flipside of that iPhone auteurism is anxiety about the public gaze, expressed through moral panics regarding street photography and sexting. Apart from a handful of exceptions (notably photography in the Sydney Opera House precinct, in the immediate vicinity of defence facilities and in some national parks), Australian law does not prohibit ‘street photography’ which includes photographs or videos of streetscapes or public places. Despite periodic assertions that it is a criminal offence to take photographs of people–particularly minors–without permission from an official, parent/guardian or individual there is no general restriction on ambient photography in public spaces. Moral panics about photographs of children (or adults) on beaches or in the street reflect an ambient anxiety in which danger is associated with strangers and strangers are everywhere (Marr 7; Bauman 93). That conceptualisation is one that would delight people who are wholly innocent of Judith Butler or Andrea Dworkin, in which the gaze (ever pervasive, ever powerful) is tantamount to a violation. The reality is more prosaic: most child sex offences involve intimates, rather than the ‘monstrous other’ with the telephoto lens or collection of nastiness on his iPod (Cossins 435; Ingebretsen 190). Recognition of that reality is important in considering moves that would egregiously restrict legitimate photography in public spaces or happy snaps made by doting relatives. An ambient image–unposed, unpremeditated, uncoerced–of an intimate may empower both authors and subjects when little is solid and memory is fleeting. The same caution might usefully be applied in considering alarms about sexting, ie creation using mobile phones (and access by phone or computer monitor) of intimate images of teenagers by teenagers. Australian governments have moved to emulate their US peers, treating such photography as a criminal offence that can be conceptualized as child pornography and addressed through permanent inclusion in sex offender registers. Lifelong stigmatisation is inappropriate in dealing with naïve or brash 12 and 16 year olds who have been exchanging intimate images without an awareness of legal frameworks or an understanding of consequences (Shafron-Perez 432). Cameras may be everywhere among the e-generation but legal knowledge, like the future, is unevenly distributed. Digital Handcuffs Generations prior to 2008 lost themselves in the streets, gaining individuality or personhood by escaping the surveillance inherent in living at home, being observed by neighbours or simply surrounded by colleagues. Streets offered anonymity and autonomy (Simmel 1903), one reason why heterodox sexuality has traditionally been negotiated in parks and other beats and on kerbs where sex workers ply their trade (Dalton 375). Recent decades have seen a privatisation of those public spaces, with urban planning and digital technologies imposing a new governmentality on hitherto ambient ‘deviance’ and on voyeuristic-exhibitionist practice such as heterosexual ‘dogging’ (Bell 387). That governmentality has been enforced through mechanisms such as replacement of traditional public toilets with ‘pods’ that are conveniently maintained by global service providers such as Veolia (the unromantic but profitable rump of former media & sewers conglomerate Vivendi) and function as billboards for advertising groups such as JC Decaux. Faces encountered in the vicinity of the twenty-first century pissoir are thus likely to be those of supermodels selling yoghurt, low interest loans or sportsgear – the same faces sighted at other venues across the nation and across the globe. Visiting ‘the mens’ gives new meaning to the word ambience when you are more likely to encounter Louis Vuitton and a CCTV camera than George Michael. George’s face, or that of Madonna, Barack Obama, Kevin 07 or Homer Simpson, might instead be sighted on the tshirts or hoodies mentioned above. George’s music might also be borne on the bodies of people you see in the park, on the street, or in the bus. This is the age of ambient performance, taken out of concert halls and virtualised on iPods, Walkmen and other personal devices, music at the demand of the consumer rather than as rationed by concert managers (Bull 85). The cost of that ambience, liberation of performance from time and space constraints, may be a Weberian disenchantment (Steiner 434). Technology has also removed anonymity by offering digital handcuffs to employees, partners, friends and children. The same mobile phones used in the past to offer excuses or otherwise disguise the bearer’s movement may now be tied to an observer through location services that plot the person’s movement across Google Maps or the geospatial information of similar services. That tracking is an extension into the private realm of the identification we now take for granted when using taxis or logistics services, with corporate Australia for example investing in systems that allow accurate determination of where a shipment is located (on Sydney Harbour Bridge? the loading dock? accompanying the truck driver on unauthorized visits to the pub?) and a forecast of when it will arrive (Monmonier 76). Such technologies are being used on a smaller scale to enforce digital Fordism among the binary proletariat in corporate buildings and campuses, with ‘smart badges’ and biometric gateways logging an individual’s movement across institutional terrain (so many minutes in the conference room, so many minutes in the bathroom or lingering among the faux rainforest near the Vice Chancellery) (Bolt). Bright Lights, Blog City It is a truth universally acknowledged, at least by right-thinking Foucauldians, that modernity is a matter of coercion and anomie as all that is solid melts into air. If we are living in an age of hypersocialisation and hypercapitalism – movies and friends on tap, along with the panoptic sorting by marketers and pervasive scrutiny by both the ‘information state’ and public audiences (the million people or one person reading your blog) that is an inevitable accompaniment of the digital cornucopia–we might ask whether everyone is or should be unhappy. This article began by highlighting traditional responses to the bright lights, brashness and excitement of the big city. One conclusion might be that in 2010 not much has changed. Some people experience ambient information as liberating; others as threatening, productive of physical danger or of a more insidious anomie in which personal identity is blurred by an ineluctable electro-smog. There is disagreement about the professionalism (for which read ethics and inhibitions) of ‘citizen media’ and about a culture in which, as in the 1920s, audiences believe that they ‘own the image’ embodying the celebrity or public malefactor. Digital technologies allow you to navigate through the urban maze and allow officials, marketers or the hostile to track you. Those same technologies allow you to subvert both the governmentality and governance. You are free: Be ambient! References Baron, Naomi. Always On: Language in an Online and Mobile World. New York: Oxford UP, 2008. Bauman, Zygmunt. Liquid Modernity. Oxford: Polity Press, 2000. Bell, David. “Bodies, Technologies, Spaces: On ‘Dogging’.” Sexualities 9.4 (2006): 387-408. Bennett, Colin. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge: MIT Press, 2008. Berman, Marshall. All That Is Solid Melts into Air: The Experience of Modernity. London: Verso, 2001. Bolt, Nate. “The Binary Proletariat.” First Monday 5.5 (2000). 25 Feb 2010 ‹http://131.193.153.231/www/issues/issue5_5/bolt/index.html›. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge: MIT Press, 1991. Bull, Michael. Sounding Out the City: Personal Stereos and the Management of Everyday Life. Oxford: Berg, 2003. Bull, Michael. Sound Moves: iPod Culture and the Urban Experience. London: Routledge, 2008 Burns, Kelli. Celeb 2.0: How Social Media Foster Our Fascination with Popular Culture. Santa Barbara: ABC-CLIO, 2009. Castells, Manuel. “The Urban Ideology.” The Castells Reader on Cities and Social Theory. Ed. Ida Susser. Malden: Blackwell, 2002. 34-70. Cossins, Anne, Jane Goodman-Delahunty, and Kate O’Brien. “Uncertainty and Misconceptions about Child Sexual Abuse: Implications for the Criminal Justice System.” Psychiatry, Psychology and the Law 16.4 (2009): 435-452. Dalton, David. “Policing Outlawed Desire: ‘Homocriminality’ in Beat Spaces in Australia.” Law & Critique 18.3 (2007): 375-405. De Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California P, 1984. Dennis, Kingsley. “Keeping a Close Watch: The Rise of Self-Surveillance and the Threat of Digital Exposure.” The Sociological Review 56.3 (2008): 347-357. Dodge, Martin, and Rob Kitchin. “Outlines of a World Coming into Existence: Pervasive Computing and the Ethics of Forgetting.” Environment & Planning B: Planning & Design 34.3 (2007): 431-445. Doel, Marcus, and David Clarke. “Transpolitical Urbanism: Suburban Anomaly and Ambient Fear.” Space & Culture 1.2 (1998): 13-36. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. Champaign: U of Illinois P, 1999. Fritzsche, Peter. Reading Berlin 1900. Cambridge: Harvard UP, 1998. Gumpert, Gary, and Susan Drucker. “Privacy, Predictability or Serendipity and Digital Cities.” Digital Cities II: Computational and Sociological Approaches. Berlin: Springer, 2002. 26-40. Hassan, Robert. The Information Society. Cambridge: Polity Press, 2008. Hillier, Bill. “Cities as Movement Economies.” Intelligent Environments: Spatial Aspects of the Information Revolution. Ed. Peter Drioege. Amsterdam: Elsevier, 1997. 295-342. Holmes, David. “Cybercommuting on an Information Superhighway: The Case of Melbourne’s CityLink.” The Cybercities Reader. Ed. Stephen Graham. London: Routledge, 2004. 173-178. Huey, Laura, Kevin Walby, and Aaron Doyle. “Cop Watching in the Downtown Eastside: Exploring the Use of CounterSurveillance as a Tool of Resistance.” Surveillance and Security: Technological Politics and Power in Everyday Life. Ed. Torin Monahan. London: Routledge, 2006. 149-166. Ingebretsen, Edward. At Stake: Monsters and the Rhetoric of Fear in Public Culture. Chicago: U of Chicago P, 2001. iSee. “Now More Than Ever”. 20 Feb 2010 ‹http://www.appliedautonomy.com/isee/info.html›. Jackson, Margaret, and Julian Ligertwood. "Identity Management: Is an Identity Card the Solution for Australia?” Prometheus 24.4 (2006): 379-387. Jermyn, Deborah. Crime Watching: Investigating Real Crime TV. London: IB Tauris, 2007. Kullenberg, Christopher. “The Social Impact of IT: Surveillance and Resistance in Present-Day Conflicts.” FlfF-Kommunikation 1 (2009): 37-40. Lyon, David. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. London: Routledge, 2003. Marr, David. The Henson Case. Melbourne: Text, 2008. Maynard, Margaret. Dress and Globalisation. Manchester: Manchester UP, 2004. Merchant, Carolyn. The Columbia Guide to American Environmental History. New York: Columbia UP, 2002. Monmonier, Mark. “Geolocation and Locational Privacy: The ‘Inside’ Story on Geospatial Tracking’.” Privacy and Technologies of Identity: A Cross-disciplinary Conversation. Ed. Katherine Strandburg and Daniela Raicu. Berlin: Springer, 2006. 75-92. Ndalianis, Angela. “Architecture of the Senses: Neo-Baroque Entertainment Spectacles.” Rethinking Media Change: The Aesthetics of Tradition. Ed. David Thorburn and Henry Jenkins. Cambridge: MIT Press, 2004. 355-374. Parenti, Christian. The Soft Cage: Surveillance in America. New York: Basic Books, 2003. Sayre, Shay. “T-shirt Messages: Fortune or Folly for Advertisers.” Advertising and Popular Culture: Studies in Variety and Versatility. Ed. Sammy Danna. New York: Popular Press, 1992. 73-82. Savitch, Henry. Cities in a Time of Terror: Space, Territory and Local Resilience. Armonk: Sharpe, 2008. Scheingold, Stuart. The Politics of Street Crime: Criminal Process and Cultural Obsession. Philadephia: Temple UP, 1992. Schivelbusch, Wolfgang. Disenchanted Night: The Industrialization of Light in the Nineteenth Century. Berkeley: U of California Press, 1995. Shafron-Perez, Sharon. “Average Teenager or Sex Offender: Solutions to the Legal Dilemma Caused by Sexting.” John Marshall Journal of Computer & Information Law 26.3 (2009): 431-487. Simmel, Georg. “The Metropolis and Mental Life.” Individuality and Social Forms. Ed. Donald Levine. Chicago: University of Chicago P, 1971. Staples, William. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham: Rowman & Littlefield, 2000. Steiner, George. George Steiner: A Reader. New York: Oxford UP, 1987. Thompson, Emily. The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America. Cambridge: The MIT Press, 2004. Wark, Mackenzie. Virtual Geography: Living with Global Media Events. Bloomington: Indiana UP, 1994. Wilson, Elizabeth. The Sphinx in the City: Urban Life, the Control of Disorder and Women. Berkeley: University of California P, 1991. Wood, David. “Towards Spatial Protocol: The Topologies of the Pervasive Surveillance Society.” Augmenting Urban Spaces: Articulating the Physical and Electronic City. Eds. Allesandro Aurigi and Fiorella de Cindio. Aldershot: Ashgate, 2008. 93-106.
APA, Harvard, Vancouver, ISO, and other styles
34

Laforteza, Elaine M. "Prosthetics and the Chronically Ill Body: Living with Type 1 Diabetes and an Insulin Pump." M/C Journal 22, no. 5 (October 9, 2019). http://dx.doi.org/10.5204/mcj.1592.

Full text
Abstract:
Medical prosthetics, such as insulin pumps, are used to augment the management of chronic illnesses, such as Type 1 diabetes (T1D). I was diagnosed at the age of eight with this illness, but the few years before my diagnosis, I was like a huge sponge that was continually squeezed. My bladder was out of control. I peed while marching in a parade at my kindergarten. I let loose on a stranger’s welcome mat because I couldn’t make it to my toilet. Everyone thought it was just a phase, something I would “grow out of”. After about two years, I hadn’t.The easiest thing to blame was my excessive intake of water. I would drink an inordinate amount of water at all hours of the day. In the middle of the night, I would wake up and get myself a glass. Or two. Or three. During these times, my friends were in awe that I could walk alone, without fear, in the dark. For a seven-year-old that was tantamount to being a hero. But the only thing on my mind was the refreshing gush of water.I was a bottomless pit. Any amount of liquid and food that I swallowed seemed to disappear. I rapidly lost weight despite my enormous appetite. A few months after my eighth birthday, my Uncle John, a student doctor at the time, suspected I had diabetes. Although I didn’t know what diabetes was, it seemed like it would change my life forever. I wasn’t ready for change. But with great anxiety, I did the urine test. And it changed my life by saving it. If I hadn’t been diagnosed as having Type One diabetes, I would have died. With this auto-immune illness, the pancreatic cells which secrete a hormone called insulin (used to regulate blood glucose levels) are incapacitated. Consequently, for those who have T1D, external administration of insulin is needed.Fig. 1. Injection.Unlike those with Type 2 diabetes, those with T1D always need insulin injections, regardless of how well they maintain their exercise and dietary regimes. For many, insulin injections are needed. For others, an insulin pump is used to administer insulin in a manner that seeks to mimic a functional, biological pancreas. In this context, an insulin pump is an option used to keep those with T1D alive and can improve how diabetes care proceeds. For instance, in my 28 years of having T1D, I have injected myself with insulin daily to stay alive. In the early years of having the illness, I needed two injections a day. This increased to five insulin injections for two years. The toll this took on my body could be evidenced in scars, bruises and fatty lump deposits from where a syringe had punctured my flesh. However, after transitioning to insulin pump therapy, I only needed to inject myself once every three days, allowing my flesh more time to heal. In this case, insulin pump therapy helped the appearance and health of my skin, while also enabling me to feel more empowered in the face of an incurable illness. This article explores insulin pump usage as a means to manage T1D. In regards to this, the article also asks broader questions: What happens when insulin pump technologies fail? What then happens to the human body that is attached to the pump? How can we speak, write and think about re-organised bodies in which, for example, an internal organ’s pancreatic beta cells (those that secrete insulin), are external to the body and battery operated? Re-Organising the “Whole” BodyAnnemarie Mol and John Law specify, “In western theoretical tradition ‘the body’ is characteristically evoked as the exemplary case of what it is to be whole” (57). Yet, despite this characterisation of a coherent body, the body itself is a “set of tensions” (54). In the context of diabetes, Mol and Law write, “there are tensions between the interests of its various organs. Regulating blood sugar tightly may be good for the arteries, the eyes and the neurons, but since it increases the risk of hypoglycaemia [low blood glucose levels], it is bad for the brain” (54). While one area of the body can benefit, another can simultaneously be compromised. In this context, the body is a site of contradiction and tension that “hangs together” through its incoherence and inconsistency. In the case of T1D, while the pancreatic cells which secrete insulin are destroyed, other cells within the body (and within the pancreas itself) continue to function “normally”. However, this continued “normality” brings heath complications. For instance, the pancreas also releases glucagon, which is the sugar found in the body. As a result of the lack of insulin in T1D, glucagon becomes unmanageable and causes blood glucose levels within the body to rise. The “normal” secretion of glucagon, in this case, produces complications to do with high blood sugar (for example, neuron damage and retinopathy). In this case, insulin pump therapy can be used to compensate for the “normal” and “abnormal” functions of the pancreas. The insulin pump thus attempts to bring the body, as much as possible, to a cohesive whole. However, this cohesiveness is arranged in a manner that pushes those with diabetes to rethink how the body is organised. According to the Juvenile Diabetes Research Foundation (JDRF), an insulin pump is “a small computerised device that delivers a slow continuous level of rapid acting insulin throughout the day. It can be programmed to give more or less insulin when and if required. The insulin is delivered through a tiny tube (cannula) under the skin that is changed every three days”. It is in Section C in the Australian Government Prostheses list.Fig. 2. Insulin pump.The insulin pump is thus a medical prosthetic designed to communicate with the functioning cells within the pancreas, and the rest of the body, in order to keep the body alive. Usually, only one AA or AAA battery is needed to power most insulin pumps. Life hangs on the life span of that battery, and if the pump is on low battery, then one’s body is also in danger of shutting down.The pump is also located on the outside of the body, with a small cannula being the only thing inserted beneath the skin. On the front of the pump is a visual display designed similarly to the appearance of a mobile phone. The display has a “home page” which shows the time, how much insulin is in the pump, as well as the status of the battery (low battery or not). By clicking onto one of the buttons on the pump, the display shows a menu divided into different sections, such as “bolus” (insulin needed when eating or correcting high blood glucose levels), “suspend” (to stop the pump from administering insulin), “basal” (which regulates the continuous amount of insulin administered 24/7), etc. By scrolling onto a specific category, the pump user can access other sub-categories which enable the user to program the pump. The pump makes visible something that is not usually visible, that is, how much insulin is administered into the body. The use of an insulin pump thus reorganises what can and cannot be seen, smelt, touched and heard. With the pump, users connect to insulin in a number of ways that those without diabetes do not. My experiences with the pump enable me to smell the synthetic insulin that courses through my pump’s tubing when it leaks and when I inject myself. With the pump, insulin becomes connected to certain sounds. The pump alarms when the insulin in its reservoir has been depleted. It beeps to signal certain basal rates. Sometimes it beeps for no identifiable reason. Additionally, I relate to the feel of insulin: the puncture of the syringe, the smoothness of the cannula, the tug of the tubing, the weight of the pump itself. Pump users also develop a tactile relationship with insulin through pressing the pump buttons to program how their pump delivers their insulin. This tactility becomes a daily sensation as the pump is attached to its user for most of their sleeping and waking hours. The pump is their bedtime companion, it is there during exercise, and it is there during rest. It becomes a daily reminder of the need to augment oneself in terms of one’s T1D. This is a daily reminder that is disseminated through the information the user programs into the pump and what the pump also displays for its user. For instance, before eating a meal, the pump user can input their blood glucose level (through first pricking their fingertip to extract blood and place this blood onto a test-strip which is inserted into a blood glucose machine), and how many grams of carbohydrates they are going to consume.Fig. 3. Checking blood glucose.A separate device, called a Continuous Glucose Monitor, can also be used in conjunction with the insulin pump to track blood glucose trends. The pump then calculates how much insulin is needed by assessing the user’s blood glucose level and the amount of carbohydrates they will eat/drink. This information is based on prior data the user and/or the user’s doctor has programmed into the pump to determine how sensitive the user is to insulin. In this context, the pump’s information can be accessed and programmed by its user, but this same data can also be seen and programmed by others (e.g. doctors, nurses, anyone who has access to the pump). This intercorporeality can be dangerous as the pump can be manipulated by people who are not even attached to it. Hacking the Insulin Pump and Other Technological limitsBarnaby Jack, a security researcher, “devised an attack that hijacks nearby insulin pumps, enabling him to surreptitiously deliver fatal doses to diabetic patients who rely on them” (Goodin). In this attack, Jack did not have to physically touch the pump or the person attached to it. Instead, Jack designed software and special antenna to communicate with the radio transmitters contained in some insulin pumps. Administering insulin, in this case, is about the communication between technologies, but in such a way that positions the person attached to the pump as a technology themselves. They are packaged in such a way that their body is the site through which radio transmitters, software and antenna can impinge on the life of their body. Consequently, the body, insulin pump technologies and computer software cannot fully function without the other. Thus, while the insulin pump can help with diabetes self-care, it can also put those attached to pumps at risk of being technologically hacked. There are also more limits to wearing the pump. In my experience, this has ranged from my pump malfunctioning (it has administered insulin without stopping) to the tubing which connects me to the pump catching on doors and getting tangled in car seat-belts. In regards to the latter, the way in which I walk into and sit in certain spaces has to be reconfigured in order to account for how well (or not well) the insulin pump can be accommodated. Additionally, being twice pregnant while using the insulin pump provided further complications as to how the pump could stay attached to my stomach as it enlarged. My body thus becomes spatialised in terms of how well my pump can fit into certain spaces without being damaged or without my body feeling any pain from it “getting in the way”. Additionally, while the pump is attached to its user by a cannula, the pump itself needs to clip onto an article of clothing or be placed in a pocket so that it does not dangle or drop to the ground. The need to attach the pump in order to secure it can be annoying. Anna Presswell, a woman with T1D and an insulin pump has written: “It has been 3 years since I was able to sleep pyjama-less. This may not seem like a big deal, but having tried it once in 42 degree heat in Thailand, almost completely tieing [sic] myself up overnight like a cartoon baddy, being tubing free and able to sleep 'al fresco' again, would be devine [sic]” (1). In Presswell’s case, being attached to the pump means that she is also attached to feelings of discomfort and a lack of freedom. She expresses this sense of being restricted through her desire to be “tubing free”. Presswell’s insulin pump is not the only thing that constricts her, but it is ultimately her T1D that inhibits how she can move, feel, and sleep. In this context, while the pump is dominantly used to augment T1D self-care management, it does not erase the reality of having to live with T1D. The pump is a reminder of the illness which no amount of augmentation can cure. In terms of my experience, the pump is a harsh reminder of having T1D, but it also signifies the biomedical advances in treatment and how privileged I am to be attached to such a device. Being connected to my pump means being connected to my body by having awareness of it in medical terms (hypoglycaemia, hyperglycaemia, etc.) and in terms of feeling (feeling “low” or feeling “high” in terms of blood glucose levels). Such awareness manifests in how I program information into the pump and is complicated through the paradoxical feelings of safety, annoyance, frustration and inhibition I, and others, feel about being attached to an insulin pump. This intimate connection between myself and my pump blurs the boundary between where I begin and where the pump ends. As the pump acts as the medium through which I deal with my body (and live in my body), I experience it as a part of my body. This experience necessitates the question I posed earlier: how then do we contend with re-organised bodies, wherein an internal organ’s pancreatic beta cells (those that secrete insulin), are external to the body and battery operated?Soma and techné?The concept of somatechnology may be a useful way to think through this connection between bodies and technologies. This concept of somatechnology emerged through conversations between colleagues in the Department of Critical and Cultural Studies at Macquarie University in 2004 (Pugliese and Stryker 1). These conversations pointed towards an imperative to name the connection between embodied practice and technologies of power, rather than to constitute them as separate and distinct from one another. The term “Somatechnics” was established to meet this need and fused the terms soma (body) and techné (technologies) to illustrate their symbiotic operation. Joseph Pugliese and Susan Stryker attest that the term “Somatechnics” can work as a “shorthand notation for the notion ... that the body is not so much a naturally occurring object that becomes available for representation or cultural interpretation as it is the tangible outcome of historically and culturally specific techniques and modes of embodiment processes” (2). Somatechnics thus point to the dynamic means through which corporealities are constituted through techné that are “continuously engendered in relation to others and to a world” (Sullivan and Murray 3). In this context, everyday belonging to the world becomes constituted through somatechnics, thus illuminating how technologies of power/knowledge become consolidated through embodied practice. Stryker argues that in supplanting the “and” in “embodiment and technology”, somatechnics enables a critique of understanding identity as separate from the technologies that constitute bodily becoming (80). Somatechnics, in this case, becomes the means through which bodies can be seen as “inextricably conjoined with the techniques and technologies (technics) through which bodies are formed and transformed” (Stryker 80). As I’ve specified in another publication, these include both hard and soft technologies that constitute bodily being in the world … hard technologies are normatively slated as the products that are separate from the human body, such as computers and other gadgets. Conversely, soft technologies are normatively considered as techniques that constitute the norms people maintain in order to manage themselves and others. (Laforteza 28)The Greek etymological root of technology, techné, signals both types of technology, phrasing particular importance on the conception of soft technologies. David Rooney specifies that techné “means belonging to the arts, crafts or skill, and is also related to tactics. Therefore, to the ancients, technology was more than ‘gadgets’, it was also … to do with skills, know-how, and the art of doing things; [techné thus comprises] ... knowledge, actions and ‘gadgets’” (3). Rooney further attests that comprehending technologies as an “indissoluble” partnership between the hard and soft provides a comprehensive account of how social orders become technologised. In doing this, Rooney uses Michel Foucault’s conception of technologies (of production, sign-systems, power, and the self) to go beyond a hard/soft and technological/social boundary. The concept of somatechnology goes even further by specifying that social networks and their norms are technologised, and vice-versa. Moreover, the concept of somatechnics argues that this technologisation of society cannot exist outside the body. Here, the normative idea of hard technologies as outside the body is challenged. In context to users of insulin pumps, this enmeshment of soma and techné is brought to the fore through the pump standing in for certain pancreatic cells, to the point that it enables the body to live and “function” as a human body. Simultaneously, the pump is redundant without the input of human agency and the ways in which the user of the pump programs the pump to work. In light of this, the pump “re-organises” the body in such a way that already speaks to the inherent incoherence and inconsistency of the body. Using the pump also engenders the cultivation of norms, roles, rules and assumptions that constitute pump users as specific medicalised bodily beings. Operating the pump thus makes visible the body as technologised and technologies as bodily. The body that is attached to an insulin pump cannot simply be named and understood as soma, but as somatechnology.ConclusionIn terms of having T1D and an insulin pump, the concept of somatechnology can be used as a theoretical framework to investigate the discourses of health and “normality” that inform how users of insulin pumps deal with their diabetes and their bodies. Discourses of health and “normality” involve a preoccupation with augmentation to either fix, cure, treat, and/or maintain the “healthy” and “normal” body. Insulin pumps act in this capacity to augment diabetes care by transcending the limits of the illness, but in such a way that can make users fully aware of such limits. This is because the insulin pump is a prosthetic developed to constitute bodies with T1D as primed for life, not as a body built to decay and die because of its illness. In this case, the insulin pump as a prosthetic is premised on the hope of improving and sustaining a life that is always-already involved with the threat and expectation of diabetes related complications and death. At stake in using a prosthetic device to ‘manage’ the body is the push to understand and make knowable a body that is unknowable, un-mappable, and unpredictable. ReferencesGoodin, Dan. “Insulin Pump Hack Delivers Fatal Dosage over the Air.” The Register, 27 Oct. 2011. 5 Aug. 2019 ‹http://www.theregister.co.uk/2011/10/27/fatal_insulin_pump_attack/›.JDRF. “Insulin Pump Program.” JDRF: Improving Lives, Curing Type 1 Diabetes (2019). 9 Apr. 2019 ‹https://www.jdrf.org.au/type-1-diabetes/insulin-pump-program-faq›.Laforteza, Elaine Marie Carbonell. The Somatechnics of Whiteness and Race: Colonialism and Mestiza Privilege. Surrey: Ashgate, 2015.Mol, Annemarie, and John Law. “Embodied Action, Enacted Bodies. The Example of Hypoglycaemia.” Body & Society 10.2–3 (2004): 43–62.Presswell, Anna. Insulin Independent: Negotiating the Sometimes Rocky Road That Is Type 1 Diabetes Together (7 Jan. 2013). 19 July 2014 ‹http://insulinindependent.blogspot.com.au/2013/01/pumps-selling-points-and-counting-down.html›. Pugliese, Joseph, and Susan Stryker. “Introduction: The Somatechnics of Race and Whiteness.” Social Semiotics – Special Issue: Somatechnics of Race and Whiteness 19.1 (2009): 1–8. Rooney, David. A Contextualising, Socio-Technical Definition of Technology: Learning from Ancient Greece and Foucault. 1996. 10 July 2012.Stryker, Susan. “We Who Are Sexy: Christine Jorgensen‘s Transsexual Whiteness in the Postcolonial Philippines.” Social Semiotics – Special Issue: Somatechnics of Race and Whiteness 19.1 (2009): 79–91.Sullivan, Nikki, and Samantha Murray. “Introduction.” Somatechnics: Queering the Technologisation of Bodies. Eds. Nikki Sullivan and Samantha Murray. England: Ashgate Publishing, 2009. 1–12.
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2750.

Full text
Abstract:
Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. & Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology & Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. <https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html>. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 <https://ieeexplore.ieee.org/document/8699186>. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 <https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/>. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 <https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/>. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media & Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 <https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/>. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 <https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov>. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law & Security Review 36 (2020) 13 Apr. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887>. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.
APA, Harvard, Vancouver, ISO, and other styles
36

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10, no. 6 (April 1, 2008). http://dx.doi.org/10.5204/mcj.2723.

Full text
Abstract:
“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media? How could practice-based approaches inform this research instead of relying on espoused theories-in-use? What new methodologies could be developed for CJ implementation? What role can the “heroic” individual reporter or editor have in “the swarm”? Do the claims about OhmyNews and other sites stand up to longitudinal observation? Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators? How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/>. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 http://www.innosight.com/documents/Theory%20Building.pdf>. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit>. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 http://www.gladwell.com/1997/1997_03_17_a_cool.htm>. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all>. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 http://www.demos.co.uk/publications/proameconomy>. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm>. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out>. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine>. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 http://blog.futurestreetconsulting.com/?p=39>. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973. Citation reference for this article MLA Style Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10.6/11.1 (2008). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0804/10-burns.php>. APA Style Burns, A. (Apr. 2008) "Select Issues with New Media Theories of Citizen Journalism," M/C Journal, 10(6)/11(1). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0804/10-burns.php>.
APA, Harvard, Vancouver, ISO, and other styles
37

Burns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 11, no. 1 (June 1, 2008). http://dx.doi.org/10.5204/mcj.30.

Full text
Abstract:
“Journalists have to begin a new type of journalism, sometimes being the guide on the side of the civic conversation as well as the filter and gatekeeper.” (Kolodzy 218) “In many respects, citizen journalism is simply public journalism removed from the journalism profession.” (Barlow 181) 1. Citizen Journalism — The Latest Innovation? New Media theorists such as Dan Gillmor, Henry Jenkins, Jay Rosen and Jeff Howe have recently touted Citizen Journalism (CJ) as the latest innovation in 21st century journalism. “Participatory journalism” and “user-driven journalism” are other terms to describe CJ, which its proponents argue is a disruptive innovation (Christensen) to the agenda-setting media institutions, news values and “objective” reportage. In this essay I offer a “contrarian” view, informed by two perspectives: (1) a three-stage model of theory-building (Carlile & Christensen) to evaluate the claims made about CJ; and (2) self-reflexive research insights (Etherington) from editing the US-based news site Disinformation between November 1999 and February 2008. New media theories can potentially create “cognitive dissonance” (Festinger) when their explanations of CJ practices are compared with what actually happens (Feyerabend). First I summarise Carlile & Christensen’s model and the dangers of “bad theory” (Ghoshal). Next I consider several problems in new media theories about CJ: the notion of ‘citizen’, new media populism, parallels in event-driven and civic journalism, and mergers and acquisitions. Two ‘self-reflexive’ issues are considered: ‘pro-ams’ or ‘professional amateurs’ as a challenge to professional journalists, and CJ’s deployment in new media operations and production environments. Finally, some exploratory questions are offered for future researchers. 2. An Evaluative Framework for New Media Theories on Citizen Journalism Paul Carlile and Clayton M. Christensen’s model offers one framework with which to evaluate new media theories on CJ. This framework is used below to highlight select issues and gaps in CJ’s current frameworks and theories. Carlile & Christensen suggest that robust theory-building emerges via three stages: Descriptive, Categorisation and Normative (Carlile & Christensen). There are three sub-stages in Descriptive theory-building; namely, the observation of phenomena, inductive classification into schemas and taxonomies, and correlative relationships to develop models (Carlile & Christensen 2-5). Once causation is established, Normative theory evolves through deductive logic which is subject to Kuhnian paradigm shifts and Popperian falsifiability (Carlile & Christensen 6). Its proponents situate CJ as a Categorisation or new journalism agenda that poses a Normative challenged and Kuhnian paradigm shift to traditional journalism. Existing CJ theories jump from the Descriptive phase of observations like “smart mobs” in Japanese youth subcultures (Rheingold) to make broad claims for Categorisation such as that IndyMedia, blogs and wiki publishing systems as new media alternatives to traditional media. CJ theories then underpin normative beliefs, values and worldviews. Correlative relationships are also used to differentiate CJ from the demand side of microeconomic analysis, from the top-down editorial models of traditional media outlets, and to adopt a vanguard stance. To support this, CJ proponents cite research on emergent collective behaviour such as the “wisdom of crowds” hypothesis (Surowiecki) or peer-to-peer network “swarms” (Pesce) to provide scientific justification for their Normative theories. However, further evaluative research is needed for three reasons: the emergent collective behaviour hypothesis may not actually inform CJ practices, existing theories may have “correlation not cause” errors, and the link may be due to citation network effects between CJ theorists. Collectively, this research base also frames CJ as an “ought to” Categorisation and then proceeds to Normative theory-building (Carlile & Christensen 7). However, I argue below that this Categorisation may be premature: its observations and correlative relationships might reinforce a ‘weak’ Normative theory with limited generalisation. CJ proponents seem to imply that it can be applied anywhere and under any condition—a “statement of causality” that almost makes it a fad (Carlile & Christensen 8). CJ that relies on Classification and Normative claims will be problematic without a strong grounding in Descriptive observation. To understand what’s potentially at stake for CJ’s future consider the consider the parallel debate about curricula renewal for the Masters of Business Administration in the wake of high-profile corporate collapses such as Enron, Worldcom, HIH and OneTel. The MBA evolved as a sociological and institutional construct to justify management as a profession that is codified, differentiated and has entry barriers (Khurana). This process might partly explain the pushback that some media professionals have to CJ as one alternative. MBA programs faced criticism if they had student cohorts with little business know-how or experiential learning (Mintzberg). Enron’s collapse illustrated the ethical dilemmas and unintended consequences that occurred when “bad theories” were implemented (Ghoshal). Professional journalists are aware of this: MBA-educated managers challenged the “craft” tradition in the early 1980s (Underwood). This meant that journalism’s ‘self-image’ (Morgan; Smith) is intertwined with managerial anxieties about media conglomerates in highly competitive markets. Ironically, as noted below, Citizen Journalists who adopt a vanguard position vis-a-vis media professionals step into a more complex game with other players. However, current theories have a naïve idealism about CJ’s promise of normative social change in the face of Machiavellian agency in business, the media and politics. 3. Citizen Who? Who is the “citizen” in CJ? What is their self-awareness as a political agent? CJ proponents who use the ‘self-image’ of ‘citizen’ draw on observations from the participatory vision of open source software, peer-to-peer networks, and case studies such as Howard Dean’s 2004 bid for the Democrat Party nominee in the US Presidential election campaign (Trippi). Recent theorists note Alexander Hamilton’s tradition of civic activism (Barlow 178) which links contemporary bloggers with the Federalist Papers and early newspaper pamphlets. One unsurfaced assumption in these observations and correlations is that most bloggers will adopt a coherent political philosophy as informed citizens: a variation on Lockean utilitarianism, Rawlsian liberalism or Nader consumer activism. To date there is little discussion about how political philosophy could deepen CJ’s ‘self-image’: how to critically evaluate sources, audit and investigation processes, or strategies to deal with elites, deterrence and power. For example, although bloggers kept Valerie Plame’s ‘outing’ as a covert intelligence operative highly visible in the issues-attention cycle, it was agenda-setting media like The New York Times who the Bush Administration targeted to silence (Pearlstine). To be viable, CJ needs to evolve beyond a new media populism, perhaps into a constructivist model of agency, norms and social change (Finnemore). 4. Citizen Journalism as New Media Populism Several “precursor trends” foreshadowed CJ notably the mid-1990s interest in “cool-hunting” by new media analysts and subculture marketeers (Gibson; Gladwell). Whilst this audience focus waned with the 1995-2000 dotcom bubble it resurfaced in CJ and publisher Tim O’Reilly’s Web 2.0 vision. Thus, CJ might be viewed as new media populism that has flourished with the Web 2.0 boom. Yet if the boom becomes a macroeconomic bubble (Gross; Spar) then CJ could be written off as a “silver bullet” that ultimately failed to deliver on its promises (Brooks, Jr.). The reputations of uncritical proponents who adopted a “true believer” stance would also be damaged (Hoffer). This risk is evident if CJ is compared with a parallel trend that shares its audience focus and populist view: day traders and technical analysts who speculate on financial markets. This parallel trend provides an alternative discipline in which the populism surfaced in an earlier form (Carlile & Christensen 12). Fidelity’s Peter Lynch argues that stock pickers can use their Main Street knowledge to beat Wall Street by exploiting information asymmetries (Lynch & Rothchild). Yet Lynch’s examples came from the mid-1970s to early 1980s when indexed mutual fund strategies worked, before deregulation and macroeconomic volatility. A change in the Web 2.0 boom might similarly trigger a reconsideration of Citizen Journalism. Hedge fund maven Victor Niederhoffer contends that investors who rely on technical analysis are practicing a Comtean religion (Niederhoffer & Kenner 72-74) instead of Efficient Market Hypothesis traders who use statistical arbitrage to deal with ‘random walks’ or Behavioural Finance experts who build on Amos Tversky and Daniel Kahneman’s Prospect Theory (Kahneman & Tversky). Niederhoffer’s deeper point is that technical analysts’ belief that the “trend is your friend” is no match for the other schools, despite a mini-publishing industry and computer trading systems. There are also ontological and epistemological differences between the schools. Similarly, CJ proponents who adopt a ‘Professional Amateur’ or ‘Pro-Am’ stance (Leadbeater & Miller) may face a similar gulf when making comparisons with professional journalists and the production environments in media organisations. CJ also thrives as new media populism because of institutional vested interests. When media conglomerates cut back on cadetships and internships CJ might fill the market demand as one alternative. New media programs at New York University and others can use CJ to differentiate themselves from “hyperlocal” competitors (Christensen; Slywotzky; Christensen, Curtis & Horn). This transforms CJ from new media populism to new media institution. 5. Parallels: Event-driven & Civic Journalism For new media programs, CJ builds on two earlier traditions: the Event-driven journalism of crises like the 1991 Gulf War (Wark) and the Civic Journalism school that emerged in the 1960s social upheavals. Civic Journalism’s awareness of minorities and social issues provides the character ethic and political philosophy for many Citizen Journalists. Jay Rosen and others suggest that CJ is the next-generation heir to Civic Journalism, tracing a thread from the 1968 Chicago Democratic Convention to IndyMedia’s coverage of the 1999 “Battle in Seattle” (Rosen). Rosen’s observation could yield an interesting historiography or genealogy. Events such as the Southeast Asian tsunami on 26 December 2004 or Al Qaeda’s London bombings on 7 July 2005 are cited as examples of CJ as event-driven journalism and “pro-am collaboration” (Kolodzy 229-230). Having covered these events and Al Qaeda’s attacks on 11th September 2001, I have a slightly different view: this was more a variation on “first responder” status and handicam video footage that journalists have sourced for the past three decades when covering major disasters. This different view means that the “salience of categories” used to justify CJ and “pro-am collaboration” these events does not completely hold. Furthermore, when Citizen Journalism proponents tout Flickr and Wikipedia as models of real-time media they are building on a broader phenomenon that includes CNN’s Gulf War coverage and Bloomberg’s dominance of financial news (Loomis). 6. The Mergers & Acquisitions Scenario CJ proponents often express anxieties about the resilience of their outlets in the face of predatory venture capital firms who initiate Mergers & Acquisitions (M&A) activities. Ironically, these venture capital firms have core competencies and expertise in the event-driven infrastructure and real-time media that CJ aspires to. Sequoia Capital and other venture capital firms have evaluative frameworks that likely surpass Carlile & Christensen in sophistication, and they exploit parallels, information asymmetries and market populism. Furthermore, although venture capital firms such as Union Street Ventures have funded Web 2.0 firms, they are absent from the explanations of some theorists, whose examples of Citizen Journalism and Web 2.0 success may be the result of survivorship bias. Thus, the venture capital market remains an untapped data source for researchers who want to evaluate the impact of CJ outlets and institutions. The M&A scenario further problematises CJ in several ways. First, CJ is framed as “oppositional” to traditional media, yet this may be used as a stratagem in a game theory framework with multiple stakeholders. Drexel Burnham Lambert’s financier Michael Milken used market populism to sell ‘high-yield’ or ‘junk’ bonds to investors whilst disrupting the Wall Street establishment in the late 1980s (Curtis) and CJ could fulfil a similar tactical purpose. Second, the M&A goal of some Web 2.0 firms could undermine the participatory goals of a site’s community if post-merger integration fails. Jason Calacanis’s sale of Weblogs, Inc to America Online in 2005 and MSNBC’s acquisition of Newsvine on 5 October 2007 (Newsvine) might be success stories. However, this raises issues of digital “property rights” if you contribute to a community that is then sold in an M&A transaction—an outcome closer to business process outsourcing. Third, media “buzz” can create an unrealistic vision when a CJ site fails to grow beyond its start-up phase. Backfence.com’s demise as a “hyperlocal” initiative (Caverly) is one cautionary event that recalls the 2000 dotcom crash. The M&A scenarios outlined above are market dystopias for CJ purists. The major lesson for CJ proponents is to include other market players in hypotheses about causation and correlation factors. 7. ‘Pro-Ams’ & Professional Journalism’s Crisis CJ emerged during a period when Professional Journalism faced a major crisis of ‘self-image’. The Demos report The Pro-Am Revolution (Leadbeater & Miller) popularised the notion of ‘professional amateurs’ which some CJ theorists adopt to strengthen their categorisation. In turn, this triggers a response from cultural theorists who fear bloggers are new media’s barbarians (Keen). I concede Leadbeater and Miller have identified an important category. However, how some CJ theorists then generalise from ‘Pro-Ams’ illustrates the danger of ‘weak’ theory referred to above. Leadbeater and Miller’s categorisation does not really include a counter-view on the strengths of professionals, as illustrated in humanistic consulting (Block), professional service firms (Maister; Maister, Green & Galford), and software development (McConnell). The signs of professionalism these authors mention include a commitment to learning and communal verification, mastery of a discipline and domain application, awareness of methodology creation, participation in mentoring, and cultivation of ethical awareness. Two key differences are discernment and quality of attention, as illustrated in how the legendary Hollywood film editor Walter Murch used Apple’s Final Cut Pro software to edit the 2003 film Cold Mountain (Koppelman). ‘Pro-Ams’ might not aspire to these criteria but Citizen Journalists shouldn’t throw out these standards, either. Doing so would be making the same mistake of overconfidence that technical analysts make against statistical arbitrageurs. Key processes—fact-checking, sub-editing and editorial decision-making—are invisible to the end-user, even if traceable in a blog or wiki publishing system, because of the judgments involved. One post-mortem insight from Assignment Zero was that these processes were vital to create the climate of authenticity and trust to sustain a Citizen Journalist community (Howe). CJ’s trouble with “objectivity” might also overlook some complexities, including the similarity of many bloggers to “noise traders” in financial markets and to op-ed columnists. Methodologies and reportage practices have evolved to deal with the objections that CJ proponents raise, from New Journalism’s radical subjectivity and creative non-fiction techniques (Wolfe & Johnson) to Precision Journalism that used descriptive statistics (Meyer). Finally, journalism frameworks could be updated with current research on how phenomenological awareness shapes our judgments and perceptions (Thompson). 8. Strategic Execution For me, one of CJ’s major weaknesses as a new media theory is its lack of “rich description” (Geertz) about the strategic execution of projects. As Disinfo.com site editor I encountered situations ranging from ‘denial of service’ attacks and spam to site migration, publishing systems that go offline, and ensuring an editorial consistency. Yet the messiness of these processes is missing from CJ theories and accounts. Theories that included this detail as “second-order interactions” (Carlile & Christensen 13) would offer a richer view of CJ. Many CJ and Web 2.0 projects fall into the categories of mini-projects, demonstration prototypes and start-ups, even when using a programming language such as Ajax or Ruby on Rails. Whilst the “bootstrap” process is a benefit, more longitudinal analysis and testing needs to occur, to ensure these projects are scalable and sustainable. For example, South Korea’s OhmyNews is cited as an exemplar that started with “727 citizen reporters and 4 editors” and now has “38,000 citizen reporters” and “a dozen editors” (Kolodzy 231). How does OhmyNews’s mix of hard and soft news change over time? Or, how does OhmyNews deal with a complex issue that might require major resources, such as security negotiations between North and South Korea? Such examples could do with further research. We need to go beyond “the vision thing” and look at the messiness of execution for deeper observations and counterintuitive correlations, to build new descriptive theories. 9. Future Research This essay argues that CJ needs re-evaluation. Its immediate legacy might be to splinter ‘journalism’ into micro-trends: Washington University’s Steve Boriss proclaims “citizen journalism is dead. Expert journalism is the future.” (Boriss; Mensching). The half-lives of such micro-trends demand new categorisations, which in turn prematurely feeds the theory-building cycle. Instead, future researchers could reinvigorate 21st century journalism if they ask deeper questions and return to the observation stage of building descriptive theories. In closing, below are some possible questions that future researchers might explore: Where are the “rich descriptions” of journalistic experience—“citizen”, “convergent”, “digital”, “Pro-Am” or otherwise in new media?How could practice-based approaches inform this research instead of relying on espoused theories-in-use?What new methodologies could be developed for CJ implementation?What role can the “heroic” individual reporter or editor have in “the swarm”?Do the claims about OhmyNews and other sites stand up to longitudinal observation?Are the theories used to justify Citizen Journalism’s normative stance (Rheingold; Surowiecki; Pesce) truly robust generalisations for strategic execution or do they reflect the biases of their creators?How could developers tap the conceptual dimensions of information technology innovation (Shasha) to create the next Facebook, MySpace or Wikipedia? References Argyris, Chris, and Donald Schon. Theory in Practice. San Francisco: Jossey-Bass Publishers, 1976. Barlow, Aaron. The Rise of the Blogosphere. Westport, CN: Praeger Publishers, 2007. Block, Peter. Flawless Consulting. 2nd ed. San Francisco, CA: Jossey-Bass/Pfeiffer, 2000. Boriss, Steve. “Citizen Journalism Is Dead. Expert Journalism Is the Future.” The Future of News. 28 Nov. 2007. 20 Feb. 2008 < http://thefutureofnews.com/2007/11/28/citizen-journalism-is-dead- expert-journalism-is-the-future/ >. Brooks, Jr., Frederick P. The Mythical Man-Month: Essays on Software Engineering. Rev. ed. Reading, MA: Addison-Wesley Publishing Company, 1995. Campbell, Vincent. Information Age Journalism: Journalism in an International Context. New York: Arnold, 2004. Carlile, Paul R., and Clayton M. Christensen. “The Cycles of Building Theory in Management Research.” Innosight working paper draft 6. 6 Jan. 2005. 19 Feb. 2008 < http://www.innosight.com/documents/Theory%20Building.pdf >. Caverly, Doug. “Hyperlocal News Site Takes A Hit.” WebProNews.com 6 July 2007. 19 Feb. 2008 < http://www.webpronews.com/topnews/2007/07/06/hyperlocal-news- sites-take-a-hit >. Chenoweth, Neil. Virtual Murdoch: Reality Wars on the Information Superhighway. Sydney: Random House Australia, 2001. Christensen, Clayton M. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, MA: Harvard Business School Press, 1997. Christensen, Clayton M., Curtis Johnson, and Michael Horn. Disrupting Class: How Disruptive Innovation Will Change the Way the World Learns. New York: McGraw-Hill, 2008. Curtis, Adam. The Mayfair Set. London: British Broadcasting Corporation, 1999. Etherington, Kim. Becoming a Reflexive Researcher: Using Ourselves in Research. London: Jessica Kingsley Publishers, 2004. Festinger, Leon. A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press, 1962. Feyerabend, Paul. Against Method. 3rd ed. London: Verso, 1993. Finnemore, Martha. National Interests in International Society. Ithaca, NY: Cornell University Press, 1996. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Ghoshal, Sumantra. “Bad Management Theories Are Destroying Good Management Practices.” Academy of Management Learning & Education 4.1 (2005): 75-91. Gibson, William. Pattern Recognition. London: Viking, 2003. Gladwell, Malcolm. “The Cool-Hunt.” The New Yorker Magazine 17 March 1997. 20 Feb. 2008 < http://www.gladwell.com/1997/1997_03_17_a_cool.htm >. Gross, Daniel. Pop! Why Bubbles Are Great for the Economy. New York: Collins, 2007. Hoffer, Eric. The True Believer. New York: Harper, 1951. Howe, Jeff. “Did Assignment Zero Fail? A Look Back, and Lessons Learned.” Wired News 16 July 2007. 19 Feb. 2008 < http://www.wired.com/techbiz/media/news/2007/07/assignment_ zero_final?currentPage=all >. Kahneman, Daniel, and Amos Tversky. Choices, Values and Frames. Cambridge: Cambridge UP, 2000. Keen, Andrew. The Cult of the Amateur. New York: Doubleday Currency, 2007. Khurana, Rakesh. From Higher Aims to Hired Hands. Princeton, NJ: Princeton UP, 2007. Kolodzy, Janet. Convergence Journalism: Writing and Reporting across the News Media. Oxford: Rowman & Littlefield, 2006. Koppelman, Charles. Behind the Seen: How Walter Murch Edited Cold Mountain Using Apple’s Final Cut Pro and What This Means for Cinema. Upper Saddle River, NJ: New Rider, 2004. Leadbeater, Charles, and Paul Miller. “The Pro-Am Revolution”. London: Demos, 24 Nov. 2004. 19 Feb. 2008 < http://www.demos.co.uk/publications/proameconomy >. Loomis, Carol J. “Bloomberg’s Money Machine.” Fortune 5 April 2007. 20 Feb. 2008 < http://money.cnn.com/magazines/fortune/fortune_archive/2007/04/16/ 8404302/index.htm >. Lynch, Peter, and John Rothchild. Beating the Street. Rev. ed. New York: Simon & Schuster, 1994. Maister, David. True Professionalism. New York: The Free Press, 1997. Maister, David, Charles H. Green, and Robert M. Galford. The Trusted Advisor. New York: The Free Press, 2004. Mensching, Leah McBride. “Citizen Journalism on Its Way Out?” SFN Blog, 30 Nov. 2007. 20 Feb. 2008 < http://www.sfnblog.com/index.php/2007/11/30/940-citizen-journalism- on-its-way-out >. Meyer, Philip. Precision Journalism. 4th ed. Lanham, MD: Rowman & Littlefield, 2002. McConnell, Steve. Professional Software Development. Boston, MA: Addison-Wesley, 2004. Mintzberg, Henry. Managers Not MBAs. San Francisco, CA: Berrett-Koehler, 2004. Morgan, Gareth. Images of Organisation. Rev. ed. Thousand Oaks, CA: Sage, 2006. Newsvine. “Msnbc.com Acquires Newsvine.” 7 Oct. 2007. 20 Feb. 2008 < http://blog.newsvine.com/_news/2007/10/07/1008889-msnbccom- acquires-newsvine >. Niederhoffer, Victor, and Laurel Kenner. Practical Speculation. New York: John Wiley & Sons, 2003. Pearlstine, Norman. Off the Record: The Press, the Government, and the War over Anonymous Sources. New York: Farrar, Straus & Giroux, 2007. Pesce, Mark D. “Mob Rules (The Law of Fives).” The Human Network 28 Sep. 2007. 20 Feb. 2008 < http://blog.futurestreetconsulting.com/?p=39 >. Rheingold, Howard. Smart Mobs: The Next Social Revolution. Cambridge MA: Basic Books, 2002. Rosen, Jay. What Are Journalists For? Princeton NJ: Yale UP, 2001. Shasha, Dennis Elliott. Out of Their Minds: The Lives and Discoveries of 15 Great Computer Scientists. New York: Copernicus, 1995. Slywotzky, Adrian. Value Migration: How to Think Several Moves Ahead of the Competition. Boston, MA: Harvard Business School Press, 1996. Smith, Steve. “The Self-Image of a Discipline: The Genealogy of International Relations Theory.” Eds. Steve Smith and Ken Booth. International Relations Theory Today. Cambridge, UK: Polity Press, 1995. 1-37. Spar, Debora L. Ruling the Waves: Cycles of Discovery, Chaos and Wealth from the Compass to the Internet. New York: Harcourt, 2001. Surowiecki, James. The Wisdom of Crowds. New York: Doubleday, 2004. Thompson, Evan. Mind in Life: Biology, Phenomenology, and the Sciences of Mind. Cambridge, MA: Belknap Press, 2007. Trippi, Joe. The Revolution Will Not Be Televised. New York: ReganBooks, 2004. Underwood, Doug. When MBA’s Rule the Newsroom. New York: Columbia University Press, 1993. Wark, McKenzie. Virtual Geography: Living with Global Media Events. Bloomington IN: Indiana UP, 1994. Wolfe, Tom, and E.W. Johnson. The New Journalism. New York: Harper & Row, 1973.
APA, Harvard, Vancouver, ISO, and other styles
38

Cinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.

Full text
Abstract:
Introduction This article is a study in anxiety with regard to social online spaces (SOS) conceived of as dark. There are two possible ways to define ‘dark’ in this context. The first is that communication is dark because it either has limited distribution, is not open to all users (closed groups are a case example) or hidden. The second definition, linked as a result of the first, is the way that communication via these means is interpreted and understood. Dark social spaces disrupt the accepted top-down flow by the ‘gazing elite’ (data aggregators including social media), but anxious users might need to strain to notice what is out there, and this in turn destabilises one’s reception of the scene. In an environment where surveillance technologies are proliferating, this article examines contemporary, dark, interconnected, and interactive communications for the entangled affordances that might be brought to bear. A provocation is that resistance through counterveillance or “sousveillance” is one possibility. An alternative (or addition) is retreating to or building ‘dark’ spaces that are less surveilled and (perhaps counterintuitively) less fearful. This article considers critically the notion of dark social online spaces via four broad socio-technical concerns connected to the big social media services that have helped increase a tendency for fearful anxiety produced by surveillance and the perceived implications for personal privacy. It also shines light on the aspect of darkness where some users are spurred to actively seek alternative, dark social online spaces. Since the 1970s, public-key cryptosystems typically preserved security for websites, emails, and sensitive health, government, and military data, but this is now reduced (Williams). We have seen such systems exploited via cyberattacks and misappropriated data acquired by affiliations such as Facebook-Cambridge Analytica for targeted political advertising during the 2016 US elections. Via the notion of “parasitic strategies”, such events can be described as news/information hacks “whose attack vectors target a system’s weak points with the help of specific strategies” (von Nordheim and Kleinen-von Königslöw, 88). In accord with Wilson and Serisier’s arguments (178), emerging technologies facilitate rapid data sharing, collection, storage, and processing wherein subsequent “outcomes are unpredictable”. This would also include the effect of acquiescence. In regard to our digital devices, for some, being watched overtly—through cameras encased in toys, computers, and closed-circuit television (CCTV) to digital street ads that determine the resonance of human emotions in public places including bus stops, malls, and train stations—is becoming normalised (McStay, Emotional AI). It might appear that consumers immersed within this Internet of Things (IoT) are themselves comfortable interacting with devices that record sound and capture images for easy analysis and distribution across the communications networks. A counter-claim is that mainstream social media corporations have cultivated a sense of digital resignation “produced when people desire to control the information digital entities have about them but feel unable to do so” (Draper and Turow, 1824). Careful consumers’ trust in mainstream media is waning, with readers observing a strong presence of big media players in the industry and are carefully picking their publications and public intellectuals to follow (Mahmood, 6). A number now also avoid the mainstream internet in favour of alternate dark sites. This is done by users with “varying backgrounds, motivations and participation behaviours that may be idiosyncratic (as they are rooted in the respective person’s biography and circumstance)” (Quandt, 42). By way of connection with dark internet studies via Biddle et al. (1; see also Lasica), the “darknet” is a collection of networks and technologies used to share digital content … not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. As we note from the quote above, the “dark web” uses existing public and private networks that facilitate communication via the Internet. Gehl (1220; see also Gehl and McKelvey) has detailed that this includes “hidden sites that end in ‘.onion’ or ‘.i2p’ or other Top-Level Domain names only available through modified browsers or special software. Accessing I2P sites requires a special routing program ... . Accessing .onion sites requires Tor [The Onion Router]”. For some, this gives rise to social anxiety, read here as stemming from that which is not known, and an exaggerated sense of danger, which makes fight or flight seem the only options. This is often justified or exacerbated by the changing media and communication landscape and depicted in popular documentaries such as The Social Dilemma or The Great Hack, which affect public opinion on the unknown aspects of internet spaces and the uses of personal data. The question for this article remains whether the fear of the dark is justified. Consider that most often one will choose to make one’s intimate bedroom space dark in order to have a good night’s rest. We might pleasurably escape into a cinema’s darkness for the stories told therein, or walk along a beach at night enjoying unseen breezes. Most do not avoid these experiences, choosing to actively seek them out. Drawing this thread, then, is the case made here that agency can also be found in the dark by resisting socio-political structural harms. 1. Digital Futures and Anxiety of the Dark Fear of the darkI have a constant fear that something's always nearFear of the darkFear of the darkI have a phobia that someone's always there In the lyrics to the song “Fear of the Dark” (1992) by British heavy metal group Iron Maiden is a sense that that which is unknown and unseen causes fear and anxiety. Holding a fear of the dark is not unusual and varies in degree for adults as it does for children (Fellous and Arbib). Such anxiety connected to the dark does not always concern darkness itself. It can also be a concern for the possible or imagined dangers that are concealed by the darkness itself as a result of cognitive-emotional interactions (McDonald, 16). Extending this claim is this article’s non-binary assertion that while for some technology and what it can do is frequently misunderstood and shunned as a result, for others who embrace the possibilities and actively take it on it is learning by attentively partaking. Mistakes, solecism, and frustrations are part of the process. Such conceptual theorising falls along a continuum of thinking. Global interconnectivity of communications networks has certainly led to consequent concerns (Turkle Alone Together). Much focus for anxiety has been on the impact upon social and individual inner lives, levels of media concentration, and power over and commercialisation of the internet. Of specific note is that increasing commercial media influence—such as Facebook and its acquisition of WhatsApp, Oculus VR, Instagram, CRTL-labs (translating movements and neural impulses into digital signals), LiveRail (video advertising technology), Chainspace (Blockchain)—regularly changes the overall dynamics of the online environment (Turow and Kavanaugh). This provocation was born out recently when Facebook disrupted the delivery of news to Australian audiences via its service. Mainstream social online spaces (SOS) are platforms which provide more than the delivery of media alone and have been conceptualised predominantly in a binary light. On the one hand, they can be depicted as tools for the common good of society through notional widespread access and as places for civic participation and discussion, identity expression, education, and community formation (Turkle; Bruns; Cinque and Brown; Jenkins). This end of the continuum of thinking about SOS seems set hard against the view that SOS are operating as businesses with strategies that manipulate consumers to generate revenue through advertising, data, venture capital for advanced research and development, and company profit, on the other hand. In between the two polar ends of this continuum are the range of other possibilities, the shades of grey, that add contemporary nuance to understanding SOS in regard to what they facilitate, what the various implications might be, and for whom. By way of a brief summary, anxiety of the dark is steeped in the practices of privacy-invasive social media giants such as Facebook and its ancillary companies. Second are the advertising technology companies, surveillance contractors, and intelligence agencies that collect and monitor our actions and related data; as well as the increased ease of use and interoperability brought about by Web 2.0 that has seen a disconnection between technological infrastructure and social connection that acts to limit user permissions and online affordances. Third are concerns for the negative effects associated with depressed mental health and wellbeing caused by “psychologically damaging social networks”, through sleep loss, anxiety, poor body image, real world relationships, and the fear of missing out (FOMO; Royal Society for Public Health (UK) and the Young Health Movement). Here the harms are both individual and societal. Fourth is the intended acceleration toward post-quantum IoT (Fernández-Caramés), as quantum computing’s digital components are continually being miniaturised. This is coupled with advances in electrical battery capacity and interconnected telecommunications infrastructures. The result of such is that the ontogenetic capacity of the powerfully advanced network/s affords supralevel surveillance. What this means is that through devices and the services that they provide, individuals’ data is commodified (Neff and Nafus; Nissenbaum and Patterson). Personal data is enmeshed in ‘things’ requiring that the decisions that are both overt, subtle, and/or hidden (dark) are scrutinised for the various ways they shape social norms and create consequences for public discourse, cultural production, and the fabric of society (Gillespie). Data and personal information are retrievable from devices, sharable in SOS, and potentially exposed across networks. For these reasons, some have chosen to go dark by being “off the grid”, judiciously selecting their means of communications and their ‘friends’ carefully. 2. Is There Room for Privacy Any More When Everyone in SOS Is Watching? An interesting turn comes through counterarguments against overarching institutional surveillance that underscore the uses of technologies to watch the watchers. This involves a practice of counter-surveillance whereby technologies are tools of resistance to go ‘dark’ and are used by political activists in protest situations for both communication and avoiding surveillance. This is not new and has long existed in an increasingly dispersed media landscape (Cinque, Changing Media Landscapes). For example, counter-surveillance video footage has been accessed and made available via live-streaming channels, with commentary in SOS augmenting networking possibilities for niche interest groups or micropublics (Wilson and Serisier, 178). A further example is the Wordpress site Fitwatch, appealing for an end to what the site claims are issues associated with police surveillance (fitwatch.org.uk and endpolicesurveillance.wordpress.com). Users of these sites are called to post police officers’ identity numbers and photographs in an attempt to identify “cops” that might act to “misuse” UK Anti-terrorism legislation against activists during legitimate protests. Others that might be interested in doing their own “monitoring” are invited to reach out to identified personal email addresses or other private (dark) messaging software and application services such as Telegram (freeware and cross-platform). In their work on surveillance, Mann and Ferenbok (18) propose that there is an increase in “complex constructs between power and the practices of seeing, looking, and watching/sensing in a networked culture mediated by mobile/portable/wearable computing devices and technologies”. By way of critical definition, Mann and Ferenbok (25) clarify that “where the viewer is in a position of power over the subject, this is considered surveillance, but where the viewer is in a lower position of power, this is considered sousveillance”. It is the aspect of sousveillance that is empowering to those using dark SOS. One might consider that not all surveillance is “bad” nor institutionalised. It is neither overtly nor formally regulated—as yet. Like most technologies, many of the surveillant technologies are value-neutral until applied towards specific uses, according to Mann and Ferenbok (18). But this is part of the ‘grey area’ for understanding the impact of dark SOS in regard to which actors or what nations are developing tools for surveillance, where access and control lies, and with what effects into the future. 3. Big Brother Watches, So What Are the Alternatives: Whither the Gazing Elite in Dark SOS? By way of conceptual genealogy, consideration of contemporary perceptions of surveillance in a visually networked society (Cinque, Changing Media Landscapes) might be usefully explored through a revisitation of Jeremy Bentham’s panopticon, applied here as a metaphor for contemporary surveillance. Arguably, this is a foundational theoretical model for integrated methods of social control (Foucault, Surveiller et Punir, 192-211), realised in the “panopticon” (prison) in 1787 by Jeremy Bentham (Bentham and Božovič, 29-95) during a period of social reformation aimed at the improvement of the individual. Like the power for social control over the incarcerated in a panopticon, police power, in order that it be effectively exercised, “had to be given the instrument of permanent, exhaustive, omnipresent surveillance, capable of making all visible … like a faceless gaze that transformed the whole social body into a field of perception” (Foucault, Surveiller et Punir, 213–4). In grappling with the impact of SOS for the individual and the collective in post-digital times, we can trace out these early ruminations on the complex documentary organisation through state-controlled apparatuses (such as inspectors and paid observers including “secret agents”) via Foucault (Surveiller et Punir, 214; Subject and Power, 326-7) for comparison to commercial operators like Facebook. Today, artificial intelligence (AI), facial recognition technology (FRT), and closed-circuit television (CCTV) for video surveillance are used for social control of appropriate behaviours. Exemplified by governments and the private sector is the use of combined technologies to maintain social order, from ensuring citizens cross the street only on green lights, to putting rubbish in the correct recycling bin or be publicly shamed, to making cashless payments in stores. The actions see advantages for individual and collective safety, sustainability, and convenience, but also register forms of behaviour and attitudes with predictive capacities. This gives rise to suspicions about a permanent account of individuals’ behaviour over time. Returning to Foucault (Surveiller et Punir, 135), the impact of this finds a dissociation of power from the individual, whereby they become unwittingly impelled into pre-existing social structures, leading to a ‘normalisation’ and acceptance of such systems. If we are talking about the dark, anxiety is key for a Ministry of SOS. Following Foucault again (Subject and Power, 326-7), there is the potential for a crawling, creeping governance that was once distinct but is itself increasingly hidden and growing. A blanket call for some form of ongoing scrutiny of such proliferating powers might be warranted, but with it comes regulation that, while offering certain rights and protections, is not without consequences. For their part, a number of SOS platforms had little to no moderation for explicit content prior to December 2018, and in terms of power, notwithstanding important anxiety connected to arguments that children and the vulnerable need protections from those that would seek to take advantage, this was a crucial aspect of community building and self-expression that resulted in this freedom of expression. In unearthing the extent that individuals are empowered arising from the capacity to post sexual self-images, Tiidenberg ("Bringing Sexy Back") considered that through dark SOS (read here as unregulated) some users could work in opposition to the mainstream consumer culture that provides select and limited representations of bodies and their sexualities. This links directly to Mondin’s exploration of the abundance of queer and feminist pornography on dark SOS as a “counterpolitics of visibility” (288). This work resulted in a reasoned claim that the technological structure of dark SOS created a highly political and affective social space that users valued. What also needs to be underscored is that many users also believed that such a space could not be replicated on other mainstream SOS because of the differences in architecture and social norms. Cho (47) worked with this theory to claim that dark SOS are modern-day examples in a history of queer individuals having to rely on “underground economies of expression and relation”. Discussions such as these complicate what dark SOS might now become in the face of ‘adult’ content moderation and emerging tracking technologies to close sites or locate individuals that transgress social norms. Further, broader questions are raised about how content moderation fits in with the public space conceptualisations of SOS more generally. Increasingly, “there is an app for that” where being able to identify the poster of an image or an author of an unknown text is seen as crucial. While there is presently no standard approach, models for combining instance-based and profile-based features such as SVM for determining authorship attribution are in development, with the result that potentially far less content will remain hidden in the future (Bacciu et al.). 4. There’s Nothing New under the Sun (Ecclesiastes 1:9) For some, “[the] high hopes regarding the positive impact of the Internet and digital participation in civic society have faded” (Schwarzenegger, 99). My participant observation over some years in various SOS, however, finds that critical concern has always existed. Views move along the spectrum of thinking from deep scepticisms (Stoll, Silicon Snake Oil) to wondrous techo-utopian promises (Negroponte, Being Digital). Indeed, concerns about the (then) new technologies of wireless broadcasting can be compared with today’s anxiety over the possible effects of the internet and SOS. Inglis (7) recalls, here, too, were fears that humanity was tampering with some dangerous force; might wireless wave be causing thunderstorms, droughts, floods? Sterility or strokes? Such anxieties soon evaporated; but a sense of mystery might stay longer with evangelists for broadcasting than with a laity who soon took wireless for granted and settled down to enjoy the products of a process they need not understand. As the analogy above makes clear, just as audiences came to use ‘the wireless’ and later the internet regularly, it is reasonable to argue that dark SOS will also gain widespread understanding and find greater acceptance. Dark social spaces are simply the recent development of internet connectivity and communication more broadly. The dark SOS afford choice to be connected beyond mainstream offerings, which some users avoid for their perceived manipulation of content and user both. As part of the wider array of dark web services, the resilience of dark social spaces is reinforced by the proliferation of users as opposed to decentralised replication. Virtual Private Networks (VPNs) can be used for anonymity in parallel to TOR access, but they guarantee only anonymity to the client. A VPN cannot guarantee anonymity to the server or the internet service provider (ISP). While users may use pseudonyms rather than actual names as seen on Facebook and other SOS, users continue to take to the virtual spaces they inhabit their off-line, ‘real’ foibles, problems, and idiosyncrasies (Chenault). To varying degrees, however, people also take their best intentions to their interactions in the dark. The hyper-efficient tools now deployed can intensify this, which is the great advantage attracting some users. In balance, however, in regard to online information access and dissemination, critical examination of what is in the public’s interest, and whether content should be regulated or controlled versus allowing a free flow of information where users self-regulate their online behaviour, is fraught. O’Loughlin (604) was one of the first to claim that there will be voluntary loss through negative liberty or freedom from (freedom from unwanted information or influence) and an increase in positive liberty or freedom to (freedom to read or say anything); hence, freedom from surveillance and interference is a kind of negative liberty, consistent with both libertarianism and liberalism. Conclusion The early adopters of initial iterations of SOS were hopeful and liberal (utopian) in their beliefs about universality and ‘free’ spaces of open communication between like-minded others. This was a way of virtual networking using a visual motivation (led by images, text, and sounds) for consequent interaction with others (Cinque, Visual Networking). The structural transformation of the public sphere in a Habermasian sense—and now found in SOS and their darker, hidden or closed social spaces that might ensure a counterbalance to the power of those with influence—towards all having equal access to platforms for presenting their views, and doing so respectfully, is as ever problematised. Broadly, this is no more so, however, than for mainstream SOS or for communicating in the world. References Bacciu, Andrea, Massimo La Morgia, Alessandro Mei, Eugenio Nerio Nemmi, Valerio Neri, and Julinda Stefa. “Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.” CLEF (Working Notes). Lugano, Switzerland, 9-12 Sep. 2019. Bentham, Jeremy, and Miran Božovič. The Panopticon Writings. London: Verso Trade, 1995. Biddle, Peter, et al. “The Darknet and the Future of Content Distribution.” Proceedings of the 2002 ACM Workshop on Digital Rights Management. Vol. 6. Washington DC, 2002. Bruns, Axel. Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. New York: Peter Lang, 2008. Chenault, Brittney G. “Developing Personal and Emotional Relationships via Computer-Mediated Communication.” CMC Magazine 5.5 (1998). 1 May 2020 <http://www.december.com/cmc/mag/1998/may/chenault.html>. Cho, Alexander. “Queer Reverb: Tumblr, Affect, Time.” Networked Affect. Eds. K. Hillis, S. Paasonen, and M. Petit. Cambridge, Mass.: MIT Press, 2015: 43-58. Cinque, Toija. Changing Media Landscapes: Visual Networking. London: Oxford UP, 2015. ———. “Visual Networking: Australia's Media Landscape.” Global Media Journal: Australian Edition 6.1 (2012): 1-8. Cinque, Toija, and Adam Brown. “Educating Generation Next: Screen Media Use, Digital Competencies, and Tertiary Education.” Digital Culture & Education 7.1 (2015). Draper, Nora A., and Joseph Turow. “The Corporate Cultivation of Digital Resignation.” New Media & Society 21.8 (2019): 1824-1839. Fellous, Jean-Marc, and Michael A. Arbib, eds. Who Needs Emotions? The Brain Meets the Robot. New York: Oxford UP, 2005. Fernández-Caramés, Tiago M. “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.” IEEE Internet of Things Journal 7.7 (2019): 6457-6480. Foucault, Michel. Surveiller et Punir: Naissance de la Prison [Discipline and Punish—The Birth of The Prison]. Trans. Alan Sheridan. New York: Random House, 1977. Foucault, Michel. “The Subject and Power.” Michel Foucault: Power, the Essential Works of Michel Foucault 1954–1984. Vol. 3. Trans. R. Hurley and others. Ed. J.D. Faubion. London: Penguin, 2001. Gehl, Robert W. Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. Cambridge, Massachusetts: MIT Press, 2018. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219-235. Gillespie, Tarleton. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. London: Yale UP, 2018. Habermas, Jürgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society. Trans. Thomas Burger with the assistance of Frederick Lawrence. Cambridge, Mass.: MIT Press, 1989. Inglis, Ken S. This Is the ABC: The Australian Broadcasting Commission 1932–1983. Melbourne: Melbourne UP, 1983. Iron Maiden. “Fear of the Dark.” London: EMI, 1992. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. Lasica, J. D. Darknet: Hollywood’s War against the Digital Generation. New York: John Wiley and Sons, 2005. Mahmood, Mimrah. “Australia's Evolving Media Landscape.” 13 Apr. 2021 <https://www.meltwater.com/en/resources/australias-evolving-media-landscape>. Mann, Steve, and Joseph Ferenbok. “New Media and the Power Politics of Sousveillance in a Surveillance-Dominated World.” Surveillance & Society 11.1/2 (2013): 18-34. McDonald, Alexander J. “Cortical Pathways to the Mammalian Amygdala.” Progress in Neurobiology 55.3 (1998): 257-332. McStay, Andrew. Emotional AI: The Rise of Empathic Media. London: Sage, 2018. Mondin, Alessandra. “‘Tumblr Mostly, Great Empowering Images’: Blogging, Reblogging and Scrolling Feminist, Queer and BDSM Desires.” Journal of Gender Studies 26.3 (2017): 282-292. Neff, Gina, and Dawn Nafus. Self-Tracking. Cambridge, Mass.: MIT Press, 2016. Negroponte, Nicholas. Being Digital. New York: Alfred A. Knopf, 1995. Nissenbaum, Helen, and Heather Patterson. “Biosensing in Context: Health Privacy in a Connected World.” Quantified: Biosensing Technologies in Everyday Life. Ed. Dawn Nafus. 2016. 68-79. O’Loughlin, Ben. “The Political Implications of Digital Innovations.” Information, Communication and Society 4.4 (2001): 595–614. Quandt, Thorsten. “Dark Participation.” Media and Communication 6.4 (2018): 36-48. Royal Society for Public Health (UK) and the Young Health Movement. “#Statusofmind.” 2017. 2 Apr. 2021 <https://www.rsph.org.uk/our-work/campaigns/status-of-mind.html>. Statista. “Number of IoT devices 2015-2025.” 27 Nov. 2020 <https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>. Schwarzenegger, Christian. “Communities of Darkness? Users and Uses of Anti-System Alternative Media between Audience and Community.” Media and Communication 9.1 (2021): 99-109. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Anchor, 1995. Tiidenberg, Katrin. “Bringing Sexy Back: Reclaiming the Body Aesthetic via Self-Shooting.” Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8.1 (2014). The Great Hack. Dirs. Karim Amer, Jehane Noujaim. Netflix, 2019. The Social Dilemma. Dir. Jeff Orlowski. Netflix, 2020. Turkle, Sherry. The Second Self: Computers and the Human Spirit. Cambridge, Mass.: MIT Press, 2005. Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. UK: Hachette, 2017. Turow, Joseph, and Andrea L. Kavanaugh, eds. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. Cambridge, Mass.: MIT Press, 2003. Von Nordheim, Gerret, and Katharina Kleinen-von Königslöw. “Uninvited Dinner Guests: A Theoretical Perspective on the Antagonists of Journalism Based on Serres’ Parasite.” Media and Communication 9.1 (2021): 88-98. Williams, Chris K. “Configuring Enterprise Public Key Infrastructures to Permit Integrated Deployment of Signature, Encryption and Access Control Systems.” MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005. Wilson, Dean, and Tanya Serisier. “Video Activism and the Ambiguities of Counter-Surveillance.” Surveillance & Society 8.2 (2010): 166-180.
APA, Harvard, Vancouver, ISO, and other styles
39

Wishart, Alison. "Make It So: Harnessing Technology to Provide Professional Development to Regional Museum Workers." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1519.

Full text
Abstract:
IntroductionIn regional Australia and New Zealand, museums and art galleries are increasingly becoming primary sites of cultural engagement. They are one of the key tourist attractions for regional towns and expected to generate much needed tourism revenue. In 2017 in New South Wales alone, there were three million visitors to regional galleries and museums (MGNSW 13). However, apart from those (partially) funded by local councils, they are often run on donations, good will, and the enthusiasm of volunteers. Regional museums and galleries provide some paid, and more unpaid, employment for ageing populations. While two-thirds of Australia’s population lives in capital cities, the remainder who live in regional towns are likely to be in the 60+ age cohort because people are choosing to retire away from the bustling, growing cities (ABS). At last count, there were about 3000 museums and galleries in Australia with about 80% of them located in regional areas (Scott). Over the last 40 years, this figure has tripled from the 1000 regional and provincial museums estimated by Peter Piggott in his 1975 report (24). According to a 2014 survey (Shaw and Davidson), New Zealand has about 470 museums and galleries and about 70% are located outside capital cities. The vast majority, 85%, have less than five, full-time paid staff, and more than half of these were run entirely by ageing volunteers. They are entrusted with managing the vast majority of the history and heritage collections of Australia and New Zealand. These ageing volunteers need a diverse range of skills and experience to care for and interpret collections. How do you find the time and budget for professional development for both paid staff and volunteers? Many professional development events are held in capital cities, which are often a significant distance from the regional museum—this adds substantially to the costs of attending and the time commitment required to get there. In addition, it is not uncommon for people working in regional museums to be responsible for everything—from security, collection management, conservation, research, interpretation and public programs to changing the light bulbs. While there are a large number of resources available online, following a manual is often more difficult than learning from other colleagues or learning in a more formal educational or vocational environment where you can receive timely feedback on your work. Further, a foundational level of prior knowledge and experience is often required to follow written instructions. This article will suggest some strategies for low cost professional development and networking. It involves planning, thinking strategically and forming partnerships with others in the region. It is time to harness the power of modern communications technology and use it as a tool for professional development. Some models of professional development in regional areas that have been implemented in the past will also be reviewed. The focus for this article is on training and professional development for workers in regional museums, heritage sites and keeping places. Regional art galleries have not been included because they tend to have separate regional networks and training opportunities. For example, there are professional development opportunities provided through the Art Galleries Association of Australia and their state branches. Regional galleries are also far more likely to have one or more paid staff members (Winkworth, “Fixing the Slums” 2). Regional Museums, Volunteers, and Social CapitalIt is widely accepted that regional museums and galleries enhance social capital and reduce social isolation (Kelly 32; Burton and Griffin 328). However, while working in a regional museum or gallery can help to build friendship networks, it can also be professionally isolating. How do you benchmark what you do against other places if you are two or more hours drive from those places? How do you learn from other colleagues if all your colleagues are also isolated by the ‘tyranny of distance’ and struggling with the same lack of access to training? In 2017 in New South Wales alone, there were 8,629 active volunteers working in regional museums and galleries giving almost five million hours, which Museums and Galleries NSW calculated was worth over $150 million per annum in unpaid labour (MGNSW 1). Providing training and professional development to this group is an investment in Australia’s social and cultural capital.Unlike other community-run groups, the museums and heritage places which have emerged in regional Australia and New Zealand are not part of a national or state branch network. Volunteers who work for the Red Cross, Scouts or Landcare benefit from being part of a national organisation which provides funding, support workers, a website, governance structure, marketing, political advocacy and training (Winkworth, “Let a Thousand Flowers” 11). In Australia and New Zealand, this role is undertaken by the Australian Museums and Galleries Association AMaGA (formerly Museums Australia) and Museums Aotearoa respectively. However, both of these groups operate at the macro policy level, for example organising annual conferences, publishing a journal and developing Indigenous policy frameworks, rather than the local, practical level. In 1995, due to their advocacy work, Landcare Australia received $500 million over five years from the federal government to fund 5000 Landcare groups, which are run by 120,000 volunteers (Oppenheimer 177). They argued successfully that the sustainable development of land resources started at the local level. What do we need to do to convince government of the need for sustainable development of our local and regional museum and heritage resources?Training for Volunteers Working in Regional Museums: The Current SituationAnother barrier to training for regional museum workers is the assumption that the 70:20:10 model of professional development should apply. That is, 70% of one’s professional development is done ‘on the job’ by completing tasks and problem-solving; 20% is achieved by learning from mentors, coaches and role models and 10% is learnt from attending conferences and symposia and enrolling in formal courses of study. However, this model pre-supposes that there are people in your workplace whom you can learn from and who can show you how to complete a task, and that you are not destroying or damaging a precious, unique object if you happen to make a mistake.Some museum volunteers come with skills in research, marketing, administration, customer service or photography, but very few come with specific museum skills like writing exhibition text, registering an acquisition or conserving artefacts. These skills need to be taught. As Kylie Winkworth has written, museum management now requires a [...] skills set, which is not so readily found in small communities, and which in many ways is less rewarding for the available volunteers, who may have left school at 15. We do not expect volunteer librarians to catalogue books, which are in any case of low intrinsic value, but we still expect volunteers in their 70s and 80s to catalogue irreplaceable heritage collections and meet ever more onerous museum standards. That so many volunteers manage to do this is extraordinary. (“Let a Thousand Flowers” 13)Workers in regional museums are constantly required to step outside their comfort zones and learn new skills with minimal professional support. While these challenging experiences can be very rewarding, they are also potentially damaging for our irreplaceable material cultural heritage.Training for museum professionals has been on the agenda of the International Council of Museums (ICOM) since 1947 (Boylan 62). However, until 1996, their work focused on recommending curricula for new museum professionals and did not include life-long learning and on-going professional development. ICOM’s International Committee for the Training of Personnel (ICTOP) and the ICOM Executive has responded to this in their new curricula—ICOM Curricula Guidelines for Professional Museum Development, but this does not address the difficulties staff or volunteers working in regional areas face in accessing training.In some parts of Australia, there are regional support and professional development programs in place. For example, in Queensland, there is the Museum Development Officer (MDO) network. However, because of the geographic size of the state and the spread of the museums, these five regionally based staff often have 60-80 museums or keeping places in their region needing support and so their time and expertise is spread very thinly. It is also predominantly a fee-for-service arrangement. That is, the museums have to pay for the MDO to come and deliver training. Usually this is done by the MDO working with a local museum to apply for a Regional Arts Development Fund (RADF) grant. In Victoria there is a roving curator program where eligible regional museums can apply to have a professional curator come and work with them for a few days to help the volunteers curate exhibitions. The roving curator can also provide advice on “develop[ing] high quality exhibitions for diverse audiences” via email, telephone and networking events. Tasmania operates a similar scheme but their two roving curators are available for up to 25 days of work each year with eligible museums, provided the local council makes a financial contribution. The New South Wales government supports the museum advisor program through which a museum professional will come to your museum for up to 20 days/year to give advice and hands-on training—provided your local council pays $7000, an amount that is matched by the state government—for this service. In 2010, in response to recommendations in the Dunn Report (2007), the Collections Council of Australia (CCA) established a pilot project with the City of Kalgoorlie-Boulder in Western Australia and $120,000 in funding from the Myer Foundation to trial the provision of a paid Collections Care Coordinator who would provide free training, expertise and support to local museums in the region. Tragically, CCA was de-funded by the Cultural Ministers Council the same year and the roll-out of a hub and spoke regional model was not supported by government due to the lack of an evidence base (Winkworth, “Let a Thousand Flowers” 18). An evaluation of the trial project would have tested a different model of regional training and added to the evidence base.All these state-based models (except the aborted Collections Care hub in Western Australia) require small regional museums to compete with each other for access to a museum professional and to successfully apply for funding, usually from their local council or state government. If they are successful, the training that is delivered is a one-off, as they are unlikely to get a second slice of the regional pie.An alternative to this competitive, fly-in fly-out, one-off model of professional development is to harness the technology and resources of local libraries and other cultural facilities in regional areas. This is what the Sydney Opera House Trust did in March 2019 to deliver their All about Women program of speakers via live streaming to 37 satellite sites throughout Australia and New Zealand.Harnessing Technology and Using Regional Library Infrastructure to Provide Training: ScenarioImagine the following scenario. It is a Monday morning in a regional library in Dubbo, New South Wales. Dubbo is 391 km or five hours drive by car from the nearest capital city (Sydney) and there are 50 regional museums within a 100 km radius. Ten people are gathered in a meeting room at the library watching a live stream of the keynote speakers who are presenting at their national museums conference. They are from five regional museums where they work as volunteers or part-time paid staff. They cannot afford to pay $2000, or more, to attend the conference, but they are happy to self-fund to drive for an hour or two to link up with other colleagues to listen to the presentations. They make notes and tweet in their questions using the conference twitter handle and hashtag. They have not been exposed to international speakers in the industry before and the ideas presented are fresh and stimulating. When the conference breaks for morning tea, they take a break too and get to know each other over a cuppa (provided free of charge by the library). Just as the networking sessions at conferences are vitally important for the delegates, they are even more important to address social isolation amongst this group. When they reconvene, they discuss their questions and agree to email the presenters with the questions that are unresolved. After the conference keynote sessions finish, the main conference (in the capital city) disperses into parallel sessions, which are no longer available via live stream.To make the two-hour drive more worthwhile and continue their professional development, they have arranged to hold a significance assessment workshop as well. Each museum worker has brought along photographs of one item in their collection that they want to do more research on. Some of them have also brought the object, if it is small and robust enough to travel. They have downloaded copies of Significance 2.0 and read it before they arrived. They started to write significance reports but could not fully understand how to apply some of the criteria. They cannot afford to pay for professional workshop facilitators, but they have arranged for the local studies librarian to give them an hour of free training on using the library’s resources (online and onsite) to do research on the local area and local families. They learn more about Trove, Papers Past and other research tools which are available online. This is hands-on and computer-based skills training using their own laptops/tablets or the ones provided by the library. After the training with the librarian, they break into two groups and read each other’s significance reports and make suggestions. The day finishes with a cuppa at 2.30pm giving them time to drive home before the sun sets. They agree to exchange email addresses so they can keep in touch. All the volunteers and staff who attended these sessions in regional areas feel energised after these meetings. They no longer feel so isolated and like they are working in the dark. They feel supported just knowing that there are other people who are struggling with the same issues and constraints as they are. They are sick of talking about the lack of budget, expertise, training and resources and want to do something with what they have.Bert (fictional name) decides that it is worth capitalising on this success. He emails the people who came to the session in Dubbo to ask them if they would like to do it again but focus on some different training needs. He asks them to choose two of the following three professional development options. First, they can choose to watch and discuss a recording of the keynote presentations from day two of the recent national conference. The conference organisers have uploaded digital recordings of the speakers’ presentations and the question time to the AMaGA website. This is an option for local libraries that do not have sufficient bandwidth to live stream video. The local library technician will help them cast the videos to a large screen. Second, they can each bring an object from their museum collection that they think needs conservation work. If the item is too fragile or big to move, they will bring digital photographs of it instead. Bert consulted their state-based museum and found some specialist conservators who have agreed to Skype or Facetime them in Dubbo free of charge, to give them expert advice about how to care for their objects, and most importantly, what not to do. The IT technician at Dubbo Library can set up their meeting room so that they can cast the Skype session onto a large smart screen TV. One week before the event, they will send a list of their objects and photographs of them to the conservator so that she can prepare, and they can make best use of her time. After this session, they will feel more confident about undertaking small cleaning and flattening treatments and know when they should not attempt a treatment themselves and need to call on the experts. Third, they could choose to have a training session with the council’s grants officer on writing grant applications. As he assesses grant applications, he can tell them what local councils look for in a successful grant application. He can also inform them about some of the grants that might be relevant to them. After the formal training, there will be an opportunity for them to exchange information about the grants they have applied for in the past—sometimes finding out what’s available can be difficult—and work in small groups to critique each other’s grant applications.The group chooses options two and three, as they want more practical skills development. They take a break in the middle of the day for lunch, which gives them the opportunity to exchange anecdotes from their volunteer work and listen to and support each other. They feel validated and affirmed. They have gained new skills and don’t feel so isolated. Before they leave, Alice agrees to get in touch with everyone to organise their next regional training day.Harnessing Technology and Using Regional Library Infrastructure to Provide Training: BenefitsThese scenarios need not be futuristic. The training needs are real, as is the desire to learn and the capacity of libraries to support regional groups. While funding for regional museums has stagnated or declined in recent years, libraries have been surging ahead. In August 2018, the New South Wales Government announced an “historic investment” of $60 million into all 370 public libraries that would “transform the way NSW’s public libraries deliver much-needed services, especially in regional areas” (Smith). Libraries are equipped and charged with the responsibility of enabling local community groups to make best use of their resources. Most state and national museum workers are keen to share their expertise with their regional colleagues: funding and distance are often the only barriers. These scenarios allow national conference keynote speakers to reach a much larger audience than the conference attendees. While this strategy might reduce the number of workers from regional areas who pay to attend conferences, the reality is that due to distance, other volunteer commitments, expense and family responsibilities, they probably would not attend anyway. Most regional museums and galleries and their staff might be asset-rich, but they are cash-poor, and the only way their workers get to attend conferences is if they win a bursary or grant. In 2005, Winkworth said: “the future for community museums is to locate them within local government as an integral part of the cultural, educational and economic infrastructure of the community, just like libraries and galleries” (“Fixing the Slums” 7). Fourteen years on, very little progress has been made in this direction. Those museums which have been integrated into the local council infrastructure, such as at Orange and Wagga Wagga in western New South Wales, are doing much better than those that are still stuck in ‘cultural poverty’ and trying to operate independently.However, the co-location and convergence of museums, libraries and archives is only successful if it is well managed. Helena Robinson has examined the impact on museum collection management and interpretation of five local government funded, converged collecting institutions in Australia and New Zealand and found that the process is complex and does not necessarily result in “optimal” cross-disciplinary expertise or best practice outcomes (14158).ConclusionRobinson’s research, however, did not consider community-based collecting institutions using regional libraries as sites for training and networking. By harnessing local library resources and making better use of existing communications technology it is possible to create regional hubs for professional development and collegiate support, which are not reliant on grants. If the current competitive, fly-in fly-out, self-funded model of providing professional development and support to regional museums continues, then the future for our cultural heritage collections and the dedicated volunteers who care for them is bleak. Alternatively, the scenarios I have described give regional museum workers agency to address their own professional development needs. This in no way removes the need for leadership, advocacy and coordination by national representative bodies such as AMaGA and Museums Aotearoa. If AMaGA partnered with the Australian Library and Information Association (ALIA) to stream their conference keynote sessions to strategically located regional libraries and used some of their annual funding from the Department of Communication and the Arts to pay for museum professionals to travel to some of those sites to deliver training, they would be investing in the nation’s social and cultural capital and addressing the professional development needs of regional museum workers. This would also increase the sustainability of our cultural heritage collections, which are valuable economic assets.ReferencesAustralian Bureau of Statistics. “2071.0—Census of Population and Housing: Reflecting Australia—Snapshot of Australia, 2016”. Canberra: Australian Bureau of Statistics, 2017. 17 Mar. 2019 <https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by%20Subject/2071.0~2016~Main%20Features~Snapshot%20of%20Australia,%202016~2>.Boylan, Patrick. “The Intangible Heritage: A Challenge and an Opportunity for Museums and Museum Professional Training.” International Journal of Intangible Heritage 1 (2006): 53–65.Burton, Christine, and Jane Griffin. “More than a Museum? Understanding How Small Museums Contribute to Social Capital in Regional Communities.” Asia Pacific Journal of Arts & Cultural Management 5.1 (2008): 314–32. 17 Mar. 2019 <http://apjacm.arts.unimelb.edu.au/article/view/32>.Dunn, Anne. The Dunn Report: A Report on the Concept of Regional Collections Jobs. Adelaide: Collections Council of Australia, 2007.ICOM Curricula Guidelines for Professional Museum Development. 2000. <http://museumstudies.si.edu/ICOM-ICTOP/comp.htm>.Kelly, Lynda. “Measuring the Impact of Museums on Their Communities: The Role of the 21st Century Museum.” New Roles and Issues of Museums INTERCOM Symposium (2006): 25–34. 17 Mar. 2019 <https://media.australianmuseum.net.au/media/dd/Uploads/Documents/9355/impact+paper+INTERCOM+2006.bb50ba1.pdf>.Museums and Galleries New South Wales (MGNSW). 2018 NSW Museums and Galleries Sector Census. Museums and Galleries of New South Wales. Data and Insights—Culture Counts. Sydney: MGNSW, 2019. 17 Mar. 2019 <https://mgnsw.org.au/wp-content/uploads/2019/02/2018-NSW-Museum-Gallery-Sector-Census.pdf>Oppenheimer, Melanie. Volunteering: Why We Can’t Survive without It. Sydney: U of New South Wales P, 2008.Pigott, Peter. Museums in Australia 1975. Report of the Committee of Inquiry on Museums and National Collections Including the Report of the Planning Committee on the Gallery of Aboriginal Australia. Canberra: Australian Government Printing Service, 1975. 17 Mar. 2019 <https://apo.org.au/node/35268>.Public Sector Commission, Western Australia. 70:20:10 Framework Learning Philosophy. Perth: Government of Western Australia, 2018. 17 Mar. 2019 <https://publicsector.wa.gov.au/centre-public-sector-excellence/about-centre/702010-framework>.Robinson, Helena. “‘A Lot of People Going That Extra Mile’: Professional Collaboration and Cross-Disciplinarity in Converged Collecting Institutions.” Museum Management and Curatorship 31 (2016): 141–58.Scott, Lee. National Operations Manager, Museums Australia, Personal Communication. 22 Oct. 2018.Shaw, Iain, and Lee Davidson, Museums Aotearoa 2014 Sector Survey Report. Wellington: Victoria U, 2014. 17 Mar. 2019 <http://www.museumsaotearoa.org.nz/sites/default/files/documents/museums_aotearoa_sector_survey_2014_report_-_final_draft_oct_2015.pdf>.Smith, Alexandra. “NSW Libraries to Benefit from $60 Million Boost.” Sydney Morning Herald 24 Aug. 2018. 17 Mar. 2019 <https://www.smh.com.au/politics/nsw/nsw-libraries-to-benefit-from-60-million-boost-20180823-p4zzdj.html>. Winkworth, Kylie. “Fixing the Slums of Australian Museums; or Sustaining Heritage Collections in Regional Australia.” Museums Australia Conference Paper. Canberra: Museums Australia, 2005. ———. “Let a Thousand Flowers Bloom: Museums in Regional Australia.” Understanding Museums—Australian Museums and Museology. Eds. Des Griffin and Leon Paroissien. Canberra: National Museum of Australia, 2011. 17 Mar. 2019 <https://nma.gov.au/research/understanding-museums/KWinkworth_2011.html>.
APA, Harvard, Vancouver, ISO, and other styles
40

Mudie, Ella. "Unbuilding the City: Writing Demolition." M/C Journal 20, no. 2 (April 26, 2017). http://dx.doi.org/10.5204/mcj.1219.

Full text
Abstract:
IntroductionUtopian and forward looking in tenor, official narratives of urban renewal and development implicitly promote normative ideals of progress and necessary civic improvement. Yet an underlying condition of such renewal is frequently the very opposite of building: the demolition of existing urban fabric. Taking as its starting point the large-scale demolition of buildings proposed for the NSW Government’s Sydney Metro rail project, this article interrogates the role of literary treatments of demolition in mediating complex, and often contradictory, responses to transformations of the built environment. Case studies are drawn from literary texts in which demolition and infrastructure development are key preoccupations, notably Louis Aragon’s 1926 Surrealist document of a threatened Parisian arcade, Paris Peasant, and the non-fiction accounts of the redevelopment of London’s East End by British writer Iain Sinclair. Sydney UnbuiltPresently, Australia’s biggest public transport project according to the NSW Government website, the Sydney Metro is set to revolutionise Sydney’s rail future with more than 30 metro stations and a fleet of fully-automated driverless trains. Its impetus extends at least as far back as the Liberal-National Coalition’s landslide win at the 2011 New South Wales state election when Barry O’Farrell, then party leader, declared “NSW has to be rebuilt” (qtd in Aston). Infrastructure upgrades became one of the Coalition’s key priorities upon forming government. Following a second Coalition win at the 2015 election, the state of NSW, or the city of Sydney more accurately, remains today deep amidst widespread building works with an unprecedented number of infrastructure, development and urban renewal projects simultaneously underway.From an historical perspective, Sydney is certainly no stranger to demolition. This was in evidence in Demolished Sydney, an exhibition at the Museum of Sydney that captured the zeitgeist of 2016 with its historical survey of Sydney’s demolished architecture. As the exhibition media release pointed out: “Since 1788 Sydney has been built, unbuilt and rebuilt as it has grown from Georgian town to Victorian city to the global urban centre it is today” (Museum of Sydney). What this evolutionist narrative glosses over, however, is the extent to which the impact of Sydney’s significant reinventions of itself through large-scale redevelopment are often not properly registered until well after such changes have taken place. With the imminent commencement of Sydney Metro Stage 2 CBD works, the city similarly stands to lose a number of buildings that embody the civic urban ideals of an earlier era, the effects of which are unlikely to be fully appreciated until the project’s post-demolition phase. The revelation, over the past year, of the full extent of demolition required to build Sydney Metro casts a spotlight on the project and raises questions about its likely impact in reconfiguring the character of Sydney’s inner city. An Environmental Impact Statement Summary (EISS) released by the NSW Government in May 2016 confirms that 79 buildings in the CBD and surrounding suburbs are slated for demolition as part of station development plans for the Stage 2 Chatswood to Sydenham line (Transport for NSW). Initial assurances were that the large majority of acquisitions would be commercial buildings. Yet, the mix also comprises some locally-heritage listed structures including, most notably, 7 Elizabeth Street Sydney (Image 1), a residential apartment tower of 54 studio flats located at the top end of the Sydney central business district.Image 1: 7 Elizabeth Street Sydney apartment towers (middle). Architect: Emil Sodersten. Image credit: Ella Mudie.As the sole surviving block of CBD flats constructed during the 1930s, 7 Elizabeth Street had been identified by the Australian Institute of Architects as an example of historically significant twentieth-century residential architecture. Furthermore, the modernist block is aesthetically significant as the work of prominent Art Deco architect Emil Sodersten (1899-1961) and interior designer Marion Hall Best (1905-1988). Disregarding recommendations that the building should be retained and conserved, Transport for NSW compulsorily acquired the block, evicting residents in late 2016 from one of the few remaining sources of affordable housing in the inner-city. Meanwhile, a few blocks down at 302 Pitt Street the more than century-old Druids House (Image 2) is also set to be demolished for the Metro development. Prior to purchase by Transport for NSW, the property had been slated for a state-of-the-art adaptive reuse as a boutique hotel which would have preserved the building’s façade and windows. In North Sydney, a locally heritage listed shopfront at 187 Miller Street, one of the few examples of the Victorian Italianate style remaining on the street, faces a similar fate. Image 2. Druids House, 302 Pitt Street Sydney. Image credit: Ella Mudie.Beyond the bureaucratic accounting of the numbers and locations of demolitions outlined in the NSW Government’s EISS, this survey of disappearing structures highlights to what extent, large-scale transport infrastructure projects like Sydney Metro, can reshape what the Situationists termed the “psychogeography” of a city; the critical manner in which places and environments affect our emotions and behaviour. With their tendency to erase traces of the city’s past and to smooth over its textures, those variegations in the urban fabric that emerge from the interrelationship of the built environment with the lived experience of a space, the changes wrought by infrastructure and development thus manifest a certain anguish of urban dynamism that is connected to broader anxieties over modernity’s “speed of change and the ever-changing horizons of time and space” (Huyssen 23). Indeed, just as startling as the disappearance of older and more idiosyncratic structures is the demolition of newer building stock which, in the case of Sydney Metro, includes the slated demolition of a well-maintained 22-storey commercial office tower at 39 Martin Place (Image 3). Completed in just 1972, the fact that the lifespan of this tower will amount to less than fifty years points to the rapid obsolescence, and sheer disposability, of commercial building stock in the twenty first-century. It is also indicative of the drive towards destruction that operates within the project of modernism itself. Pondering the relationship of modernist architecture to time, Guiliana Bruno asks: can we really speak of a modernist ruin? Unlike the porous, permeable stone of ancient building, the material of modernism does not ‘ruin.’ Concrete does not decay. It does not slowly erode and corrode, fade out or fade away. It cannot monumentally disintegrate. In some way, modernist architecture does not absorb the passing of time. Adverse to deterioration, it does not age easily, gracefully or elegantly. (80)In its resistance to organic ruination, Bruno’s comment thus implies it is demolition that will be the fate of the large majority of the urban building stock of the twentieth century and beyond. In this way, Sydney Metro is symptomatic of far broader cycles of replenishment and renewal at play in cities around the world, bringing to the fore timely questions about demolition and modernity, the conflict between economic development and the civic good, and social justice concerns over the public’s right to the city. Image 3: 39 Martin Place Sydney. Image credit: Ella Mudie.In the second part of this article, I turn to literary treatments of demolition in order to consider what role the writer might play in giving expression to some of the conflicts and tensions, as exemplified by Sydney Metro, that manifest in ‘unbuilding’ the city. How might literature, I ask, be uniquely placed to mobilise critique? And to what extent does the writer—as both a detached observer and engaged participant in the city—occupy an ambivalent stance especially sensitive to the inherent contradictions and paradoxes of the built environment’s relationship to modernity?Iain Sinclair: Calling Time on the Grand Projects For more than two decades, British author Iain Sinclair has been mapping the shifting terrain of London and its edgelands across a spectrum of experimental fiction and non-fiction works. In addition to the thematic attention paid to neoliberal capitalist processes of urban renewal and their tendency to implode established ties between place, memory and identity, Sinclair’s hybrid documentary-novels are especially pertinent to the analysis of “writing demolition” for their distinct writerly approach. Two recent texts, Ghost Milk: Calling Time on the Grand Project (2011) and London Overground: A Day’s Walk around the Ginger Line (2015), highlight an intensification of interest on Sinclair’s part in the growing influence exerted by global finance, hyper consumerism and security fears on the reterritorialisation of the English capital. Written in the lead up to the 2012 London Olympics, Ghost Milk is Sinclair’s scathing indictment of the corporate greed that fuelled the large-scale redevelopment of Stratford and its surrounds ahead of the Games. It is an angry and vocal response to urban transformation, a sustained polemic intensified by the author’s local perspective. A long-term resident of East London, in the 1970s Sinclair worked as a labourer at Chobham Farm and thus feels a personal assault in how Stratford “abdicated its fixed identity and willingly prostituted itself as a backdrop for experimental malls, rail hubs and computer generated Olympic parks” (28). For Sinclair, the bulldozing of the Stratford and Hackney boroughs was performed in the name of a so-called civic legacy beyond the Olympic spectacle that failed to culminate in anything more than a “long march towards a theme park without a theme” (11), a site emblematic of the bland shopping mall architecture of what Sinclair derisorily terms “the GP [Grand Project] era” (125).As a literary treatment of demolition Ghost Milk is particularly concerned with the compromised role of language in urban planning rhetoric. The redevelopment required for the Olympics is backed by a “fraudulent narrative” (99), says Sinclair, a conspiratorial co-optation of language made to bend in the service of urban gentrification. “In many ways,” he writes, “the essential literature of the GP era is the proposal, the bullet-point pitch, the perversion of natural language into weasel forms of not-saying” (125). This impoverishment and simplification of language, Sinclair argues, weakens the critical thinking required to recognise the propagandising tendencies underlying so many urban renewal programs.The author’s vocal admonishment of the London Olympics did not go unnoticed. In 2008 a reading from his forthcoming book Hackney, That Rose-Red Empire (2009), at a local library was cancelled out of fear of providing a public platform for his negative views. In Ghost Milk Sinclair reflects upon the treatment of his not yet published docu-novel as “found guilty, with no right of reply, of being political but somehow outside politics” (115). Confronted with the type of large-scale change that underpins such projects as the Olympic Games, or the Sydney Metro closer to home, Sinclair’s predicament points to the ambiguous position of influence occupied by writers. On the one hand, influence is limited in so far as authors play no formal part in the political process. Yet, when outspoken critique resonates words can become suddenly powerful, radically undermining the authority of slick environmental impact statements and sanctioned public consultation findings. In a more poetic sense, Sinclair’s texts are further influential for the way in which they offer a subjective mythologising of the city as a counterpoint to the banal narratives of bureaucratised urbanism. This is especially apparent in London Overground: A Day’s Walk around the Ginger Line (2015), in which Sinclair recounts a single-day street-level pedestrian exploration of the 35-mile and 33-station circuit of the new London Overground railway line. Surveying with disapproval the “new bridges, artisan bakeries, blue-bike racks and coffee shops” (20) that have sprung up along the route of the elevated railway, the initial gambit of the text appears to be to critique the London Overground as a “device for boosting property values” (23). Rail zone as “generator for investment” (31), and driver of the political emasculation of suburbs like Hackney and Shoreditch. Yet as the text develops the narrator appears increasingly drawn to the curious manner in which the Overground line performs an “accidental re-mapping of London” (24). He drifts, then, in search of: a site in which to confront one’s shadow. In a degraded form, this was the ambition behind our orbital tramp. To be attentive to the voices; to walk beside our shadow selves. To reverse the polarity of incomprehensible public schemes, the secret motors of capital defended and promoted by professionally mendacious politicians capable of justifying anything. (London Overground 127)Summoning the oneiric qualities of the railway and its inclination to dreaming and reverie, Sinclair reimagines it as divine oracle, a “ladder of initiation” (47) bisecting resonant zones animated by traces of the visionary artists and novelists whose sensitivity to place have shaped the perception of the London boroughs in the urban imaginary. It is in this manner that Sinclair’s walks generate “an oppositional perspective against the grand projects of centralized planning and management of space” (Weston 261). In a kind of poetic re-enchantment of urban space, texts like Ghost Milk and London Overground shatter the thin veneer of present-day capitalist urbanism challenging the reader to conceive of alternative visions of the city as heterogeneous and imbued with deep historical time.Louis Aragon: Demolition and ModernityWhile London Overground was composed after the construction of the new railway circuit, the pre-demolition phase of a project is, by comparison, a threshold moment. Literary responses to impending demolition are thus shaped in an unstable context as the landscape of a city becomes subject to unpredictable changes that can unfold at a very swift pace. Declan Tan suggests that the writing of Ghost Milk in the lead up to the London Olympics marks Sinclair’s disapproval as “futile, Ghost Milk is knowingly written as a documentary of near-history, an archival treatment of 2012 now, before it happens.” Yet, paradoxically it is the very futility of Sinclair’s project that intensifies the urgency to record, sharpening his polemic. This notion of writing a “documentary of near-history” also suggests a certain breach in time, which in the case of Louis Aragon’s Paris Peasant is mined for its revolutionary energies.First published in book form in 1926, Paris Peasant is an experimental Surrealist novel comprising four collage-like fragments including Aragon’s famous panegyric on the Passage de l’Opéra, a nineteenth-century Parisian arcade slated for demolition to make way for a new access road to the Boulevard Haussmann. Reading the text in the present era of Sydney Metro works, the predicament of the disappearing Opera Arcade resonates with the fate of the threatened Art Deco tower at 7 Elizabeth Street, soon to be razed to build a new metro station. Critical of the media’s overall neglect of the redevelopment, Aragon’s text pays sympathetic attention to the plight of the arcade’s business owners, railing against the injustices of their imminent eviction whilst mourning the disappearance of one of the last vestiges of the more organic configuration of the city that preceded the Haussmann renovation of Paris:the great American passion for city planning, imported into Paris by a prefect of police during the Second Empire and now being applied to the task of redrawing the map of our capital in straight lines, will soon spell the doom of these human aquariums. (Aragon 14)In light of these concerns it is tempting to cast Paris Peasant as a classic anti-development polemic. However, closer interrogation of the narrator’s ambivalent stance points to a more complicated attitude towards urban renewal. For, as he casts a forensic eye across the arcade’s shops it becomes apparent that these threatened sites hold a certain lure of attraction for the Surrealist author. The explanatory genre of the guide-book is subverted in a highly imaginative inventory of the arcade interiors. Touring its baths, brothels and hair salon, shoe shine parlour, run-down theatre, and the Café Certa—meeting place of the Surrealists—the narrator’s perambulation provides a launching point for intoxicated reveries and effervescent flights of fancy. Finally, the narrator concedes: “I would never have thought of myself as an observer. I like to let the winds and the rain blow through me: chance is my only experience, hazard my sole experiment” (88). Neither a journalist nor an historian, Paris Peasant’s narrator is not concerned merely to document the Opera Arcade for posterity. Rather, his interest in the site resides in its liminal state. On the cusp of being transformed into something else, the ontological instability of the arcade provides a dramatic illustration of the myth of architecture’s permanency. Aragon’s novel is concerned then, Abigail Susik notes, with the “insatiable momentum of progress,” and how it “renders all the more visible what could be called the radical remainders of modernity: the recently ruined, lately depleted, presently-passé entities that, for better and for worse, multiply and accumulate in the wake of accelerated production and consumption in industrial society” (34). Drawing comparison with Walter Benjamin’s sprawling Arcades Project, a kaleidoscopic critique of commodity culture, Paris Vaclav similarly characterises Paris Peasant as manifesting a distinct form of “political affect: one of melancholy for the destruction of the arcades yet also of a decidedly non-conservative devotion to aesthetic innovation” (24).Sensitive to the contradictory nature of progress under late capitalist modernity, Paris Peasant thus recognises destruction as an underlying condition of change and innovation as was typical of avant-garde texts of the early twentieth century. Yet Aragon resists fatalism in his simultaneous alertness to the radical potential of the marvellous in the everyday, searching for the fault lines in ordinary reality beneath which poetic re-enchantment challenges the status quo of modern life. In this way, Aragon’s experimental novel sketches the textures and psychogeographies of the city, tracing its detours and shifts in ambience, the relationship of architecture to dreams, memory and fantasy; those composite layers of a city that official documents and masterplans rarely ascribe value to and which literary authors are uniquely placed to capture in their writings on cities. ConclusionUnable to respond within the swift publication timeframes of journalistic articles, the novelist is admittedly not well-placed to halt the demolition of buildings. In this article, I have sought to argue that the power and agency of the literary response resides, rather, in its long view and the subjective perspective of the author. At the time of writing, Sydney Metro is poised to involve a scale of demolition that has not been seen in Sydney for several decades and which will transform the city in a manner that, to date, has largely passed uncritiqued. The works of Iain Sinclair and Louis Aragon’s Paris Peasant point to the capacity of literary texts to deconstruct those broader forces that increasingly reshape the city without proper consideration; exposing the seductive ideology of urban renewal and the false promises of grand projects that transform multifaceted cityscapes into homogenous non-places. The literary text thus makes visible what is easily missed in the experience of everyday life, forcing us to consider the losses that haunt every gain in the building and rebuilding of the city.ReferencesAragon, Louis. Paris Peasant. Trans. Simon Taylor Watson. Boston: Exact Change, 1994. Aston, Heath. “We’ll Govern for All.” Sydney Morning Herald 27 Mar. 2011. 23 Feb. 2017 <http://www.smh.com.au/nsw/state-election-2011/well-govern-for-all-20110326-1cbbf.html>. Bruno, Guiliana. “Modernist Ruins, Filmic Archaeologies.” Ruins. Ed. Brian Dillon. London: Whitechapel Gallery, 2011. 76-81.Huyssen, Andreas. Present Pasts: Urban Palimpsests and the Politics of Memory. Stanford: Stanford UP, 2003.Museum of Sydney. Demolished Sydney Media Release. Sydney: Sydney Living Museums 20 Oct. 2016. 25 Feb. 2017 <http://sydneylivingmuseums.com.au/2016/12/05/new-exhibition-demolished-sydney>.Paris, Vaclav. “Uncreative Influence: Louis Aragon’s Paysan de Paris and Walter Benjamin’s Passagen-Werk.” Journal of Modern Literature 37.1 (Autumn 2013): 21-39.Sinclair, Iain. Ghost Milk: Calling Time on the Grand Project. London: Penguin, 2012. ———. Hackney, That Rose Red Empire. London: Hamish Hamilton, 2009.———. London Overground: A Day’s Walk around the Ginger Line. London: Hamish Hamilton, 2015.Susik, Abigail. “Paris 1924: Aragon, Le Corbusier, and the Question of the Outmoded.” Wreck: Graduate Journal of Art History, Visual Art, and Theory 2.2 (2008): 29-44.Tan, Declan. “Review of Ghost Milk: Calling Time on the Grand Project by Iain Sinclair.” Huffington Post 15 Dec. 2011; updated 14 Feb. 2012. 21 Feb 2017 <http://www.huffingtonpost.co.uk/declan-tan/ghost-milk-ian-sinclair-review_b_1145692.html>. Transport for NSW, Chatswood to Sydenham: Environmental Impact Statement Summary. 25 Mar. 2017 <http://www.sydneymetro.info>. Sydney: NSW Government, May-June 2016.Weston, David. “Against the Grand Project: Iain Sinclair’s Local London.” Contemporary Literature 56.2 (Summer 2015): 255-79.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography